SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
The 7 Factors of
CISO Impact
How does your information
security team measure up?
Gain Command of
the Facts
To build impact your team needs command of the facts: Which information
assets matter and how safe are they? To get those facts, build a robust
information security risk profile that assesses the state of the critical assets
you promised to safeguard. Make it dynamic to embrace new assets,
vulnerabilities, and technologies. Make the profile relevant with data from
real company experiences.
Get Business Leaders to Understand
They Own Risk
Business units own the customer, the data, and the related business risks. Information
security is essentially just another business risk. The CISO and team must engage with
business leaders to shift how they think and operate, putting information security in the
role of guiding the business to manage and mitigate those risks.
Every day your company deploys new software, commits to new vendors, launches new product
initiatives, and considers mergers and acquisitions. Where does information security figure in? CISOs and
their teams must get involved early to make a difference. Focus on embedding the right criteria and
considerations into the processes that matter.
Run InfoSec Like a Business
Develop strong project, financial, and resource management practices. Gain credibility and earn the
right to expanded budgets and resources with budgets that speak to business impact, highly
productive teams, and predictable and transparent project management.
Build a Technically Sound,
Business-Capable Team
CISOs can’t be everywhere at once. You need a team that has technical cred, the ability to hold
business-level conversations, and the interpersonal skills to handle challenging interactions. You
need to find and retain strong players for at least 3 to 5 years to have the impact you seek.
Articulate and Communicate the Value
Why would business leaders help you succeed? If they know ‘what’s in it for them’ -- if by helping
information security they get closer to meeting their own goals. How would they know what’s in it
for them? You tell them. The CISO and team must articulate and communicate the value they bring
to the business.
Organize for Success
While it can be a sensitive topic, CISOs must consider how reporting
relationships raise or lower their impact. Do they report to a risk function, at
least dotted line? Do business unit personnel report to the corporate CISO?
Where and when CISOs have the opportunity to set the table for maximum
impact, they must make the case.
Achieving Impact
Take the CISO Impact Diagnostic and find out
how you measure up, and how you can
improve.

Más contenido relacionado

La actualidad más candente

Case analysis
Case analysisCase analysis
Case analysis
amol_nale
 
Manifesto
ManifestoManifesto
Manifesto
Mak Wee
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
Marie Peters
 

La actualidad más candente (20)

Employee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management StrategyEmployee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management Strategy
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 
Case analysis
Case analysisCase analysis
Case analysis
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
KRI Consulting Solutions LLC
KRI Consulting Solutions LLCKRI Consulting Solutions LLC
KRI Consulting Solutions LLC
 
Hello ERM - It's Time to Go
Hello ERM - It's Time to GoHello ERM - It's Time to Go
Hello ERM - It's Time to Go
 
Risk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsRisk Management Case Study - Applied Concepts
Risk Management Case Study - Applied Concepts
 
Spreadsheets vs Software for SOX Compliance
Spreadsheets vs Software for SOX ComplianceSpreadsheets vs Software for SOX Compliance
Spreadsheets vs Software for SOX Compliance
 
What we do
What we doWhat we do
What we do
 
Bond presentation
Bond presentationBond presentation
Bond presentation
 
App Showcase: Retail Loss Prevention
App Showcase: Retail Loss PreventionApp Showcase: Retail Loss Prevention
App Showcase: Retail Loss Prevention
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
The Risk Paradox: Showcasing the Success of Security
The Risk Paradox: Showcasing the Success of SecurityThe Risk Paradox: Showcasing the Success of Security
The Risk Paradox: Showcasing the Success of Security
 
Manifesto
ManifestoManifesto
Manifesto
 
Integrated risk management
Integrated risk managementIntegrated risk management
Integrated risk management
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 

Destacado

Pablo gallardo fdez cuento 6ºa
Pablo gallardo fdez cuento 6ºaPablo gallardo fdez cuento 6ºa
Pablo gallardo fdez cuento 6ºa
ecosoler
 

Destacado (10)

Pablo gallardo fdez cuento 6ºa
Pablo gallardo fdez cuento 6ºaPablo gallardo fdez cuento 6ºa
Pablo gallardo fdez cuento 6ºa
 
IANS Connector Event Deck: Factor 2
IANS Connector Event Deck: Factor 2IANS Connector Event Deck: Factor 2
IANS Connector Event Deck: Factor 2
 
IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4
 
CHPROTFOLIO comp NEW
CHPROTFOLIO comp NEWCHPROTFOLIO comp NEW
CHPROTFOLIO comp NEW
 
What is an IANS Connector Event?
What is an IANS Connector Event?What is an IANS Connector Event?
What is an IANS Connector Event?
 
IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6
 
IANS 2015 RSA Presentation
IANS 2015 RSA PresentationIANS 2015 RSA Presentation
IANS 2015 RSA Presentation
 
IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
Bearing
BearingBearing
Bearing
 

Similar a The 7 Factors of CISO Impact

Microsoft Dynamics CRM - Solution Brief For A Finance Executive Overview
Microsoft Dynamics CRM - Solution Brief For A Finance Executive OverviewMicrosoft Dynamics CRM - Solution Brief For A Finance Executive Overview
Microsoft Dynamics CRM - Solution Brief For A Finance Executive Overview
Microsoft Private Cloud
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo
guiabusinessmedia
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
Chris Cornillie
 
ADP Human Capital Insights Magazine - Volume 2
ADP Human Capital Insights Magazine - Volume 2ADP Human Capital Insights Magazine - Volume 2
ADP Human Capital Insights Magazine - Volume 2
Mark Schmitt
 

Similar a The 7 Factors of CISO Impact (20)

Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
 
Microsoft Dynamics CRM - Solution Brief For A Finance Executive Overview
Microsoft Dynamics CRM - Solution Brief For A Finance Executive OverviewMicrosoft Dynamics CRM - Solution Brief For A Finance Executive Overview
Microsoft Dynamics CRM - Solution Brief For A Finance Executive Overview
 
Invest in Specialty Skills and Other Tips for Internal Audit Planning
Invest in Specialty Skills and Other Tips for Internal Audit PlanningInvest in Specialty Skills and Other Tips for Internal Audit Planning
Invest in Specialty Skills and Other Tips for Internal Audit Planning
 
infosec-it
infosec-itinfosec-it
infosec-it
 
Building a business case for expanding your AppSec Program
Building a business case for expanding your AppSec ProgramBuilding a business case for expanding your AppSec Program
Building a business case for expanding your AppSec Program
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused Leadership
 
ResoNova Company Introduction
ResoNova Company IntroductionResoNova Company Introduction
ResoNova Company Introduction
 
Trends in Technology for the year 2014
Trends in Technology for the year 2014Trends in Technology for the year 2014
Trends in Technology for the year 2014
 
5 questions to answer before partnering with growth companies
5 questions to answer before partnering with growth companies5 questions to answer before partnering with growth companies
5 questions to answer before partnering with growth companies
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
3 Questions Every Board Needs to Ask About Enterprise Risks
3 Questions Every Board Needs to Ask About Enterprise Risks 3 Questions Every Board Needs to Ask About Enterprise Risks
3 Questions Every Board Needs to Ask About Enterprise Risks
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo
 
Growing with Purpose: How to Improve Your Software Company's Evaluation
Growing with Purpose: How to Improve Your Software Company's EvaluationGrowing with Purpose: How to Improve Your Software Company's Evaluation
Growing with Purpose: How to Improve Your Software Company's Evaluation
 
From Startup To Success: Mastering Business Control For Growth By Ashish Agga...
From Startup To Success: Mastering Business Control For Growth By Ashish Agga...From Startup To Success: Mastering Business Control For Growth By Ashish Agga...
From Startup To Success: Mastering Business Control For Growth By Ashish Agga...
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
The Datafication of HR: Building your Business Case for Workforce Analytics a...
The Datafication of HR: Building your Business Case for Workforce Analytics a...The Datafication of HR: Building your Business Case for Workforce Analytics a...
The Datafication of HR: Building your Business Case for Workforce Analytics a...
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 
ADP Human Capital Insights Magazine - Volume 2
ADP Human Capital Insights Magazine - Volume 2ADP Human Capital Insights Magazine - Volume 2
ADP Human Capital Insights Magazine - Volume 2
 

Último

( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Último (20)

𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 

The 7 Factors of CISO Impact

  • 1. The 7 Factors of CISO Impact How does your information security team measure up?
  • 2. Gain Command of the Facts To build impact your team needs command of the facts: Which information assets matter and how safe are they? To get those facts, build a robust information security risk profile that assesses the state of the critical assets you promised to safeguard. Make it dynamic to embrace new assets, vulnerabilities, and technologies. Make the profile relevant with data from real company experiences.
  • 3. Get Business Leaders to Understand They Own Risk Business units own the customer, the data, and the related business risks. Information security is essentially just another business risk. The CISO and team must engage with business leaders to shift how they think and operate, putting information security in the role of guiding the business to manage and mitigate those risks.
  • 4. Every day your company deploys new software, commits to new vendors, launches new product initiatives, and considers mergers and acquisitions. Where does information security figure in? CISOs and their teams must get involved early to make a difference. Focus on embedding the right criteria and considerations into the processes that matter.
  • 5. Run InfoSec Like a Business Develop strong project, financial, and resource management practices. Gain credibility and earn the right to expanded budgets and resources with budgets that speak to business impact, highly productive teams, and predictable and transparent project management.
  • 6. Build a Technically Sound, Business-Capable Team CISOs can’t be everywhere at once. You need a team that has technical cred, the ability to hold business-level conversations, and the interpersonal skills to handle challenging interactions. You need to find and retain strong players for at least 3 to 5 years to have the impact you seek.
  • 7. Articulate and Communicate the Value Why would business leaders help you succeed? If they know ‘what’s in it for them’ -- if by helping information security they get closer to meeting their own goals. How would they know what’s in it for them? You tell them. The CISO and team must articulate and communicate the value they bring to the business.
  • 8. Organize for Success While it can be a sensitive topic, CISOs must consider how reporting relationships raise or lower their impact. Do they report to a risk function, at least dotted line? Do business unit personnel report to the corporate CISO? Where and when CISOs have the opportunity to set the table for maximum impact, they must make the case.
  • 9. Achieving Impact Take the CISO Impact Diagnostic and find out how you measure up, and how you can improve.