Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid

Whether they're earned or not, there are certain stigmas associated with chief information security officers: They work in isolation, with only a vague sense of how various departments contribute to the organization's greater good. Does this describe you and your team - even just a bit? Or more so? If you concede that it does, that's a good thing. Improvement requires change, which is sometimes uncomfortable, because change starts with you. For CISOs and their teams, that means transforming into ubiquitous advocates for cybersecurity - and then leading the transformation for everyone in the enterprise into advocates for the same. CISOs will thrive within this change by focusing on input, empathy, and alignment. This will enable lasting success for the shift by allowing CISOs to fully identify and understand information asymmetries throughout the organization and then remove them to clear the path to optimal communications and awareness. Assigning Tasks to the Wrong Subject Matter Expert CISOs are responsible for an extremely wide scope and frequently deal with high stress - but are consistently biased toward taking action themselves. They lead the organization well, but at times miss opportunities to leverage SMEs' soft skills to optimize resolution. As leaders, it is necessary that CISOs remain cognizant of the balance between SMEs' skill sets, shared values between them and the target organization, and the true goal of this collaboration. The solution requires raising engagement between security and the enterprise across the board, building relationships that ensure the right expert is assigned to the right issue to give the right support. CISOs must rely on the people around them to truly know what is going on. By interfacing with external teams, CISOs create contacts that result in the effective ingestion of information and the proper application of personnel and responses to the information. Failing to Tie Actions to Organizational and Business Goals If CISOs don't connect their work to broader goals, it's pretty much impossible for non-IT managers and employees to appreciate the value of their actions. CISOs know why certain controls and responses to threats are needed. They can never assume those outside their team do. Because I've invested that time - to find out what they do every day, along with their strategic goals and challenges - I gain their trust in myself and my team. Executing Without Making Broad Impact I push my team members to constantly ask themselves: "Am I implementing a fix that benefits people outside our team? Or am I just trying to make my own life easier?" Obviously, we seek to achieve the former and avoid the latter. "Everyone has a plan," boxer Mike Tyson is credited with saying, "Until they get punched in the mouth." If we work within security silos - isolated in our knowledge, dogmas, and execution - every security issue is like the first time in the ring, and we consistently take punches that we have little understanding of how to handle. If we proactively pursue empathy and alignment as part of our core values, we gain a level of trust that builds pathways throughout the enterprise. Subsequently, we can remove those informational asymmetries, elevate the conversation across the organization, and lead strategically.

This Cyber News was published on www.darkreading.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000


