- It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
- The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
- Current CISOs need to scope out areas of future development.
Our Advice
Critical Insight
The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.
Impact and Result
- Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
- If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
- Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
8.0/10
Overall Impact
$649
Average $ Saved
1
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
The Middlefield Banking Company
Guided Implementation
8/10
N/A
1
Good to have an external SME perspective.
Hire or Develop a World-Class CISO
Find a strategic and security-focused champion for your business.
Analyst Perspective
Create a plan to become the security leader of tomorrow
The days are gone when the security leader can stay at a desk and watch the perimeter. The rapidly increasing sophistication of technology, and of attackers, has changed the landscape so that a successful information security program must be elastic, nimble, and tailored to the organization’s specific needs.
The Chief Information Security Officer (CISO) is tasked with leading this modern security program, and this individual must truly be a Chief Officer, with a finger on the pulses of the business and security processes at the same time. The modern, strategic CISO must be a master of all trades.
A world-class CISO is a business enabler who finds creative ways for the business to take on innovative processes that provide a competitive advantage and, most importantly, to do so securely.
Cameron Smith
Research Lead, Security & Privacy
Info-Tech Research Group
Executive Summary
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
Info-Tech Insight
The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.
Your challenge
This Info-Tech blueprint will help you hire and develop a strategic CISO
- Security without strategy is a hacker’s paradise.
- The outdated model of information security is tactical, where security acts as a watchdog and responds.
- The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.
Around one in five organizations don’t have an individual with the sole responsibility for security1
1 Navisite
Info-Tech Insight
Assigning security responsibilities to departments other than security can lead to conflicts of interest.
Common obstacles
It can be difficult to find the right CISO for your organization
- The smaller the organization, the less likely it will have a CISO or equivalent position.
- Because there is a shortage of qualified candidates, qualified CISOs can demand high salaries and many CISO positions will go unfilled.
- It is easier for larger companies to attract top CISO talent, as they generally have more resources available.
Source: Navisite
Only 36% of small businesses have a CISO (or equivalent position).
48% of mid-sized businesses have a CISO.
90% of large organizations have a CISO.
Source: Navisite
Strategic versus tactical
CISOs should provide leadership based on a strategic vision 1
Strategic CISO | Tactical CISO |
---|---|
Proactive Focus is on protecting hyperdistributed business processes and data Elastic, flexible, and nimble Engaged in business design decisions Speaks the language of the audience (e.g. business, financial, technical) |
Reactive Focus is on protecting current state Perimeter and IT-centric approach Communicates with technical jargon |
1 Journal of Computer Science and Information Technology
Info-Tech has identified three key behaviors of the world-class CISO
To determine what is required from tomorrow’s security leader, Info-Tech examined the core behaviors that make a world-class CISO. These are the three areas that a CISO engages with and excels in.
Later in this blueprint, we will review the competencies and skills that are required for your CISO to perform these behaviors at a high level.
Align
Aligning security enablement with business requirements
Enable
Enabling a culture of risk management
Manage
Managing talent and change
Info-Tech Insight
Through these three overarching behaviors, you can enable a security culture that is aligned to the business and make security elastic, flexible, and nimble to maintain the business processes.
Info-Tech’s approach
Info-Tech’s methodology to Develop or Hire a World-Class CISO
1. Launch | 2. Assess | 3. Plan | 4. Execute | |
---|---|---|---|---|
Phase Steps |
|
|
|
|
Phase Outcomes |
At the end of this phase, you will have:
|
At the end of this phase, you will have:
|
At the end of this phase, you will have:
|
At the end of this phase, you will have:
|
Blueprint deliverables
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
CISO Core Competency Evaluation Tool
Assess the competency levels of a current or prospective CISO and identify areas for improvement.
Stakeholder Power Map Template
Visualize the importance of various stakeholders and their concerns.
Stakeholder Management Strategy Template
Document a plan to manage stakeholders and track actions.
Key deliverable:
CISO Development Plan Template
The CISO Development Plan Template is used to map specific activities and time frames for competency development to address gaps and achieve your goal.
Strategic competencies will benefit the organization and the CISO
Career development should not be seen as an individual effort. By understanding the personal core competencies that Info-Tech has identified, the individual wins by developing relevant new skills and the organization wins because the CISO provides increased value.
Organizational Benefits | Individual Benefits |
---|---|
|
|
Measured value of a world-class CISO
Organizations with a CISO saw an average of $145,000 less in data breach costs.1
However, we aren’t talking about hiring just any CISO. This blueprint seeks to develop your CISO’s competencies and reach a new level of effectiveness.
