The deluge of cyberattacks has not abated. Before discussing what a CISO does and the different ways of bringing CISO expertise into an organization, let us take a quick look at the current threat landscape.
As ever, current news articles report on companies suffering data breaches, ransomware attacks, DDoS attacks, and vulnerability exploits. It seems no industry is safe. Attacks have targeted hotels (Intercontinental), restaurants (Arby’s), telecommunications (Verifone, Verizon), healthcare (21st Century Oncology, who have incidentally filed for bankruptcy since the attack), education (WSU), and retail (Brookes Brothers, Kmart).
Naturally, companies want to identify similarities within their own organization to help gauge exposure to cyber threats. The question is simple: "If our organization faces a similar threat, will we be able to thwart or mitigate it?
Underlining any key differences is also of interest. There is one bogus difference that is often cited as creating a false sense of security. This is the belief that "We, [insert firm name here], will not be hacked because we are not a global mega-brand."
The media typically cover the "big" sensational stories of cybercrime. The vast majority of stories focus on attacks on big global brands or attacks involving millions of victims. However, attacks do not only target the largest companies. While some cybercriminals specifically target large entities, the majority target everyone else simply due to vulnerability (e.g., WannaCry).
Having a senior cyber expert, such as a CISO, on hand to help understand true exposure to risk can help ensure a company is adequately protected from real threats.
Organizations don’t just want someone to add a layer of security on top of performance-enhancing strategies. They want a senior thought leader who not only understands the business opportunities for a specific organization but has a proven track record for implementing the required security processes to ensure steady business continuity and growth. There are many responsibilities that are passed on to the CISO, but let’s discuss the three most important roles of a CISO.
First, a good CISO is a cyber risk expert. A CISO’s prime responsibility is to ensure that the organization’s IT architecture is running at the appropriate risk level. They take into account confidentiality, integrity, and accessibility of data and figure out how best to secure it while keeping in line with business objectives. Once overall security posture is assessed and benchmarked--via interviews as well as penetration tests, access control reviews, and vulnerability scans--a CISO should provide clear remediation recommendations most appropriate to that specific organization.
Second, a good CISO gets compliance. A CISO should be able to confidently assure the business that it complies with all regulatory bodies that impact services and product offerings, be that HIPAA for healthcare, PCI for the retail industry, or GDPR for data processors. A CISO representative, familiar with all the regulations, should know how to speed through the glut of red tape involved in achieving compliance.
Finally, a good CISO will also make sure the business has a solid plan in place should a cyber incident occur. This last component should not be overlooked. When a firm is under attack, there are many, many decisions to make in a short amount of time, many of which have a drastic impact on interactions with business partners and customers. Having a plan in place alleviates confusion, streamlines efforts, and reduces the overall consequences of a cyberattack.
When it comes to hiring a CISO, there are three options available to most organizations:
Option 1: Hire a full-time CISO
This option is suitable depending on budget (full-time CISOs are expensive and highly sought after), headcount, and knowing what exactly the organization is looking for. It is strongly recommended that companies use a trusted vetting service and industry suggestions. Look at past work experience and training certifications. Reach out to past employers to get a sense of a candidate where possible. Additionally, establish a controlled cyber test scenario for interview candidates to comment upon to get a sense of quick decision-making. Plus, get a sense of their business acumen--understanding risk should be directly tied to business objectives.
Option 2: Hiring an external CISO
This option is good for those companies who want CISO expertise on demand without having to hire a full-time employee. The advantage of this approach includes bringing in a vetted security consultant who has access to the latest tools, training, research, and approaches. CISOs that hail from reputable IT security consultancies have the added advantage of being part of a network of cybersecurity experts, which vastly increases the depth and breadth of knowledge on many topics, from compliance to risk assessments. Plus, their exposure to many different network configurations and types of security architecture also broadens their understanding of security and risk. For the best advice, ensure the consultancy is fully independent (without any vendor or service affiliations) and well-established.
Option 3: Wait for an incident before hiring a CISO
This is not a recommended approach. When hiring a CISO to clean up an urgent cyber mess, time is a key factor. Waiting until a business has a cyber emergency on its hands can lead to mistakes. For example, having to find a CISO quickly often means skipping several vetting steps before offering unfettered access to a broken network. Further, the chosen CISO will need time to understand the business's architecture, the security implementations, and what the business knows about the attack.
We would like to thank Kevin Gorsline for providing insight and expertise that greatly assisted this research.
Kevin Gorsline is a Managing Director in J.S. Held's Global Investigations Practice who joined following J.S. Held's acquisition of TBG Security. For several years, Kevin served as the Chief Operating Officer and head of the Risk and Compliance practice at TBG Security, where he was responsible for providing the leadership, management, and vision necessary to ensure that the company had the proper operational controls, administrative and reporting procedures, and people systems in place to effectively grow the organization and to ensure financial strength and operating efficiency. His experience and leadership throughout his career have been focused on developing and delivering information security services and solutions, providing outstanding client service, and driving profitable revenue growth. Kevin brings established proficiency as an IT leader with extensive experience in risk and compliance services, applications development, and implementation projects both in the United States and abroad.
Kevin can be reached at [email protected] or +1 843 890 8596.
Insights on the new administration's impacts on environmental regulations, the future of fossil fuels vs renewable energy, and adapting ESG & sustainability programs....
This article focuses on the unique challenges facing behavioral health companies, especially those in distress....
This article explores greenwashing, a deceptive practice where exaggerated or false ESG claims are made, and recent regulatory actions....