September 5, 2017 By Scott Koegler 3 min read

The job of the chief information security officer (CISO) has changed from that of a security services manager to one that has responsibility across the entire enterprise. It has become a leadership position that requires organized thinking and detail-oriented concentration on a consistent basis. Given the rapid expansion and increasing sophistication of threat actors and cybercriminal tactics, these skills must become second-nature to CISOs through repetition.

Seven Key Priorities for the Modern Security Leader

Some of the security leader’s tasks are project-based, but because the job is ongoing, CISOs need to remain cognizant of a set of priorities that can’t be left to chance. The following seven priorities can help today’s CISOs stay on top of their game and keep their companies secure.

1. Keep Ethics at the Forefront

It may seem obvious that cybersecurity ethics have a significant role in protecting the enterprise from attacks, but CISOs need to be constantly aware of their actions and how they affect the security of their systems. Privacy is closely related to security, and it affects individuals as well as the company. As computing systems and the volumes of data they collect grow, information about people will inevitably become part of the enterprise’s knowledge base.

The specifics about how much personally identifiable information (PII) is maintained versus how much is anonymized should be an ongoing discussion led by the CISO. The security leader must consider ethics at every juncture and in every decision, because while they can’t control every user and every action, the policies and applications they pursue send a message and have actual consequences.

2. Create Relationships With Peers

The CISO’s job is technology-based, but in many ways success depends on relationships. That’s because the most persistent threats rely on human behavior. Most employees don’t consider themselves to be security threats, but the actions they take and the way they use their computing devices can open the door to cyberattacks. It’s critical for security leaders to establish trusting, rather than authoritative, relationships with employees to demonstrate that they aim to protect the enterprise, not to inconvenience users.

Listen to the podcast series: A CISO’s Guide to Obtaining Budget

3. Understand the Business Mission

Protecting endpoints, encryption and other generic segments of cybersecurity apply across all businesses, regardless of the specifics of the business itself. By the same token, every business operates differently, and those details can mean huge discrepancies in security concerns. Obvious examples include health care providers that need to abide by Health Insurance Portability and Accountability Act (HIPAA) rules regarding patient information and credit card issuers that must protect customers’ personal data. The CISO needs to connect with executives and dig into the details of the business they are protecting to make certain their assets and sensitive data are covered beyond the basics.

4. Educate Yourself

The IT security landscape is constantly changing. Formal education may help land an IT security job, but it’s incumbent on the individual to seek out sources of information that will keep them up to date and continue their education.

The CISO needs to be a student in his or her field and pursue knowledge as if preparing a master’s thesis. Stakes are high, and intruders are eager to know more about the organizations they target. The task is to keep the gap between the intruders’ efforts and the company’s protection schemes as wide as possible by continuously learning.

5. Look to the Future

CISOs know cyberattacks are inevitable, and that knowledge should drive them to develop a vision that presents a strong and active defense against intrusions. The security leader must take on a visionary approach that drives his or her understanding of the company’s business and the threats that may come against it. In this way, the CISO looks to the future with the same kind of imagination attackers have to deter and defeat them.

6. Take Action

CISOs need to be decisive in their actions. It isn’t enough to manage a think tank that considers intrusions and makes plans to mitigate them. While those efforts are important, the CISO also needs to be involved in systems design, business planning and security-related purchasing.

7. Communicate Regularly and Clearly

Each of the concerns outlined here is important, but they will fail without effective communication. The most important communication the CISO needs to master is exchanging information within the organization. This allows the security leader to gain insights about the business, learn about external and internal threats, and protect company assets. A CISO who effectively communicates his or her plans and knowledge can become an authority to help the company protect itself against the cyberattacks at its doors every day.

A Well-Rounded CISO Makes for Robust Security

The rapid expansion of the threat landscape requires CISOs to venture outside their comfort zones and traditional areas of expertise. In this new age of cognitive systems, connected devices and insider threats, a well-rounded, communicative and visionary security leader is more valuable than ever.

Listen to the podcast series: A CISO’s Guide to Obtaining Budget

More from CISO

Empowering cybersecurity leadership: Strategies for effective Board engagement

4 min read - With the increased regulation surrounding cyberattacks, more and more executives are seeing these attacks for what they are - serious threats to business operations, profitability and business survivability. But what about the Board of Directors? Are they getting all the information they need? Are they aware of your organization’s cybersecurity initiatives? Do they understand why those initiatives matter? Maybe not. According to Harvard Business Review, only 47% of board members regularly engage with their CISO. There appears to be a…

The evolution of 20 years of cybersecurity awareness

3 min read - Since 2004, the White House and Congress have designated October National Cybersecurity Awareness Month. This year marks the 20th anniversary of this effort to raise awareness about the importance of cybersecurity and online safety. How have cybersecurity and malware evolved over the last two decades? What types of threat management tools surfaced and when? The Cybersecurity Awareness Month themes over the years give us a clue. 2004 - 2009: Inaugural year and beyond This early period emphasized general cybersecurity hygiene,…

C-suite weighs in on generative AI and security

3 min read - Generative AI (GenAI) is poised to deliver significant benefits to enterprises and their ability to readily respond to and effectively defend against cyber threats. But AI that is not itself secured may introduce a whole new set of threats to businesses. Today IBM’s Institute for Business Value published “The CEO's guide to generative AI: Cybersecurity," part of a larger series providing guidance for senior leaders planning to adopt generative AI models and tools. The materials highlight key considerations for CEOs…

Bringing threat intelligence and adversary insights to the forefront: X-Force Research Hub

3 min read - Today defenders are dealing with both a threat landscape that’s constantly changing and attacks that have stood the test of time. Innovation and best practices co-exist in the criminal world, and one mustn’t distract us from the other. IBM X-Force is continuously observing new attack vectors and novel malware in the wild, as adversaries seek to evade detection innovations. But we also know that tried and true tactics — from phishing and exploiting known vulnerabilities to using compromised credentials and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today