How to Hack Your CISO and Get Better Results, Every Day! Pt. 1
https://www.anticiso.com/how-to-hack-your…-every-day-pt-1a/

How to Hack Your CISO and Get Better Results, Every Day! Pt. 1

Can I be brutally honest for a moment? Your Chief Information Security Officer has been set up to fail.

I know, I know; you believe in your CISO. You stand up for them in executive leadership team meetings and board meetings. You talk about how much you truly worry about the next breach, exploit, fraud event or cyber related production outage. But, you really don’t mean it. How do I know? Because your CISO is still reporting to your Chief Information Officer.

Before we dive in to how to hack your CISO and your organization for better security results, every day, let’s take a look at how your corporate governance and organizational hierarchy decisions are probably screwing up your hopes of avoiding the front page of the newspaper for the next big breach event.

When we look at the most common reporting structure faced by CISOs today (if your company even designates someone as CISO - not just a Director, Information Security), it is important for us to draw parallels to what our corporate environment would look like if we made the same bad choices in functional hierarchy in other areas of our company. Using the logic applied today to CISOs, why don’t we have the Chief Financial Officer report to the Global Head of Sales? What could possibly go wrong if the leader in charge of revenue generation and market share acquisition had the company’s primary accountant reporting to them? Using this same compelling line of reasoning why don’t we have the General Counsel report to the Chief Marketing Officer? Wouldn’t it make the pesky business of legal disclosures so much simpler and better for your customers? Why have the Chief Information Officer report to the Chief Executive Officer at all? We know that the business drives large parts of the annual technology spend in every company so why not just let the CIO report to the head of the largest business unit in your company? Fair is fair right? I am certain the business executive owning all of technology will pay all the required attention to system maintenance, the needs of other business lines and day-to-day IT operations. Aren’t you?

In all of these instances, I am certain you’re saying “no, that won’t work. That’s not how any of this works”. But, this is precisely what you’ve done with your Chief Information Security Officer. You’ve aligned them to a business leader for information technology. You’ve aligned them to a member of the executive leadership team who has enormous up-time demands from his business partners, huge expectations from her product development and marketing teams as well as day-to-day run the engine requirements that consume considerable portions of their already heavily scrutinized budgets. And in the midst of all of this, you’ve aligned the one person in your organization that has been tasked to keep the entire digital universe you occupy safe, while putting them in a position where they can never deliver on that task.

So what happens as a result? Your CISO's budgetary asks are put into the total CIO budget request and it is evaluated based on “business need” or “business priority”. Your CISO will tell you “we have included risk reduction in our business case formula” but seriously, it is not true. It isn’t that the CISO is lying, it is that your CISO is the only one desperately saying “I need this technology spend to fix this serious security problem, so stop taking my money to build the next rewards program application for the business”. They are diplomatically drowning. And you are throwing them a boat anchor instead of a life preserver.

Think about the reality of history for a moment, without discounting the truth of it. The information security function did not exist within your company as recently as 10 years ago, maybe not even 2 years ago for several organizations. By aligning information security or cybersecurity to IT, you immediately made a subconscious decision to have your CISO fight for table scraps of budget dollars from the 1.5% to 6% of total budgetary spend you were throwing to your CIO. Oh, and don't forget - you also demand a 10% reduction of that total expense year-over-year. The choice made, long ago, was that even though cybersecurity is an entirely new function and frankly an entirely new set of technologies, processes and staff expertise there would be no “green” dollars reserved for the function. In no other area of our corporate structure have we ever made that type of decision. We’ve never started a brand new business line, product category or acquisition without investment dollars; new money, green money. So we’ve organized and funded our CISO in a way that guarantees failure. Every budgetary battle for a CISO ends up being the equivalent of King Solomon demanding that the baby be cut in half to appease the CFO, the CISO and all the other IT leaders fighting for money. Except, the decision to not fund a security program across any of the many control categories, is precisely why you will get breached. Making your CISO engage in the financial equivalent of Fight Club with your Head of Infrastructure will most certainly lead to your much needed infrastructure upgrade and your much needed infrastructure security monitoring both being underfunded and sub-optimally implemented.

