Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

7/3/2017
03:20 PM
Paula Greve
Paula Greve
News Analysis-Security Now
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

The Stress of Being CISO

The title 'CISO' carries with it some serious stress. A new poll talks about that stress and what to do about it.

Sleepless at 2 a.m. What's keeping CISOs up at night?

They may blame the cat, the coffee or the chardonnay, but the truth is that work awakens most chief information security officers (CISOs) several times a week. When we consider their diverse responsibilities for risk management, crisis management and change management, CISOing is a stressful role these days.

Arguably the top ongoing concern from CISOs is, "I don't know who is already in my network." A close second is, "I don't have the staff and skills to figure this out." The traditional security balance of people, process and technology is being redesigned as CISOs work to re-balance investment away from countermeasures (technical controls) to enable incident identification, investigation and response.

Improving the efficiency of incident management is a major challenge, according to a new Enterprise Strategy Group (ESG) survey, sponsored by McAfee and other technology vendors, that uncovered the impediments to security analytics and operations. After total cost of operations (a reflection of people, process and technology), the next four challenges involve time, skills and operationalization of expertise.

These hurdles are all more problematic than writing a check for new products. They require re-thinking of security architecture and organizational design. For instance, according to ESG, 80% of organizations use more than ten tools for security operations and analytics. A whopping 40% use more than 25 tools. This cornucopia of technology creates complexity, integration expense, and, inevitably, process friction.


Want to learn more about the tech and business cases for deploying virtualized solutions in the cable network? Join us in Denver on October 18 for Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo featuring speakers from Comcast and Charter.

CISO as change agent
Shifting from a prevention-centric, turnkey tools security model to a process, people-enhanced lifecycle security model is a change management challenge. It demands today's CISO plays several different roles in reshaping the security function:

  • Coach: "Detect and correct" functions are far more process-intensive and knowledge-centric than tools-centric preventative measures. Organizational processes need to be defined, vetted, formalized and maintained, and that takes time, willpower, motivation and a committed team. Imagine training a team for a marathon, and you have the right idea.
  • Marriage Counselor: Sixty-six percent of companies surveyed by ESG are moving from a siloed model with different individuals using different tools, toward a more consolidated and integrated approach for security analytics.
  • Mediator: Companies already struggle with maintenance processes such as patching and vulnerability management, where security requirements often conflict with (and lose to) IT processes and policies. Now, to support the visibility and collaboration required for rapid and accurate incident response, CISOs need to break down more organizational barriers, influencing far beyond their direct reports.
  • Crisis manager: Every few months a dialogue-changing industry attack happens. If your business is affected, the security operations teams draw on operational IT for surge and suppression (which is where enabling collaboration becomes critical). If your company isn't affected, your next action is to prove that the company isn't vulnerable to the problem. Board members and executives expect business impact assessments while the operation is underway, contributing to pressure.

To support this imposing set of skills and strengths, many companies now look outside the technology career track to people with business, legal, communications and process management experience. Often, that decision triggers a further change management challenge: retention. In this market, cybersecurity experts can get a new job in days. Newcomer CISOs must ensure they reassure, motivate and respect existing staff, not simply because they are hard to replace [the same ESG survey indicates that 81% of respondents find recruiting and hiring cybersecurity talent to be either somewhat or extremely difficult], but in order to understand the current systems, processes and policies and why they exist. That wisdom prevents unintended consequences that can cripple business-critical systems, since security systems must be adapted while the business remains operational.

Looking back at this list, it's clear CISOs have a tough and delicate task in front of them. Like parents of a newborn, they are doomed to lose a lot of sleep along the way. But recognizing the scope and nature of the challenges will help each survive and thrive.

Related posts:

Barbara G. Kay, CISSP, is senior director of product and solutions marketing for McAfee. She leads security operations marketing, which is responsible for the threat intelligence and analytics solutions, as well as the security management platform that enables optimized security monitoring, threat detection, and response.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-1067
PUBLISHED: 2021-01-20
NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the implementation of the RPMB command status, in which an attacker can write to the Write Protect Configuration Block, which may lead to denial of service or escalation of privileges.
CVE-2021-1068
PUBLISHED: 2021-01-20
NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the NVDEC component, in which an attacker can read from or write to a memory location that is outside the intended boundary of the buffer, which may lead to denial of service or escalation of privileges.
CVE-2021-1069
PUBLISHED: 2021-01-20
NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the NVHost function, which may lead to abnormal reboot due to a null pointer reference, causing data loss.
CVE-2020-26252
PUBLISHED: 2021-01-20
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.6, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to update product data to be able to store an executable file on the server ...
CVE-2020-26278
PUBLISHED: 2021-01-20
Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is suppli...