Search
Close this search box.

Infographic

The three types of CISO in today’s organizations

[vc_section section_style=”container-1266″ disable_element=”yes” css=”.vc_custom_1560842459170{padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 30px !important;padding-left: 0px !important;background-color: #ffffff !important;}”][vc_row css=”.vc_custom_1544106561584{margin-top: 0px !important;padding-top: 0px !important;}”][vc_column width=”7/12″ el_class=”col-pad-15r”][vc_column_text]

Cybersecurity guide

[/vc_column_text][vc_custom_heading text=”The three types of CISO in today’s organizations” font_container=”tag:h1|text_align:left” css=”.vc_custom_1544164503195{margin-left: 30px !important;}”][vc_custom_heading text=”The future of the CISO” font_container=”tag:h2|text_align:left|color:%23ff671f” css=”.vc_custom_1544164511022{margin-top: 40px !important;margin-left: 30px !important;}”][vc_custom_heading text=”Many companies have taken the step of having the CISO report to the board. Regardless of the reporting chain, however, the nature of the CISO’s role is something that must evolve.” font_container=”tag:p|font_size:2rem|text_align:left|color:%23343f50|line_height:3rem” css=”.vc_custom_1544164527931{margin-top: 0px !important;margin-left: 30px !important;}”][/vc_column][vc_column width=”5/12″ css=”.vc_custom_1544105211922{margin-top: 0px !important;padding-top: 0px !important;}”][vc_single_image image=”32767″ img_size=”full” alignment=”center” css=”.vc_custom_1544784207879{margin-bottom: 0px !important;}”][/vc_column][vc_column css=”.vc_custom_1544104587210{padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}”][/vc_column][/vc_row][vc_row css=”.vc_custom_1544774287358{padding-top: 1% !important;padding-bottom: 1% !important;background-color: #15b4d4 !important;}” el_class=”box-shadow-grey”][vc_column css=”.vc_custom_1544786251068{padding-right: 5% !important;padding-left: 5% !important;}”][vc_custom_heading text=”For a CISO, the ability to be in sync with the wider business, and to communicate effectively to it, is vital.” font_container=”tag:h4|text_align:center|color:%23ffffff”][vc_custom_heading text=”Broadly speaking we encounter three types of CISOs today:” font_container=”tag:p|text_align:center|color:%23ffffff”][/vc_column][/vc_row][/vc_section][vc_section section_style=”container-1266″ disable_element=”yes” css=”.vc_custom_1560842464957{background-color: #ffffff !important;}” el_class=”border-bottom-blue”][vc_row equal_height=”yes” css=”.vc_custom_1544769274415{background-color: #ffffff !important;}”][vc_column width=”1/2″][vc_single_image image=”32803″ img_size=”full”][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1544771665983{padding-top: 5% !important;padding-right: 2% !important;padding-bottom: 5% !important;padding-left: 2% !important;}”][affordance_title_box box_style=”style3″ heading_color=”#16659d” module_title=”The deep-tech CISO”]

The super specialist

Perhaps the most frequently encountered remains the cybersecurity expert that has risen through the ranks of the organization’s IT team, acquiring an increasingly specialized skillset. These people are steeped in cybersecurity tech, and in possession of invaluable security knowledge the business definitely needs, however this specialism may also serve to have isolated them from the wider business narrative.

