Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • The Security Wisdom of the All-Knowing CISO
  • Data Breach
  • Vulnerabilities

The Security Wisdom of the All-Knowing CISO

5 years ago Tripwire Guest Authors
The Security Wisdom of the All-Knowing CISO

Have you ever noticed how closely your role as the CISO of your organisation resembles that of the Wizard from “The Wizard of Oz?” As the Wizard, you are expected to be all-knowing, all-seeing and all-powerful. Your role is to keep everyone safe from the evils of the world while frantically pulling levers, pressing buttons and turning dials behind the curtain.

Life behind the curtain as a CISO

Like Dorothy, many would be surprised about what just goes on behind that curtain and how complicated a role the CISO is. Of course, everyone in the C-Suite has important work to do. But I believe that the role of the CISO is the most complex and intricate of all roles due to the requirement of candidates having a complex mix of skills which few others can match.

To be truly successful as a CISO, you must be a leader, not merely a manager. A manager tells people what to do, while a leader inspires them to follow. This alone is no easy task. Add to this the need for the CISO to have a strategic view of the world, one which can be translated into tactical and operational steps for keeping the organisation secure. This means having a broad understanding of many disciplines as well as in-depth knowledge and appreciation of business processes and needs.

The Role of CISO – Intersecting People, Process, Technology

The CISO role is complex because it encompasses and impacts all areas of the organisation. Therefore, the role requires both soft and hard skills to be employed. From understanding the business needs and overall strategy to the deployment of technical controls, the CISO has multiple levers and dials to contend with.

People

A CISO knows that people are not the weakest link; they are our greatest asset. Ensuring there are training and awareness programs in place that engage and educate our people is vitally important if we are to be successful in our role as leaders. An appreciation of human behaviour and the development of soft skills are important in the Board room when developing security programs. Layered on top of this is the need to understand operational aspects; Employee screening programs, inter-departmental movements (including promotions) and changes in the organisation (including mergers and acquisitions) can impact a successful security program.

Process

The CISO must have a good understanding of the threat landscape, which is constantly changing and evolving. In-depth knowledge of risk management processes helps us to understand where we are most vulnerable, allowing us to develop control plans based on international standards such as PCI DSS, ISO 27001, ISO 27017 ISO 27701 and ISO 22301. The CISO also needs to appreciate how these standards help to meet broader compliance-related topics such as the UK Data Protection Act, the EU General Data Protection Regulation (GDPR) and regulatory frameworks such as those dictated by the Financial Conduct Authority (FCA), among others.

Technology

Some might believe that the role of a CISO is focused on technology, but technology is merely the ‘vehicle’ that we use to manage our business processes. They are tools that allow us to process and share data to operate as a business. But the CISO often has a complex and complicated technical landscape before them with the expectation that they can protect EVERYTHING! The CISO then must have the knowledge to know what tools are available, where to deploy them and how. This involves developing and deploying policies and technology that govern mobile device management (MDM) as well as using tools that monitor the infrastructure (including SOC/SIEM technologies).

Due to the increasingly complex technical environments in which we operate, the CISO must understand how to evaluate vulnerabilities related to all aspects of the estate including cloud, on-prem and hybrid-based assets and services. Once vulnerabilities are identified, then selecting the correct solution to manage the risks is the CISO’’s next challenge. This must be through a mix of skilled people (either through a SaaS service or by hiring the right people) and technology to defend their kingdom (e.g. DDoS protection).

Conclusion

I have given a broad overview of what I believe the role of a CISO looks like by focusing on People, Process and Technology to illustrate just how broad and varied the role is. From governance, risk and compliance to technical security systems and controls, the CISO has a vast ‘to do’ list. Knowing this, the CISO must select their battles carefully by thinking strategically and acting tactically.

Few roles touch every aspect of the organisation, actively engage with it and need its support. The CISO’s role is often a thankless one—and a role which is often hidden from view. I believe it’s time we removed the curtain and let Oz see what’s behind the curtain.


About the Author: Gary Hibberd is the ‘The Professor of Communicating Cyber’, at Cyberfort, and is a Cybersecurity and Data Protection specialist with 35 years in IT. He is a published author, regular blogger and international speaker on everything from the Dark Web, through to Cybercrime and Cyber Psychology. You can follow Gary on Twitter, here.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” The Security Wisdom of the All-Knowing CISO” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Compliance, Encryption, TripWire, Vulnerability

Continue Reading

Previous Post-Cyberattack, Universal Health Services Faces $67M in Losses
Next Tripwire Patch Priority Index for February 2021

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

16 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

17 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

19 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

23 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT