July 8, 2015 By Rick M Robinson 3 min read

Chief information security officers (CISOs) have plenty to keep them awake at night. Security threats have more or less doubled in just the last year. Attacks are ongoing and constant — the state government of Michigan alone records a staggering 730,000 attempted attacks each day. And as new technologies evolve and go mainstream, the security challenges are growing, from the cloud, the Internet of Things (IoT) and mobile to the ongoing problems surrounding the human factor.

Fortunately for organizations, CISO strategies for overcoming these threats are also evolving. The power of encryption is being harnessed to safeguard data in every stage of its life cycle. Organizations in government and the private sector are coordinating to build security into the IoT from the start. Policy strategies for the mobile era are emerging and being implemented. Looking ahead to 2020, the CISO environment of tomorrow is coming into view.

A Changing Security World Means New CISO Strategies

Dan Lohrmann, former chief security officer (CSO) for the state of Michigan and current CSO of Security Mentor, outlined some of the key emerging elements of CISO strategies at Infosec Island.

The cloud is now pervasive, and it’s becoming more integral to business operations. CISOs have been uneasy about cloud security for the simple reason that they cannot fully control data in the cloud, but the advantages of cloud computing are too great to stand aside. And one basic security strategy is emerging as the key to protecting data both in and out of the cloud: encryption.

Data needs to be encrypted at all times. Security standards and frameworks such as the Federal Risk and Authorization Management Program (FedRAMP) and its British counterpart G-Cloud are providing access to cloud services that meet stringent security standards so CISOs can safeguard their data while leveraging the power of the cloud.

Unlike the cloud, the IoT is only just beginning to go mainstream, but its potential security challenges are already testing CISO strategies. Attacks that steal or destroy data are bad enough, but we must plan now against future attacks that could cause mass freeway pileups — or worse. The key to building an effective strategy for protecting the IoT is learning from the past. The security challenges that have emerged in the cloud or mobile devices have much in common with the earlier challenges of Wi-Fi. Security cannot be bolted on as an afterthought; it needs to be built in from the start as an integral part of the architecture.

Watch the on-demand webinar to learn more: The CISO in 2020

The Challenges of Mobile and the Human Factor

Purely technological issues are neither the only nor even the primary factors that are now shaping proactive CISO strategies. The human factor in security continues to be the greatest CISO challenge of all.

The fastest-growing obstacle in recent years has been the explosion of mobile and the resulting spread of a culture of bring-your-own-device (BYOD). Mobile operating systems such as Android or even iOS pose their own technical issues, but the biggest challenge is coping with company data on employees’ personal devices.

Lohrmann does not try to sweeten this pill. “We need to enforce device policies with mobile device management programs,” he wrote. This means being able to “lock devices automatically, have the ability to remotely wipe data and encrypt sensitive data on mobile devices.”

Chris Preimesberger of eWEEK outlined the elements of an effective BYOD policy. No one should be surprised to hear that “the easy part is rolling out the policy; enforcing it is another matter.” A policy unenforced is no policy at all. Employees need to be brought on board. In some cases, firms may have to bite the bullet and issue company devices for sensitive uses.

Other personnel challenges are ongoing, such as training employees to be on guard against spear phishing and other attacks. The key to success for CISOs here is to recognize that they are teaching people to protect themselves. Attackers may be after company data, but the first victim of a social engineering attack is the person who was tricked into clicking a malicious link or opening a malicious email.

The job of a CISO is not easy, and it will not get easier. But adopting best-practice CISO strategies now will make for a better night’s sleep tomorrow — and in 2020.

More from CISO

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today