July 5, 2016 By Derek Brink 3 min read

“If you always do what you’ve always done, you’ll always get what you’ve always got.”

This kernel of wisdom comes from a certain high-tech headhunter in the late 1980s, who passed it on as she was helping her candidates prepare for their next job. Twenty years later, it showed up again in “What Got You Here Won’t Get You There,” a best-selling business book by Marshall Goldsmith.

For today’s information security leader, it’s wisdom that’s still worth appreciating. The role of CISO is very much in transition, and it’s increasingly clear that the skills that got you there are not the skills that are going to keep you there, let alone move you forward. For those who aspire to become CISOs, the path to a leadership role in cybersecurity is not the same as it has traditionally been.

In the spirit of doing things differently, here are introductions to three specific dimensions of important changes for information security leaders and their teams if they want to make a bigger and more valued contribution to their organization.

Two Distinct Roles

As recommended in a strategy map for security leaders, successful next-generation CISOs should strive for their information security teams to be perceived by key stakeholders as being strong in both of two distinct roles:

  • Subject matter experts in the technical aspects of ever-changing threats, vulnerabilities, exploits and information technologies, in the specific context of their own organization; and
  • Trusted advisers to the people who are responsible for making the business decisions about security-related risks, complete with the business acumen needed to bridge the gap between technical detail and organizational impact.

While acknowledging that every person is different, it’s generally true that current information security leaders have come up through the ranks of technical experts. These are the skills that got you there — and indeed, these are the skills that continue to be in short supply. But the leadership role is now demanding a blend of technical and business skills. Think of it as a cross between the business-savvy technologist and the tech-savvy businessperson.

Four Fundamental Questions

Helping the organization to manage not only the unrewarded risks of protecting its assets and minimizing downside, but also the rewarded risks of enabling its assets and maximizing upside, is the fundamental value provided by the business function known as information security. For this reason, the successful next-generation CISO should be extremely capable and highly confident when addressing the following four questions:

  1. What’s the risk? This question might refer to phishing attacks, ransomware, bad bots or whatever challenge comes next in the never-ending battle between attackers and defenders.
  2. What’s the annualized risk in the specific context of our organization, industry, strategy, IT infrastructure and culture?
  3. How does an incremental investment quantifiably reduce risk? What’s the business justification for an incremental investment in some recommended mix of technical, administrative and physical security controls, which are intended to manage the risk?
  4. How does one investment compare to another, with respect to reducing risk to an acceptable level in a specific context?

Identifying, assessing and communicating effectively about security-related risks — along with making sound business recommendations regarding what to do about them — is the very reason that information security leaders and their teams exist! Unfortunately, far too many are really struggling with how to address these fundamental questions and need to make a deliberate effort to develop the necessary skills.

Three Persistent Challenges

Pushing one level deeper in this line of thinking, successful next-generation CISOs will have to figure out how to help themselves and their teams overcome three persistent challenges.

  1. A language challenge: Even though risk is literally at the center of everything we do, a surprising number of security professionals don’t have an accurate understanding of how risk is defined and don’t use the correct terminology when talking about it. In addition, many misunderstand the types of risk, the range of responses to risk and the all-important question of who owns the business decisions about risk.
  2. A measurement challenge Given the predominantly technical and engineering-oriented backgrounds of security professionals, there’s an innate discomfort that security risks generally can’t be quantified with precision. But a lack of precision doesn’t mean “I don’t know.” In any case, the name of the game is to help make more informed business decisions about risk in spite of these inherent uncertainties.
  3. A communications challenge In spite of our discomfort at not knowing how to quantify risk, we routinely fall back on using a wide range of purely emotional and qualitative approaches to measuring and communicating about it. For example, we tout the latest headlines, averages based on surveys, the opinions of experts, qualitative assessments and semiquantitative heat maps. None of these approaches really moves the dial with respect to making better business decisions beyond the default intuition and gut instinct of the responsible business decision-makers.

Do Something Different as an Information Security Leader

If we always do what we’ve always done in these areas, we’ll always get what we’ve always got. An information security leader needs to take a different approach in each of these three dimensions if they want to drive different and more valuable results.

Read the complete IBM Report: Cybersecurity perspectives from the boardroom and C-suite

More from CISO

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today