Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/1/2019
09:30 AM
Sam Abadir, Vice President of Industry Solutions at Lockpath
Sam Abadir, Vice President of Industry Solutions at Lockpath
Sponsored Article
50%
50%

6 Ways Effective CISOs Are Changing their Role

The new normal for forward-thinking CISOs includes coaching, increased visibility, and embracing new technology frameworks and priorities.

Read the trades, and you quickly get the impression that CISOs are stressed about cyberattacks, challenged by staffing shortages, pressured by management oversight and baffled by budgeting. 

The real story is how forward-thinking CISOs are adapting to a new normal brought about by the digital transformation and the meteoric rise in cybercrime. It’s not the kind of adaption associated with Charles Darwin that takes generations for genetic changes to appear. The new skillset equips CISOs for an evolving role.

Here are six ways CISOs are adapting to change:

1.  C also stands for coach
The acronym CISO has taken on a new definition. The "C" now also stands for coach, which means CISOs need to give advice and guidance freely and strike an optimistic tone. Research by the Ponemon Institute shows CISOs are shifting into this coaching role.

The primary driver is a demand to help business lines shore up their cybersecurity defenses.  For example, department heads are now seeking the CISO’s counsel regarding the company’s technology infrastructure in relation to issues like compliance with the company’s acceptable use policy, cybersecurity best practices and talking points for department heads to use with their teams. Some CISOs are being asked to coach executives about GDPR and data privacy and, as a result, are working closely with the chief privacy officer (CPO), or adding the CPO designation.

2.  Embrace organizational leadership
Given the increased reliance on technology as well as new regulations focused on cybersecurity and data privacy, CISOs that can deliver clear, actionable, role-based messages have seen their stature rise. Forward-thinking CISOs are taking advantage of their increased visibility, leveraging their ascension to leadership to further their initiatives.

Showcase how the CISO role benefits the organization and helps progress toward company goals. It’s the secret to securing budget and resources. Speak the company’s language, be mindful of company priorities and show how proposals impact what’s vital to the company.

To illustrate, Jeff Lowder, former CISO and CPO of OpenMarket, a leading mobile messaging company, took inspiration from his company’s mission statement and its reference to trust. An ISO 27001 information security program was labeled “Enterprise Trust Initiative” with a value proposition to “increase customer trust in OpenMarket by providing services that allow us to manage information risk to the right level at the right cost.” It made the program sound more company-centric, which resonated with company executives.

3.  Elevate information security
CISOs are challenged by what to share in the way of findings. Nobody wants to be an alarmist; then again you don’t want to feel like you’re rearranging deck chairs on the Titanic. Forward-thinking CISOs generate reports that offer a top-level view based on organizational goals and risks with supporting data. These CISOs know upper management wants to understand not just the threat level but also risks to assets, the bottom line and reputation.

Surescripts, the nation’s largest health information network, uses a technology platform to create real-time visual reports for the company’s executive leadership. The CISO aggregates and links data from multiple sources to communicate objectively with reputable information. Executives access the high-level review and can dive in deeper where necessary to make data-driven decisions.

4.  Embrace continuous monitoring
More and more, security teams are separating from IT departments and are becoming a separate business function. CISOs own information security, but IT owns asset protection. How well do they know the assets they’re protecting and their configurations? Organizations typically scan monthly or quarterly. Meanwhile, the risk of a breach occurs daily.

Forward-thinking CISOs are investing in systems that can continuously monitor and audit asset security. They are seeing ways to identify asset misconfigurations, as well as uncover unknown assets, applications, and other security risks. Periodic assessments are great for compliance, but for information security in 2019, CISOs need continuous monitoring. No waiting for scans means less stress.

5. Prioritize vulnerabilities
The CISO is ultimately responsible for addressing vulnerabilities to the network and systems. What’s challenging is determining which vulnerability to tackle first, second, third and so on.

A developing best practice among CISOs is prioritizing vulnerabilities based on criticality to the organization. For example, Plamen Martinov, CISO, of The University of Chicago Biological Sciences Division (BSD), directs a team that uses an asset value ranking system based on confidentiality, integrity and availability (CIA) to determine the criticality of the asset. BSD’s platform automatically performs a priority impact analysis that factors in the CIA score with each new vulnerability. It’s more efficient and effective.

Streamlined processes that utilize automation can make CISOs and their staffs more productive. Automation of routine tasks free up time for higher value projects.

6. Leverage frameworks
Frameworks like NIST provide controls and guidance that support the CISO’s efforts to drive information security. Are you leveraging information security frameworks? Forward-thinking CISOs do, and it’s helping them excel in complex compliance environments.

Jeff Lowder, OpenMarket's former CISO, adopted all 18 control families in the NIST SP 800-53r4 framework, plus created a 19th custom control family. Because it’s all in the same platform and following the principle of one control complies with many regulations, OpenMarket maintains compliance with 173 contracts and 254 compliance mandates. If there’s ever an issue, Lowder can use the platform to gain instant visibility into any contract or compliance mandate.

The CISO world is complicated enough. A framework provides an advanced starting point, along with essential guidance and support.

It’s easy to dwell on the negative or fall into the trap of misery loves company. It’s far harder to envision a future for CISOs that’s filled with promise. Forward-thinking CISOs in all industries are taking on coaching, embracing organizational leadership, and adopting frameworks in technology platforms designed for information security management.

As Stephen Hawking said, "Intelligence is the ability to adapt to change." If anybody can adapt to change and thrive, it’s smart CISOs.

About the Author
Sam Abadir, VP, Industry Solutions, Lockpath

Sam Abadir has over 20 years of experience helping companies realize value through improving processes, identifying performance metrics, and understanding risk. Sam has worked with software companies like Lockpath to build the tools that help companies manage risk and create value that enhance performance in a structured and efficient manner.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27743
PUBLISHED: 2020-10-26
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.
CVE-2020-1915
PUBLISHED: 2020-10-26
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application usi...
CVE-2020-26878
PUBLISHED: 2020-10-26
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
CVE-2020-26879
PUBLISHED: 2020-10-26
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
CVE-2020-15272
PUBLISHED: 2020-10-26
In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version ...