[/affordance_title_box][/vc_column][/vc_row][/vc_section][vc_section section_style=”container-1266″ disable_element=”yes” css=”.vc_custom_1560842469672{background-color: #ffffff !important;}” el_class=”border-bottom-blue”][vc_row equal_height=”yes” css=”.vc_custom_1544769286861{background-color: #ffffff !important;}”][vc_column width=”7/12″ css=”.vc_custom_1544774959314{margin-top: -120px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” el_class=”col-sm-push-5 col-md-push-5 col-lg-push-5″][vc_single_image image=”32802″ img_size=”450×550″ alignment=”center”][/vc_column][vc_column width=”5/12″ css=”.vc_custom_1544785030230{padding-top: 5% !important;padding-bottom: 5% !important;padding-left: 10% !important;}” el_class=”col-sm-pull-7 col-md-pull-7 col-lg-pul-7 col-pad-15″][affordance_title_box box_style=”style3″ module_title=”The business-facing CISO”]

Beyond tech

Our second CISO is one that has also come up through the IT ranks but has successfully established a deeper connection to those wider business needs and narratives. However technical this second CISO type’s background may be, they’ve added to it. Perhaps they’ve had some experience working at the business-IT interface before, or have simply grasped the changing requirements of the role. These are of course better positioned to inform the CIO or even address the board directly.

[/affordance_title_box][/vc_column][/vc_row][/vc_section][vc_section section_style=”container-1266″ disable_element=”yes” css=”.vc_custom_1560842474240{padding-top: 0px !important;background-color: #ffffff !important;}”][vc_row equal_height=”yes” css=”.vc_custom_1544769300375{background-color: #ffffff !important;}”][vc_column width=”1/2″ css=”.vc_custom_1544769101859{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_single_image image=”32801″ img_size=”large” alignment=”center”][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1544771763386{padding-top: 5% !important;padding-right: 10% !important;padding-bottom: 5% !important;}”][affordance_title_box box_style=”style3″ module_title=”The business CISO”]

The future of the role

Finally, we have the type that is arguably the most indicative of the future CISO role. These frequently arrive from the business side itself (whether they’re promoted internally or brought in from elsewhere), and view security as a factor inextricably connected to the wider strategic agenda. These tend to be the best equipped to communicate at board-level. If the business has already sought out this type of CISO,it is likely already addressing cyber security at the board level. A CIO that seeks out a CISO with this outlook can only strengthen their hand.

[/affordance_title_box][/vc_column][/vc_row][/vc_section][vc_section][vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text]The future of the CISO
Many companies have taken the step of having the CISO report to the board. Regardless of the reporting chain, however, the nature of the CISO’s role is something that must evolve.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_single_image image=”34581″ img_size=”full” alignment=”center”][/vc_column][/vc_row][/vc_section][vc_section section_style=”container-1266″ css=”.vc_custom_1560842899389{margin-top: 30px !important;margin-bottom: 30px !important;}”][vc_row css=”.vc_custom_1544772955042{padding-bottom: 40px !important;}”][vc_column][affordance_cta_button button_alignment=”center” cta_code=”f2c52e72-583f-4ccc-8b6b-4c37699ff15c” button_style=”primary-btn”][/vc_column][/vc_row][/vc_section][vc_section section_style=”full-stretch” css=”.vc_custom_1576822480592{margin-top: 30px !important;padding-top: 30px !important;background-color: #dddddd !important;}”][vc_row equal_height=”yes” css=”.vc_custom_1560842520709{padding-bottom: 40px !important;}”][vc_column width=”1/2″ background_position=”center” css=”.vc_custom_1576822487111{padding-top: 70px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][affordance_title_box box_style=”style3″ display_button=”1″ button_style=”primary-btn” button_size=”small” button_text=”Download now” button_link=”/resources/ebook/creating-a-strong-security-culture-a-guide-for-cisos-cios/” heading_color=”” module_title=”Get the full insight. Read our guide for CISOs & CIOs”]

Whether you’re a CIO or a CISO, you would undoubtedly like to see your organization embrace a stronger security culture. Every business today, after all, is entirely dependent on its software: a serious breach can bring any organization to a grinding halt. Read this free guide to find out five simple cultural changes that will make your company more secure.

[/affordance_title_box][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1560842556222{padding-top: 2% !important;padding-left: 10% !important;}”][vc_single_image image=”32796″ img_size=”430×450″ alignment=”center”][/vc_column][/vc_row][/vc_section]