Community Pick: Many members of our community have endorsed this article.

How the CISO Can Build Support from Senior Management

Muneeb Imran ShaikhInformation Security Strategy, Governance & Risk Consultant
CERTIFIED EXPERT
Strategy, Governance & Risk Consultant | Cyber Threat Intelligence Specialist | Privacy ISO27701 LI |ISO 27001 LI | COBIT 2019
Published:
Updated:
Edited by: David Draper
Importance of appropriate Senior Management support for Cybersecurity and what is required to elicit the desired support.

Article initially published by ISACA at below ink:
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/how-the-ciso-can-build-support-from-senior-management
Trust is the cornerstone of any relationship. It is built and nurtured progressively based on many factors. When we as a customer decide to choose product or service โ€œAโ€ over โ€œB,โ€ it is based primarily on the perception of our trust that we place in that product or service provider. This trust, whether in its infancy or more developed, can grow or completely shatter due to unmet expectations.

Information security Leadership plays a critical role in the establishment and maintenance of trust through the confidentiality, integrity and availability of the information systems and the data contained within. The executive leadership of any organization is responsible for keeping that trust at optimum levels. 

Information security and privacy are newly pronounced points of emphasis for some organizations. To fully attain the objectives of  security strategy, the support from senior executive management outside security divisions is extremely important.

However, the question remains: What kind of support is required by chief information security officers and how can they elicit that support?

๐—ช๐—ต๐—ฎ๐˜ ๐—น๐—ฒ๐˜ƒ๐—ฒ๐—น๐˜€ ๐—ผ๐—ณ ๐˜€๐—ฒ๐—ป๐—ถ๐—ผ๐—ฟ ๐—ฒ๐˜…๐—ฒ๐—ฐ๐˜‚๐˜๐—ถ๐˜ƒ๐—ฒ ๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐˜€๐˜‚๐—ฝ๐—ฝ๐—ผ๐—ฟ๐˜ ๐—ฎ๐—ฟ๐—ฒ ๐—ฟ๐—ฒ๐—ฎ๐—น๐—น๐˜† ๐—ป๐—ฒ๐—ฒ๐—ฑ๐—ฒ๐—ฑ?

The word support has unfortunately been reduced to a clichรฉ. The Chief Information Security Officers are often too happy with the assurances provided by their respective heads (CEOs, CROs, etc.) to have the โ€œbest securityโ€ in place to secure the business. 

Fundamentally, the notion of having the "best security" is not appropriate by any means. The term โ€œbest securityโ€ is subjective in nature and in having the โ€œbest securityโ€ in place, the security may begin to strangulate the business. This negatively affects the velocity of business operations. Thatโ€™s when friction begins to creep in, leaving aside the initial assurances related to security.

What follows is a fundamental question about how much security is enough. The answer lies in the phrase โ€œjust enough securityโ€ fit for the business, so that security does not end up harming the business. This requires you to carefully craft a security strategy with inputs from relevant stakeholders outside the security division.

Once the security strategy is developed and approved, then the question of support comes into play. The support that CISOs need from this stage onward is the unwavering support that stems from having clarity about strategic security objectives and the determination to pursue to those objectives.

The execution of information security strategy often spans three years. It is natural to have various roadblocks during this time which can drain the energy levels of stakeholders and the teams executing the strategic information security initiatives. 

It is during these moments, that the determination of the executive management is tested.
These are moments when clarity of vision, mission and strategic objectives around information security play a pivotal role in sustaining the energy and momentum necessary to execute the strategy.

This unwavering support for the information security program is the kind of the support that CISOs should be looking for from the executives they report to.  This is how they are able deliver the expected information security services to the business and help the business establish and maintain the trust promised to their customers.

๐—˜๐—น๐—ถ๐—ฐ๐—ถ๐˜๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—ฑ๐—ฒ๐˜€๐—ถ๐—ฟ๐—ฒ๐—ฑ ๐˜€๐˜‚๐—ฝ๐—ฝ๐—ผ๐—ฟ๐˜

We explored above what it means to have appropriate support from senior executive management that goes beyond words and a surface-level understanding of security objectives. However, considerable effort needs to be put into place to elicit this desired support.

It is imperative to understand that in any given organizational environment, there are often multiple silent battles going on between organizational divisions. These battles are not necessarily based on malice but on how strategic business objectives should be pursued.
In the battle of narratives, it is often that the wrong story and premise wins the battle. This is because the correct narratives are not appropriately presented and substantiated with facts, providing primary, secondary and tertiary level details to supplement the premise.

It is important therefore, to understand that narratives around information security must be well crafted and supported by facts and empirical analysis, presenting security as an enabler of the business rather than a force that creates obstacles in business pathways.

When security acts as an enabler in the attainment of strategic objectives, it begins to demonstrate and inspire trust, reliability and accountability through its governance and risk management. This allows security to earn credibility, a good reputation and trust among the senior executive management, and give due value to concerns raised by security. 

The challenge of insufficient budget allocation for security is a common one. These concerns expressed by security leaders are often valid โ€“ however, this sometimes stems from other issues like the reputation around security teams, the level of trust with executive leadership and how well security enabled the business in previous ventures.

CISOs may get the desired security budget, but if they do not understand or set clear expectations on how security will enable the business, then they cause immense damage to the entire security division and its narrative. Therefore, allocation of budget has to be dealt with strategically; by progressively building the reputation of the security team. We as CISOs can ask for our desired budget consistent with realistic approaches, best practices and the needs of the business.

Remember that trust is earned over a period of time through consistent efforts and taking the right approach. The pain that needs to be endured during this journey to develop trust in security is needed to work toward a more ideal state for the CISO and the security team.

It is imperative for the Cybersecurity Leadership to understand these challenges and utilize their resources in an efficient manner to earn the trust in the eyes of Executive Management which will further enable the security leadership to attain their objectives.
3
598 Views
Muneeb Imran ShaikhInformation Security Strategy, Governance & Risk Consultant
CERTIFIED EXPERT
Strategy, Governance & Risk Consultant | Cyber Threat Intelligence Specialist | Privacy ISO27701 LI |ISO 27001 LI | COBIT 2019

Comments (0)

Have a question about something in this article? You can receive help directly from the article author. Sign up for a free trial to get started.