October 13, 2014 By Munish Gupta 2 min read

In today’s world, the role of the chief information security officer (CISO) is generally defined by the responsibilities of accounting for day-to-day information security governance, ensuring compliance with respect to regulatory requirements and setting the vision in the organization so that it aligns with business priorities.

These days, many organizations have put some kind of data or applications — or both — on the cloud. Cloud-based services will soon host most of the enterprise data driving information security policies and governance. The concept of borderless security and cloud-based technologies is becoming more common in the enterprise information technology (IT) landscape.

Does this scenario necessitate having a chief vendor information security officer (C-VISO) who aligns the strategy for IT services provided by vendors with the business goals and compliance requirements of the organization?

In my opinion, the answer is yes. We do need a dedicated function within the organization to focus primarily on information security compliance for vendors and third parties for hosting. With cloud providers promoting security as a shared responsibility, the primary responsibility of C-VISOs will be to warrant that cloud providers ensure compliance and make documentation and evidence available in the case of an audit. However, with third-party hosting providers, C-VISOs have to ensure information security is given its due importance and that enterprises do not miss out on compliance and governance.

For example, if you use Amazon Web Services’ (AWS) hosting environment for applications, then AWS takes care of security at a physical layer, but it’s the client who is responsible for security at the application layer. This could include deploying host-based firewalls and intrusion systems, data loss prevention and integrating with security information and event management to minimize the footprint of the threat.

The commoditization of cloud-based services led to organization data leaving organizational boundaries. However, as accountability for the safety of data still lies with organizations, having a dedicated C-VISO to minimize the threat footprint and ensure compliance with regulatory requirements is still a good idea.

More from CISO

CISO vs. CEO: Making a case for cybersecurity investments

4 min read - Ask CISOs why they think there is a cyber skills shortage in their organization, what keeps them up at night or what the most important issue facing the industry is — at some point, even if not the first response, they will bring up budgets.For example, at RSA Conference 2024, a roundtable discussion about issues facing the cybersecurity industry, one CISO stated bluntly that budgets — or lack thereof — are the biggest problem. At a time when everything is…

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today