The holiday season is upon us. Soon we will all be making those dreadful resolutions to exercise more, curse less, pet more puppies, and not scowl at happy people. You turn your head toward your work resolutions and realize you’ve been through 2 CISOs in 3 years. Is there a resolution for that?
STOP. I'm not here to make excuses for poor CISO performance, ignorance of protect surfaces and attack vectors, or lack of a DR strategy. Those are no-nos. But consider what department in your org is actively under attack while also trying to connect your teams to growing data, tooling, and automation needs, while dealing with everyday advances and changes in vendors and technologies?
What do I mean by actively under attack? If you are a company of more than $10M in revenue or are a vendor or sub-vendor for these types of companies, then YOU ARE A PRIME TARGET for nation-state players that strategize attacks against you, ‘hire’ hundreds of people with one mission, and orchestrate your demise complete with high-tech war rooms. You will be attacked; your defenses will be tested.
What your CISO is up against is no joke. CISOs are fighting a multi-front war: On one front, attackers who only have to find and exploit ONE vulnerability to win; on another front, needs of internal customers; and on another, scarce resources and thinning budgets.
If you are considering terminating your CISO, ask yourself whether you have given them the resources they need. Have you supported their policies for security training (the #1 vulnerability is the humans who work for you!)? Have you listened to their asks for tooling and external support?
One company we know had a CIO and CISO who repeatedly requested their board allow the purchase of a tool to assist with detection and recovery. Their CEO repeatedly denied the request. As Karma would have it, a few months later the company was hit by a nation-state actor. A series of fortunate accidents, intermingled with the team’s well-drilled paranoia and creativity helped them detect the attack. Then, in the heat of battle and with zero negotiating power they contracted with the vendor they had repeatedly requested. The total cost of the attack was >$10M in year-1 losses.
I have little room in my heart for people who don't work hard, aren’t accountable, or don't know their job. But, when you talk to your CISO, do you spend your time discussing your high-value assets and risks, or do you only focus on cost reduction strategies? What priorities do you set and measure each day? What budget is allocated to security? Is there board-level visibility for the security leaders and their issues? How are your IT and cybersecurity group viewed in your org – is it ‘the department of no’ or are they respected?
Your CISO is your company's security champion, and you are their arms dealer. They are fighting tanks, ninjas, and wizards. Whether they are perfect or not, you will be attacked. Plan on it. The questions to ask yourself are how will your CISO lead the recovery and how have you enabled them to limit the damage and recover successfully?