Organizations invest a median of around $375,000 annually in their CISO.2 The CISO would have to be only 4% more effective to represent $15,000 more value from this position. This would offset the cost of an Info-Tech workshop, and this conservative estimate pales in comparison to the tangible and intangible savings as shown below.
Your specific benefits will depend on many factors, but the value of protecting your reputation, adopting new and secure revenue opportunities, and preventing breaches cannot be overstated. There is a reason that investment in information security is on the rise: Organizations are realizing that the payoff is immense and the effort is worthwhile.
Tangible cost savings from having a world-class CISO | Intangible cost savings from having a world-class CISO |
---|---|
|
|
1 IBM Security
2 Heidrick & Struggles International, Inc.
Case Study
In the middle of difficulty lies opportunity
SOURCE
Kyle Kennedy
CISO, CyberSN.com
Challenge The decision was made to move to a new vendor. There were multiple options, but the best option in the CISO’s opinion was a substantially more expensive service that provided more robust protection and more control features. The CISO faced the challenge of convincing the board to make a financial investment in his IT security initiative to implement this new software. |
Solution He identified that the business has $100 million in revenue that would move through this data stream. This new software would help to ensure the security of all these transactions, which they would lose in the event of a breach. Furthermore, the CISO identified new business plans in the planning stage that could be protected under this initiative. |
Results This approach is the opposite of the cautionary tales that make news headlines, where new revenue streams are created before systems are put in place to secure them. This proactive approach is the core of the world-class CISO. |
Guided Implementation
What does a typical GI on this topic look like?
Launch | Assess | Plan | Execute |
---|---|---|---|
Call #1: Review and discuss CISO core competencies. Call #2: Discuss Security Business Satisfaction and Alignment diagnostic results. |
Call #3: Discuss the CISO Stakeholder Power Map Template and the importance of relationships. Call #4: Discuss the CISO Core Competency Evaluation Tool. |
Call #5: Discuss results of the CISO Core Competency Evaluation and identify resources to close gaps. Call #6: Review organizational structure and key stakeholder relationships. |
Call #7: Discuss and create your CISO development plan and track your development |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 6 to 10 calls over the course of 3 to 6 months.
Phase 1
Launch
Phase 1
1.1 Understand Core Competencies
1.2 Measure Security and Business Satisfaction and Alignment
Phase 2
2.1 Assess Stakeholder Relationships
2.2 Assess the Core Competencies
Phase 3
3.1 Identify Resources to Address Competency Gaps
3.2 Plan Approach to Improve Stakeholder Relationships
Phase 4
4.1 Decide Next Actions and Support Your CISO Moving Forward
4.2 Regularly Reassess to Measure Development and Progress
This phase will walk you through the following activities:
- Review and understand the core competencies of a world-class CISO.
- Launch your diagnostic survey.
- Evaluate current business satisfaction with IT security.
- Determine the competencies that are valuable to your IT security program’s needs.
Hire or Develop a World-Class CISO
Case study
Mark Lester
InfoSec Manager, SC Ports Authority
An organization hires a new Information Security Manager into a static and well-established IT department.
Situation: The organization acknowledges the need for improved information security, but there is no framework for the Security Manager to make successful changes.
Challenges | Next Steps |
---|---|
|
|
Follow this case study throughout the deck to see this organization’s results
Step 1.1
Understand the Core Competencies of a World-Class CISO
Activities
Review core competencies the security leader must develop to become a strategic business partner
This step involves the following participants:
- CEO or other executive seeking to hire/develop a CISO
or
- Current CISO seeking to upgrade capabilities
Outcomes of this step
Analysis and understanding of the eight strategic CISO competencies required to become a business partner
Launch
Core competencies
Info-Tech has identified eight core competencies affecting the CISO’s progression to becoming a strategic business partner.
Business Acumen Leadership Communication Technical Knowledge |
Innovative Problem Solving Vendor Management Change Management Collaboration |
1.1 Understand the core competencies a CISO must focus on to become a strategic business partner
< 1 hour
Over the next few slides, review each world-class CISO core competency. In Step 1.2, you will determine which competencies are a priority for your organization.
CISO Competencies | Description |
---|---|
Business Acumen |
A CISO must focus primarily on the needs of the business and how the business works, then determine how to align IT security initiatives to support business initiatives. This includes:
|
Leadership |
A CISO must be a security leader, and not simply a practitioner. This requires:
|