Sleepless at 2 a.m. What's keeping CISOs up at night?
They may blame the cat, the coffee or the chardonnay, but the truth is that work awakens most chief information security officers (CISOs) several times a week. When we consider their diverse responsibilities for risk management, crisis management and change management, CISOing is a stressful role these days.
Arguably the top ongoing concern from CISOs is, "I don't know who is already in my network." A close second is, "I don't have the staff and skills to figure this out." The traditional security balance of people, process and technology is being redesigned as CISOs work to re-balance investment away from countermeasures (technical controls) to enable incident identification, investigation and response.
Improving the efficiency of incident management is a major challenge, according to a new Enterprise Strategy Group (ESG) survey, sponsored by McAfee and other technology vendors, that uncovered the impediments to security analytics and operations. After total cost of operations (a reflection of people, process and technology), the next four challenges involve time, skills and operationalization of expertise.
These hurdles are all more problematic than writing a check for new products. They require re-thinking of security architecture and organizational design. For instance, according to ESG, 80% of organizations use more than ten tools for security operations and analytics. A whopping 40% use more than 25 tools. This cornucopia of technology creates complexity, integration expense, and, inevitably, process friction.
CISO as change agent
Shifting from a prevention-centric, turnkey tools security model to a process, people-enhanced lifecycle security model is a change management challenge. It demands today's CISO plays several different roles in reshaping the security function:
To support this imposing set of skills and strengths, many companies now look outside the technology career track to people with business, legal, communications and process management experience. Often, that decision triggers a further change management challenge: retention. In this market, cybersecurity experts can get a new job in days. Newcomer CISOs must ensure they reassure, motivate and respect existing staff, not simply because they are hard to replace [the same ESG survey indicates that 81% of respondents find recruiting and hiring cybersecurity talent to be either somewhat or extremely difficult], but in order to understand the current systems, processes and policies and why they exist. That wisdom prevents unintended consequences that can cripple business-critical systems, since security systems must be adapted while the business remains operational.
Looking back at this list, it's clear CISOs have a tough and delicate task in front of them. Like parents of a newborn, they are doomed to lose a lot of sleep along the way. But recognizing the scope and nature of the challenges will help each survive and thrive.
Barbara G. Kay, CISSP, is senior director of product and solutions marketing for McAfee. She leads security operations marketing, which is responsible for the threat intelligence and analytics solutions, as well as the security management platform that enables optimized security monitoring, threat detection, and response.