May 1, 2017 By David Strom 2 min read

David Froud recently updated a blog post of his from last year about how to get into the cybersecurity field and become a chief information security officer (CISO). In last year’s post, the security expert wrote about the importance of understanding your motivations for going into the security field. If you scored Extroversion, Sensing, Thinking, Judgment (ESTJ) on the Myers-Briggs personality test, he wrote, chances are you have the right kind of temperament and motivations to succeed as a CISO.

“Without question, a career in cybersecurity can be very rewarding, both in personal achievement and financial terms,” Froud explained. “It can also chew you up and spit you out if you’re not careful.”

The CISO’s Dilemma

Part of the problem with finding the right CISO job is that the role is almost too popular these days. There are hundreds of places from which potential IT candidates can obtain dozens of security credentials. Furthermore, enterprise protection technologies are exploding, and the days of a traditional antivirus tools are quickly coming to an end since new malware schemes are designed to circumvent them with sneakier methods.

This presents a typical CISO candidate with a dilemma: Should you focus on beefing up credentials or aim to create a more hands-on experience? Should you prioritize understanding the technology or becoming better at the underlying business processes?

No Substitute for Experience

In his recent post, Froud explained that experience is the best teacher. “It’s the people and processes that give technology context, not the other way around,” he wrote. “You will be lost in a never-ending cycle of throwing technology after technology at something that could likely be fixed by adjusting the very business processes you’re trying to protect.”

It’s all about using real-world implementations of technology that can solidify a network to repel data breaches. Look at the many high-profile public breaches of the past year: In many circumstances, the companies involved had purchased various solutions to prevent data leaks. However, the solutions were incompletely implemented, misconfigured or only implemented in one corner of the network.

Listen to the podcast: One Hack Away from Disaster

The Devil Is in the Details

Security is really a means to an end, and that end is for the business to succeed.

“A successful CISO needs to be both strategic — long-term plan, collaborate with teams, communicate to executive management and the board — and tactical. The devil is in the details,” said Imperva CISO Shahar Ben-Hador in a blog post. “As a CISO, I have to assess what’s going to be a fundamental technology over a longer period of time and what’s fundamental for our business.”

Both articles feature lots of other solid career advice for CISOs, such as not to immediately take the most lucrative offer, find the right person to mentor you and review your progress every six months. As Froud wrote, the final aspect of a CISO’s job borders on politics, so that had better be what you want. True enough!

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today