December 11, 2014 By Rick M Robinson 2 min read

The job of the chief information security officer (CISO) in the enterprise is not getting easier. However, an assessment based on in-depth interviews with 138 corporate security leaders has found that their voices are being increasingly heard within the C-suite and beyond.

The challenges CISOs are facing come from new technologies such as mobile and cloud, from ongoing uncertainties about compliance with regulatory policies and, above all, from the relentless, sophisticated external threats posed by cybercriminals.

However, even as challenges multiply, IBM’s third annual CISO assessment, “Fortifying for the Future,” has found that security leaders are playing a more influential role within the enterprise. That role is expanding beyond the technical aspects of information security to become an integral component of the company’s strategy.

CISOs Gain Influence

In 2012, the first annual CISO assessment from the IBM Center for Applied Insights identified three roles for CISOs: responder, protector and influencer. The 2013 survey identified ways that CISOs could become influencers; this year’s results show that security leaders are, indeed, gaining influence in the enterprise.

The 2014 assessment found that 61 percent of the CISO respondents have achieved the role of influencer, and even more are moving in that direction. Ninety percent said they have significant influence within their organizations, and 76 percent report that their level of influence has increased significantly in the past three years.

Additionally, 82 percent participate at least quarterly in C-suite or strategy meetings, while 62 percent are developing their security strategy in conjunction with other strategies, particularly in the areas of IT, risk management and operations.

A New Definition of Security for the CISO

These gains in CISO influence have not taken place in a vacuum, with 82 percent of respondents reporting that the very definition of security had changed in the past three years.

This understanding of security has changed partly because of the ongoing revolution in technology. The cloud has become pervasive, and so has mobile connectivity. Both technologies have essentially undermined the old image of the corporate data network as an entity unto itself that could be barricaded from the outside world. Therefore, both call for a new, intelligence-centric approach to security.

However, security is also being redefined by the new and sophisticated level of outside threats. In the spectrum of concerns faced by CISO-level security leaders — from technology and budget to regulatory issues — external threats have become the leading challenge by a wide margin.

The growing external threat also helps explain the growing influence of CISOs within the enterprise. In the past couple of years, leading firms have been rocked by high-profile security breaches. On top of direct losses, the victims have been under fire from customers and the media. As Alex Konrad reports at Forbes, business leaders are cashing a reality check — information security is not just important, it is critical.

Insights from the 2014 CISO Assessment – See the infographic

More from CISO

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today