Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

7/3/2017
03:20 PM
Paula Greve
Paula Greve
News Analysis-Security Now
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

The Stress of Being CISO

The title 'CISO' carries with it some serious stress. A new poll talks about that stress and what to do about it.

Sleepless at 2 a.m. What's keeping CISOs up at night?

They may blame the cat, the coffee or the chardonnay, but the truth is that work awakens most chief information security officers (CISOs) several times a week. When we consider their diverse responsibilities for risk management, crisis management and change management, CISOing is a stressful role these days.

Arguably the top ongoing concern from CISOs is, "I don't know who is already in my network." A close second is, "I don't have the staff and skills to figure this out." The traditional security balance of people, process and technology is being redesigned as CISOs work to re-balance investment away from countermeasures (technical controls) to enable incident identification, investigation and response.

Improving the efficiency of incident management is a major challenge, according to a new Enterprise Strategy Group (ESG) survey, sponsored by McAfee and other technology vendors, that uncovered the impediments to security analytics and operations. After total cost of operations (a reflection of people, process and technology), the next four challenges involve time, skills and operationalization of expertise.

These hurdles are all more problematic than writing a check for new products. They require re-thinking of security architecture and organizational design. For instance, according to ESG, 80% of organizations use more than ten tools for security operations and analytics. A whopping 40% use more than 25 tools. This cornucopia of technology creates complexity, integration expense, and, inevitably, process friction.


Want to learn more about the tech and business cases for deploying virtualized solutions in the cable network? Join us in Denver on October 18 for Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo featuring speakers from Comcast and Charter.

CISO as change agent
Shifting from a prevention-centric, turnkey tools security model to a process, people-enhanced lifecycle security model is a change management challenge. It demands today's CISO plays several different roles in reshaping the security function:

  • Coach: "Detect and correct" functions are far more process-intensive and knowledge-centric than tools-centric preventative measures. Organizational processes need to be defined, vetted, formalized and maintained, and that takes time, willpower, motivation and a committed team. Imagine training a team for a marathon, and you have the right idea.
  • Marriage Counselor: Sixty-six percent of companies surveyed by ESG are moving from a siloed model with different individuals using different tools, toward a more consolidated and integrated approach for security analytics.
  • Mediator: Companies already struggle with maintenance processes such as patching and vulnerability management, where security requirements often conflict with (and lose to) IT processes and policies. Now, to support the visibility and collaboration required for rapid and accurate incident response, CISOs need to break down more organizational barriers, influencing far beyond their direct reports.
  • Crisis manager: Every few months a dialogue-changing industry attack happens. If your business is affected, the security operations teams draw on operational IT for surge and suppression (which is where enabling collaboration becomes critical). If your company isn't affected, your next action is to prove that the company isn't vulnerable to the problem. Board members and executives expect business impact assessments while the operation is underway, contributing to pressure.

To support this imposing set of skills and strengths, many companies now look outside the technology career track to people with business, legal, communications and process management experience. Often, that decision triggers a further change management challenge: retention. In this market, cybersecurity experts can get a new job in days. Newcomer CISOs must ensure they reassure, motivate and respect existing staff, not simply because they are hard to replace [the same ESG survey indicates that 81% of respondents find recruiting and hiring cybersecurity talent to be either somewhat or extremely difficult], but in order to understand the current systems, processes and policies and why they exist. That wisdom prevents unintended consequences that can cripple business-critical systems, since security systems must be adapted while the business remains operational.

Looking back at this list, it's clear CISOs have a tough and delicate task in front of them. Like parents of a newborn, they are doomed to lose a lot of sleep along the way. But recognizing the scope and nature of the challenges will help each survive and thrive.

Related posts:

Barbara G. Kay, CISSP, is senior director of product and solutions marketing for McAfee. She leads security operations marketing, which is responsible for the threat intelligence and analytics solutions, as well as the security management platform that enables optimized security monitoring, threat detection, and response.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-38896
PUBLISHED: 2021-10-20
IBM QRadar Advisor 2.5 through 2.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209566.
CVE-2021-41167
PUBLISHED: 2021-10-20
modern-async is an open source JavaScript tooling library for asynchronous operations using async/await and promises. In affected versions a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they do...
CVE-2021-42762
PUBLISHED: 2021-10-20
BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is...
CVE-2021-41135
PUBLISHED: 2021-10-20
The Cosmos-SDK is a framework for building blockchain applications in Golang. Affected versions of the SDK were vulnerable to a consensus halt due to non-deterministic behaviour in a ValidateBasic method in the x/authz module. The MsgGrant of the x/authz module contains a Grant field which includes ...
CVE-2021-21743
PUBLISHED: 2021-10-20
ZTE MF971R product has a CRLF injection vulnerability. An attacker could exploit the vulnerability to modify the HTTP response header information through a specially crafted HTTP request.