Cyber News related to Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk - In Proofpoint's 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don't change, and AI can help and hurt CISOs' efforts. Regarding the ...
1 year ago Techrepublic.com
Human error still perceived as the Achilles' heel of cybersecurity - While fears of cyber attacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the cybersecurity landscape, according to Proofpoint. CISOs' confidence is ...
1 year ago Helpnetsecurity.com
How the Evolving Role of the CISO Impacts Cybersecurity Startups - It helps startups striving to meet the ever-evolving needs of CISOs, who are simultaneously seeking the elusive but paramount buy-in from business users and executives. The CISO role has evolved dramatically in the past few years in response to ...
1 year ago Darkreading.com
Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid - Whether they're earned or not, there are certain stigmas associated with chief information security officers: They work in isolation, with only a vague sense of how various departments contribute to the organization's greater good. Does this describe ...
1 year ago Darkreading.com
Navigating the New Age of Cybersecurity Enforcement - Many equate this move as akin to a bomb going off for people working in the CISO role. CISOs are now faced with unprecedented potential liability risks, prompting the need for a proactive approach to legal exposure for security executives. To shed ...
1 year ago Darkreading.com
Why Modern CISOs Must Be Business Translators, Not Just Technologists - This evolution means that modern CISOs must excel as technologists and business translators professionals who can bridge the gap between complex technical realities and the organization’s strategic objectives. By translating technical risks into ...
2 months ago Cybersecuritynews.com
The CISO’s Role In Ensuring Compliance Amid Evolving Cyber Threats - By extending compliance and security requirements to third-party relationships, organizations can reduce their exposure to external threats and ensure that their entire supply chain operates in accordance with regulatory standards. As a result, ...
1 month ago Cybersecuritynews.com
Soft Skills Every CISO Needs to Inspire Better Boardroom Relationships - In a recent survey of CISOs, 86% of respondents said the role has changed so much that it's almost become a different job altogether from what it once was. In addition to their traditional responsibility of defending organizations from an ...
1 year ago Darkreading.com
How CISOs Can Build Trust with Stakeholders in a Data-Driven Era - By aligning security with business goals, speaking the language of stakeholders, and using data to highlight achievements, CISOs can cement their role as indispensable partners in the data-driven era. By adopting these strategies, CISOs can transform ...
1 month ago Cybersecuritynews.com
Security tools fail to translate risks for executives - Organizations are struggling with internal communication barriers, which hinder their ability to address cybersecurity threats, according to Dynatrace. The results indicate that CISOs encounter challenges in aligning security teams with the C-suite, ...
1 year ago Helpnetsecurity.com
The New CISO: Rethinking the Role - Dating back to the 1990s, the role of CISO was more technical and IT-focused. CISOs face more risks than can be resolved, are expected to balance security with operational capability, and must convince leaders to invest in protection. Today, CISOs ...
1 year ago Darkreading.com
The Role of the CISO in Digital Transformation - Modern-day demands require organizations to be flexible and digitally savvy, getting work done remotely and in the public cloud as often as in a centralized physical location, if not more so. As companies continue to modernize their workflows and ...
1 year ago Darkreading.com
How CISOs Can Successfully Lead Security Transformation in Hybrid Work Environments - Additionally, CISOs must work closely with HR, IT, and business leaders to integrate security considerations into every aspect of the employee lifecycle, from onboarding to offboarding, ensuring that security remains top of mind as roles and work ...
1 month ago Cybersecuritynews.com
CISOs Reconsider Their Roles in Response to GenAI Integration - Chief information security officers face mounting pressure as cyberattacks surge and complexities surrounding the implementation of GenAI and AI technologies emerge. The vast majority - 92% - of the 500 CISOs surveyed by Trellix admitted they are ...
1 year ago Securityboulevard.com
Overtaxed State CISOs Struggle with Budgeting, Staffing - Though the number of scarily understaffed offices has dropped — just two respondents reported having one to five full-time employees, down from six in 2022 — more than half of state CISOs report that their staff lack the competencies necessary to ...
8 months ago Darkreading.com
Fewer cybersecurity professionals losing their jobs in breach 'blame' game - Cybersecurity job loss after a major incident is becoming less likely as organizations drop the "Blame" game for more practical approaches to breach prevention, a survey of 500 CISOs shows. More than 95% of CISOs reported their teams received greater ...
1 year ago Scmagazine.com Hunters
Strengthening Cybersecurity Governance - CISO Best Practices - Strengthening cybersecurity governance requires a deliberate approach that balances security needs with business goals, maintains regulatory compliance, and fosters a culture of security awareness. By implementing these practices, CISOs can establish ...
1 month ago Cybersecuritynews.com
What CISOs Need to Know About Data Privacy in 2024 - While consumers continue to demand stronger personal data protections, companies are scrambling to keep track of an ever-evolving patchwork of applicable laws and regulations. In this environment, cybersecurity professionals need to understand the ...
1 year ago Cybersecurity-insiders.com Patchwork
What do CISOs need to know about API security in 2024? - According to Postman's 2023 State of the API Report, roughly 66% of participants indicated that their APIs contribute to generating revenue. A recent ESG survey on API security showed that 92% of organisations using APIs have experienced a breach in ...
1 year ago Cybersecurity-insiders.com
Why CISOs and CTOs Must Collaborate More Than Ever in Today’s Security Landscape - When CTOs view CISOs as strategic partners rather than barriers to innovation, and CISOs champion security as a driver of business value, organizations can respond quickly to threats while confidently pursuing new opportunities. CTOs leading these ...
1 month ago Cybersecuritynews.com
How CISOs Can Prepare for Evolving Data Privacy Regulations - This article explores how CISOs can proactively address the challenges of evolving data privacy regulations, focusing on strategic leadership, operational best practices, and future-proofing security programs in a dynamic global landscape. In the ...
1 month ago Cybersecuritynews.com
The CISO Role Is Changing. Can CISOs Themselves Keep Up? - The role of chief information security officer has expanded in the past decade thanks to rapid digital transformation. Now CISOs have to be far more business-oriented, wear many more hats, and communicate effectively with board members, employees, ...
1 year ago Darkreading.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
1 year ago Feeds.fortinet.com
CISOs Face 2025 Cyber Threats with Shrinking Budgets and High Demands - Below, we explore the evolving role of CISOs under three critical themes: navigating budget constraints, addressing emerging threats, and redefining leadership in cybersecurity. In 2025, successful CISOs are not just technical experts but strategic ...
2 months ago Cybersecuritynews.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
1 year ago Securityzap.com