I’m sure there will be some sensitivity to my brusque tone and sharp delivery of this message. But, CEOs, COOs, CFOs, CIOs and members of risk management committees at the Board of Director’s level, you need a wakeup call. I’m just ringing the bell. While you might be defensive about this series of statements, you just need to ask yourself one question so we can get on to how to hack your CISO for better results.

Do you believe you have enough money to buy your way to safety with information security solutions?

We’ll dive into that in Part 2.

Mark Buonassissi

Director of Information Technology at evolv consulting

7 年

The football analogy works well in my opinion. Offensive and Defensive Coordinators autonomous yet still responsible to the Head Coach. All working together to plan and strategize to win the game.

回复
Douglas Copley

Executive Risk Leader | Cross-Industry CISO and Executive vCIO/CISO/CPO

7 年

I agree with your position to a point. There are certainly disadvantages of a CISO reporting to the CIO but there are advantages as well. Ultimately wherever in the organization the CISO can get the most executive-level support and maintain an adequate level of independence (difficult when reporting to CIO) is where they should report.

Rex Warnert, CISSP, GPEN, GWAPT, OSWP

PMP, CISSP, GCPN, GPEN, GCFE, GMOB, GAWPT, OSWP, CEH, CySA+, Sec+, MCSE, Tenable Certified Systems Engineer, Splunk ESA, ITIL ..and that is just IT ones. ISSE-CISO done them all. Fed Gov or DOD civilian positions only.,

7 年

Richard an astute synopsis of the organizational challenges when addressing the role of CISO. If you start talking about effectively tying ORM to business survival as it relates to the priorities of the CISO I fear I may pass out. How are you a Client Director? Maybe that means a whole lot more at Optiv than it sounds. That type of insight is rare and incredibly valuable to any business these days. Maybe they should make you Chief Wisdom Officer.??

Mannie Romero, MBA, OSCP, GPEN, CISSP-ISSEP, GCFE, GCSA

Vice President of Product Security at @Zelle | Early Warning?

7 年

Great article Richard !

要查看或添加评论,请登录

Richard Bird的更多文章

  • Cybersecurity and Joe Strummer

    Cybersecurity and Joe Strummer

    A lot of people ask me how I come up with so many unique and off the wall comments, quotes and analogies about…

    29 条评论
  • Mixing It Up - Episode 1

    Mixing It Up - Episode 1

    Moving into API security and making a good Manhattan - not a bad start to what I hope is a useful and insightful…

    4 条评论
  • Who Is Watching the Watchers - Can We Trust Who We Entrust With Cybersecurity?

    Who Is Watching the Watchers - Can We Trust Who We Entrust With Cybersecurity?

    There are two types of start-up founders in the world. One is the archetypical model and the other is not only less…

    9 条评论
  • Where Is There? MLK Day Speech 2011

    Where Is There? MLK Day Speech 2011

    Just a bit more than a year ago I accompanied my wife and mother-in-law to their family home in Lynchburg, Virginia for…

  • Data Privacy Is A Joke In Your Town (Or Nation)

    Data Privacy Is A Joke In Your Town (Or Nation)

    Data privacy is a joke - because marketers will never stop and because legislators and law makers refuse to tie the…

    10 条评论
  • Information Security is Free!

    Information Security is Free!

    Why are you giving information security away for free? More to the point, why do so many companies today fail to create…

    3 条评论
  • How to Hack Your CISO to Get Better Results, Every Day! Pt. 2

    How to Hack Your CISO to Get Better Results, Every Day! Pt. 2

    Find the original article at: www.anticiso.

    1 条评论
  • Where Are All The Contrarians At?

    Where Are All The Contrarians At?

    Here is the disclaimer: All of the opinions, musings, thoughts, observations, poems, limericks, heavy metal hair ballad…

  • Fasten Your Seat Belts: Your CISO Cannot Save You

    Fasten Your Seat Belts: Your CISO Cannot Save You

    The news cycle is continuous, relentless and never ceasing. Security breaches, data losses, customer exposures…

    11 条评论

社区洞察

其他会员也浏览了