Defining the position of the lead security person in an enterprise can be a challenging and sometimes confusing task. There are various job titles such as; Chief Security Officer (CSO), Chief Risk Officer, Chief Information Security Officer (CISO), V.P., IT Security, V.P., or Director of Information Security. Regardless of titles or functional position, the lead role in a security organization is expected to wear many hats and solve a myriad of strategic, operational, and tactical problems.
Data security | Vendor management | Budgeting & forecasting | Network systems security | Disaster Recovery (DR) |
Application security | Identity & Access Management (IAM) | Vulnerability Management (VM) | Data storage | Business Continuity (BC) |
Cloud enabled solutions – SaaS, IaaS, PaaS | Policy & controls development with implementation | Managing enterprise risk tolerance | Communicating to executives and board members | Human resource leadership |
Incident Response Planning (IRP) | Multi-year security architecture planning | Audit management & support | Breach mitigation | Keep current with leading-edge security solutions |
Couple the above list of security initiatives with the below statements about the environments that security leaders are placed into, and you quickly realize a practical yet manageable shift is needed. Today’s information security leaders are faced with:
The new leader in information security must be envisioned as a leader integrator. This person accepts the responsibilities and accountabilities of the position but leads and manages with a higher order of thinking. The position requires an individual that can zoom in on the technical discussion to solve tactical problems while comfortably collaborating and communicating with top executives. Security leaders today should be viewed as change agents, culture builders, transformers, visionaries yet able to keep their fingers on the tactical pulse of the enterprise’s security posture. Their position relative to the enterprise should have transparency to the executive team. The ability to present security information to direct reports or during a board meeting at a level understood by the audience is of vital importance to the overall risk management of the business. The new leader integrator for operational security is proactive with the following:
The new information security leader understands that security transcends technology. Technology is the enabler to business yet security is the overarching business operations protection program. Tomorrow’s security leaders will be required to effectively and efficiently integrate people, processes, and leading-edge technologies to ensure a consistently relevant security posture for the business. This requires business acumen and the ability to think critically to solve complex problems. The time is now for security leaders of tomorrow to approach security as a business problem first, followed by the supportive skill sets, business processes, and technologies required for securing the enterprise.
This website uses cookies.