The CISO as Chief Cyber Risk Officer
There’s more than one kind of risk.

The CISO as Chief Cyber Risk Officer

I’ve been meeting a lot more CROs in industry lately, and for some companies centralizing all risk management in one executive’s portfolio makes sense.

For others, that may not be the case. But I find that, as a CISO, I have a lot in common with CROs. That’s because another way of answering the question, “What is a CISO?” is to think of the role instead as a “Chief Cyber Risk Officer.”

The job of a CISO is to manage cybersecurity risk, both against active extralegal adversaries as well as regulatory/legal risk.

Many companies have greater regulatory/legal risk than adversarial risk.

Others, especially in the crypto/web3 space, carry adversarial security risk that dwarfs their regulatory risk. Apex predators like North Korea impose catastrophic, even existential, security risk on private sector companies in crypto/web3.

So how do we manage that risk?

The same way we manage any business risk.

Read More: https://ninja.cybercybercybercyber.ninja/p/the-cyber-cro

Dana Haubold CISO CSyP CISSP

CISO | Independent Cyber Security Advisor/Consultant | Security Strategy | GRC | Cyber Risk Quantification | IT/OT | Physical Security | Convergence | BCM | Resilience | Carnegie Mellon CISO Cert | CRISC | CBCI | CSMP

5 个月

Risk is the very essence of the security function and its strategic management. Therefore the CISO's role is to be a cyber risk and resilience advisor to all stakeholders of the organisation and manage the limited resources based on risk to the business.

Max I.

Global CISO at Bitpanda | One of Germany's Top CISOs | Keynote Speaker | Security Advocate & Ambassador

5 个月

Once more you write an article I‘m supporting 100%! Thanks for being such an advocate for us ????

要查看或添加评论,请登录

J.M. P.的更多文章

  • "IT" is Dead

    "IT" is Dead

    Now it's mostly Security It is now possible to build a company without an IT team. Anyone under 40 can set up a laptop…

    2 条评论
  • Bottom-up Security Doesn't Work

    Bottom-up Security Doesn't Work

    Choosing not to govern is still a governance choice Barn-raising is an effective way to build software, especially open…

  • If Education is the Solution to Your Security Problem, Then You've Already Failed

    If Education is the Solution to Your Security Problem, Then You've Already Failed

    A new scientific study confirms what has been obvious to me for years in the trenches: Security awareness training is…

    8 条评论
  • SOC 2 in Crypto is Pointless

    SOC 2 in Crypto is Pointless

    Legal Risk and Security Risk Are Not The Same I find it astonishing that in the year 2024 I have to say this out loud…

  • Make Sure We Never Get Hacked (How not to measure a CISO's job performance)

    Make Sure We Never Get Hacked (How not to measure a CISO's job performance)

    An innocent approach to measuring the performance of the security job function would be to measure the number or…

  • CISOs Need to Speak the Language of Business

    CISOs Need to Speak the Language of Business

    I was chatting with a security vendor I won’t name, and their CEO told me during the call, “Wow, it’s so refreshing to…

    1 条评论
  • Bottom-up Security Doesn't Work

    Bottom-up Security Doesn't Work

    Choosing not to govern is still a governance choice Barn-raising is an effective way to build software, especially open…

  • The North Korean Love Triangle

    The North Korean Love Triangle

    What happens when you combine market competition with warfare? Crypto companies are trapped in the North Korean Love…

  • Web3 Security: Brittle or Resilient?

    Web3 Security: Brittle or Resilient?

    Outside of crypto, your tech startup’s primary competition comes from other companies—established players you want to…

  • Following the Herd is Dangerous in Cybersecurity

    Following the Herd is Dangerous in Cybersecurity

    Monoculture solutions expose you to systemic risk. People herd.

    1 条评论

社区洞察

其他会员也浏览了