Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • The Changing Profile of the CISO: New Roles, New Demands, New Skills
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware

The Changing Profile of the CISO: New Roles, New Demands, New Skills

4 years ago Tripwire Guest Authors
The Changing Profile of the CISO: New Roles, New Demands, New Skills

The CISO’s role is never static. Over the last two decades, it has evolved beyond technical IT security. CISOs are now central to their organization when it comes to risk, compliance and governance. And this comes at a time when businesses are undergoing rapid change in the face of changing threats.

In the past, the CISO or head of IT security has been an inward-facing role, ensuring compliance and keeping data secure. But that has changed, with cybersecurity teams more business oriented. That includes supporting new ways of working – a trend that was underway even before the pandemic – secure software development, and helping the organization understand and manage risks.

New Roles of the CISO: Continuity Planning, Incident Response, and Recovery

Customers, service users, and citizens are less and less tolerant of outages, downtime, and data loss. Regulators and stakeholders need to know that the organization can protect sensitive data and deal promptly with a security issue.

All organizations need to plan for business disruption and breaches, both in terms of business continuity and recovery. The responsibilities of security and business continuity are moving closer together in many enterprises. Increasingly, this falls within the CISO’s role. Business continuity is no longer just an IT issue, and it is closely interwoven with security.

CISOs are responsible for information assurance and for making sure the business can recover data and systems. This goes beyond managing IT security tools such as firewalls or anti-virus. The CISO is a key partner in ensuring the business meets the needs for continuity, availability, and integrity alongside other key executives such as the CIO and the chief risk officer.

And with the increasing importance of supply chains – both upstream and downstream – CISOs find themselves working more with suppliers, customers, and other stakeholders.

At the same time, CISOs are responsible for increasingly mission-critical security response functions. This might include a larger team, more sophisticated tools, and even a larger budget. But threat intelligence, SOCs, and threat response teams all need management.

CISOs will need to deal with the aftermath of a breach including data and business recovery. Potentially, they will be liaising with regulators and data protection authorities, and, in cases such as ransomware, with law enforcement. They might even need to provide advice to the board on issues that overlap with legal affairs, media relations, and human resources. This requires the CISO to work with professionals in those disciplines. They need to be team players.

And organizations are also trying to involve the CISO earlier on in new ventures. In software development, for example, the move towards DevSecOps and “shifting left” makes security a vital consideration much earlier in the process. CISOs and their teams then will become much more directly involved in areas such as web application development or the customer experience.

Board-Level Decision Making

This broader role is also reflected in the CISO’s changing status, though

CISOs are now one of the key advisers to boards and increasingly key decision makers. Boards are increasingly aware of the financial, regulatory, and reputational consequences of cyberattacks, breaches, and data loss.

CISOs are now, or should be, central to risk and security planning. To do this, they need to understand the business’s risk appetite as well as advise on how to minimize and mitigate the risks.

This goes beyond technical measures and even the areas of data integrity and business continuity we discussed earlier. It extends into regulatory, geographical, political risk, and economic risk, especially for businesses that operate on a global scale.

Businesses need to understand the cyber (security) environment they operate in. Moving into new territories, or trading with them online, brings with it different security and privacy laws, different approaches to cybersecurity from law enforcement, and even different societal norms. The processes and procedures that work in one country will not always translate to another.

Organizations are aware of this. But they need to bring the CISO in early enough so that cybersecurity risks are factored in alongside commercial considerations. At least then, if the board goes ahead, they do so having considered all the risks.

Moving Towards Advocacy

This, then, sets the direction for the CISO’s future role. The position will be less focused on technical solutions, although these will always be important.

But the CISO will be first and foremost an adviser as well as a promoter of security awareness and skills. Above all, they are an advocate for better security and for best practice in managing risk.


Editors Note: This blog post is based on an event, The Changing Role of the CISO: Security in a More Complex World, hosted by RANT and sponsored by Tripwire.

About the Author: Stephen Pritchard is a video journalist, broadcaster, and writer. He works as a freelance producer, presenter, and moderator, and he writes news, analysis, and feature articles for the international and UK press, trade media, and magazines. Stephen’s main beats include technology, telecoms, security, science, and management. He is a contributing editor and columnist for IT Pro and for Infosecurity Magazine. Stephen also writes for a number of newspapers including the Financial Times, the Guardian, and Sunday Times.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor and do not necessarily reflect those of Tripwire, Inc.

More by Stephen Pritchard

The New “Attack Surface” – Securing the Business Beyond Conventional Boundaries

The “Office of the CISO”: A New Structure for Cybersecurity Governance

The post ” The Changing Profile of the CISO: New Roles, New Demands, New Skills” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Critical Severity, Encryption, Malware, Medium Severity, Privacy, Ransomware, TripWire

Continue Reading

Previous PYSA Emerges as Top Ransomware Actor in November
Next Researchers Disclose Unpatched Vulnerabilities in Microsoft Teams Software

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

22 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

24 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT