February 2, 2015 By Federico Filacchione 3 min read


Chief information security officers (CISOs) are not only moving their companies to a safer and less risky position in an evermore dangerous digital world, but they are also moving up the company leadership ladder and closer to the chief executive officer (CEO) and the boardroom.

CISOs have made it there by developing appropriate skills, building solid relationships, working hard and constantly striving to achieve optimum security.

However, once inside the boardroom, there is only one thing a CISO can do: talk. And to do that, he or she must speak the same language as the board members.

Language Is Business in the Boardroom

Some time ago, I met a wonderful teacher as part of a security and leadership course I was taking. He made his point very clear to all of us when he said every IT professional must always remember this sentence: “We serve at the pleasure of the business.”

This is even more true for IT professionals working in security because their actions, work and everyday activity can significantly interfere with the company’s business operations.

Every IT decision has that effect, but choosing the wrong technology or setting things up incorrectly can slow down the system and cause interruptions. In other words, these actions can make the company pay more by violating service-level agreements.

However, a wrong security policy, wrong security decision or even overly strict behavior as the company naysayer can stop the business. This is what resonates in the boardroom since that is what the people in there understand.

Download the full Report: Cybersecurity perspectives from the boardroom and C-suite

Speaking Business as a CISO

Everybody speaks business, from the CEO, chief operating officer and chief financial officer to the other board members. Because of this, it is crucial for the CISO to speak that language, too, if he or she wants to have a stronger voice. This is even more important if he or she wants to be understood by the people who will become peers.

Speaking business is not that hard, after all. CISOs have moved up the company ladder, so they have all the skills necessary to play this role as a bridge between two worlds.

The following are some key points to keep in mind:

  • Avoid Technical Information: Board members don’t want to know how something works; they just want to be assured the machine will always be up and running.
  • Use Facts and Numbers: Don’t say a policy should be implemented “just because.” Explain the problem (incidents, breaches, leaks) through numbers and facts, and then explain why your solution will help mitigate the risk.
  • Think Business: When preparing your slides, talking with security operations employees and analyzing field reports, always correlate that information with the core business of the company.
  • Talk Business: When in the boardroom, always refer to how your actions will affect the company’s services. How will your solutions help the business? How will the decisions you’re asking them to make help the machine run more smoothly? Don’t beg for resources. Rather, explain what will happen if they don’t allocate the appropriate budget. Use compliance to leverage the company’s position in front of the outside world.

Are We Shifting Models?

No. Serving at the pleasure of the business is not really a new model to adopt to be a CISO or even a security professional. We all work for a company and receive an appropriate wage. The company makes money by doing things or selling services.

Our mission is to defend the company’s services and products, therefore defending its business. CISOs should keep defending by talking a little business — the company’s common language.

More from CISO

Empowering cybersecurity leadership: Strategies for effective Board engagement

4 min read - With the increased regulation surrounding cyberattacks, more and more executives are seeing these attacks for what they are - serious threats to business operations, profitability and business survivability. But what about the Board of Directors? Are they getting all the information they need? Are they aware of your organization’s cybersecurity initiatives? Do they understand why those initiatives matter? Maybe not. According to Harvard Business Review, only 47% of board members regularly engage with their CISO. There appears to be a…

The evolution of 20 years of cybersecurity awareness

3 min read - Since 2004, the White House and Congress have designated October National Cybersecurity Awareness Month. This year marks the 20th anniversary of this effort to raise awareness about the importance of cybersecurity and online safety. How have cybersecurity and malware evolved over the last two decades? What types of threat management tools surfaced and when? The Cybersecurity Awareness Month themes over the years give us a clue. 2004 - 2009: Inaugural year and beyond This early period emphasized general cybersecurity hygiene,…

C-suite weighs in on generative AI and security

3 min read - Generative AI (GenAI) is poised to deliver significant benefits to enterprises and their ability to readily respond to and effectively defend against cyber threats. But AI that is not itself secured may introduce a whole new set of threats to businesses. Today IBM’s Institute for Business Value published “The CEO's guide to generative AI: Cybersecurity," part of a larger series providing guidance for senior leaders planning to adopt generative AI models and tools. The materials highlight key considerations for CEOs…

Bringing threat intelligence and adversary insights to the forefront: X-Force Research Hub

3 min read - Today defenders are dealing with both a threat landscape that’s constantly changing and attacks that have stood the test of time. Innovation and best practices co-exist in the criminal world, and one mustn’t distract us from the other. IBM X-Force is continuously observing new attack vectors and novel malware in the wild, as adversaries seek to evade detection innovations. But we also know that tried and true tactics — from phishing and exploiting known vulnerabilities to using compromised credentials and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today