SlideShare a Scribd company logo
Chief Security Officer
© COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
PLN9 Security Services Pvt. Ltd.
Complete Security Solution In Association With Tyco
Chief Security Officer
Chief Security Officer means what it sounds like: The CSO is the executive
responsible for the organization's entire security posture, both physical
and digital.
Information Technology
The title Chief Security Officer (CSO) was first used principally inside the
information technology function to designate the person responsible for
IT security. At many companies, the term CSO is still used in this way.
CISO, for Chief Information Security Officer, is perhaps a more accurate
description of this position, and today the CISO title is becoming more
prevalent for leaders with an exclusive info security focus.
Leader of the “Corporate Security"
The CSO title is also used at some companies to describe the leader of the
"corporate security" function, which includes the physical security and
safety of employees, facilities and assets. More commonly, this person
holds a title such as Vice President or Director of Corporate Security.
Historically, corporate security and information security have been
handled by separate (and sometimes feuding) departments.
Forms of Security
The merging all forms of security under a single organizational umbrella
has been a controversial approach at times. At a tactical level, technology
is being infused into physical security tools, which are increasingly
database-driven and network-delivered. At a practical level, CSOs say
a holistically managed security function can deliver better security at
lower cost. On the other hand, CSOs without a broad skill base can find it
challenging to overcome organizational inertia and politics to deliver on
that vision.
CSO Responsibility
The CSO will oversee and coordinate security efforts across the company,
including information technology, human resources, communications,
legal, facilities management and other groups, and will identify security
initiatives and standards. The candidate's direct reports will include the
chief information security officer and the director of corporate security
and safety.
Thank you

More Related Content

What's hot

School safety programme in India
School safety programme in IndiaSchool safety programme in India
School safety programme in India
Kunal Ashar
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
Camilo Fandiño Gómez
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
Jonathan Coleman
 
Information Security
Information SecurityInformation Security
Information Security
chenpingling
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
7wounders
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
Marc St-Pierre
 
Risk and Disaster - Challenge from a Global Perspective
Risk and Disaster - Challenge from a Global PerspectiveRisk and Disaster - Challenge from a Global Perspective
Risk and Disaster - Challenge from a Global Perspective
Global Risk Forum GRFDavos
 
Structural & non strutural mitigation
Structural & non strutural mitigationStructural & non strutural mitigation
Structural & non strutural mitigation
PRAVIN PARGHI
 
Tornado Presentation
Tornado PresentationTornado Presentation
Tornado Presentation
guest706ded
 
disaster management
disaster managementdisaster management
disaster management
13debojit
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Disaster management basic concepts
Disaster management basic concepts Disaster management basic concepts
Disaster management basic concepts
PREM N. MISHRA
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
Prof. David E. Alexander (UCL)
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
Bharath Rao
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
yuliana_mar
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
Cisco Canada
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
7wounders
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
AishaAL9
 

What's hot (20)

School safety programme in India
School safety programme in IndiaSchool safety programme in India
School safety programme in India
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
Information Security
Information SecurityInformation Security
Information Security
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Risk and Disaster - Challenge from a Global Perspective
Risk and Disaster - Challenge from a Global PerspectiveRisk and Disaster - Challenge from a Global Perspective
Risk and Disaster - Challenge from a Global Perspective
 
Structural & non strutural mitigation
Structural & non strutural mitigationStructural & non strutural mitigation
Structural & non strutural mitigation
 
Tornado Presentation
Tornado PresentationTornado Presentation
Tornado Presentation
 
disaster management
disaster managementdisaster management
disaster management
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Disaster management basic concepts
Disaster management basic concepts Disaster management basic concepts
Disaster management basic concepts
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 

Viewers also liked

TRG Mobile Development
TRG Mobile DevelopmentTRG Mobile Development
TRG Mobile DevelopmentDavid Walker
 
Selvia nurul qomari
Selvia nurul qomariSelvia nurul qomari
Selvia nurul qomari
34lilis
 
решение задания в6
решение задания в6решение задания в6
решение задания в6
irinadmitruk
 
Tourism demand analysis
Tourism demand analysisTourism demand analysis
Tourism demand analysis
Abdelaziz Lawani
 
6. nexcore alopex runtime
6. nexcore alopex runtime6. nexcore alopex runtime
6. nexcore alopex runtime
JinKyoungHeo
 
Volunteer Enrichment- Science Musuem of MN 2016
Volunteer Enrichment- Science Musuem of MN 2016Volunteer Enrichment- Science Musuem of MN 2016
Volunteer Enrichment- Science Musuem of MN 2016
kvanbooven
 
4-1. javascript
4-1. javascript4-1. javascript
4-1. javascript
JinKyoungHeo
 
Inauguration montauban
Inauguration montaubanInauguration montauban
Inauguration montauban
EtincelleCoworking
 
Filtración | tp n° 6 - Operaciones Unitarias
Filtración | tp n° 6 - Operaciones UnitariasFiltración | tp n° 6 - Operaciones Unitarias
Filtración | tp n° 6 - Operaciones Unitarias
Micaela Arenas
 
Segmentacion embriologia
Segmentacion embriologia Segmentacion embriologia
Segmentacion embriologia
diego paredes mejia
 

Viewers also liked (13)

TRG Mobile Development
TRG Mobile DevelopmentTRG Mobile Development
TRG Mobile Development
 
Bocetos dior
Bocetos diorBocetos dior
Bocetos dior
 
Selvia nurul qomari
Selvia nurul qomariSelvia nurul qomari
Selvia nurul qomari
 
решение задания в6
решение задания в6решение задания в6
решение задания в6
 
Rollsroyce mario scacco
Rollsroyce mario scaccoRollsroyce mario scacco
Rollsroyce mario scacco
 
Sumi
SumiSumi
Sumi
 
Tourism demand analysis
Tourism demand analysisTourism demand analysis
Tourism demand analysis
 
6. nexcore alopex runtime
6. nexcore alopex runtime6. nexcore alopex runtime
6. nexcore alopex runtime
 
Volunteer Enrichment- Science Musuem of MN 2016
Volunteer Enrichment- Science Musuem of MN 2016Volunteer Enrichment- Science Musuem of MN 2016
Volunteer Enrichment- Science Musuem of MN 2016
 
4-1. javascript
4-1. javascript4-1. javascript
4-1. javascript
 
Inauguration montauban
Inauguration montaubanInauguration montauban
Inauguration montauban
 
Filtración | tp n° 6 - Operaciones Unitarias
Filtración | tp n° 6 - Operaciones UnitariasFiltración | tp n° 6 - Operaciones Unitarias
Filtración | tp n° 6 - Operaciones Unitarias
 
Segmentacion embriologia
Segmentacion embriologia Segmentacion embriologia
Segmentacion embriologia
 

Similar to Chief Security Officer

Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
amiable_indian
 
infosec-it
infosec-itinfosec-it
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
Merlin Florrence
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
Claudia Warwar
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "
Bill Ross
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
PrernaThakwani
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
Anne ndolo
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
Robot Mode
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
John Budriss
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
Scott Smith
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
Timothy Warren
 
Finding a strategic voice
Finding a strategic voiceFinding a strategic voice
Finding a strategic voice
IBM India Smarter Computing
 
Insights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentInsights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer Assessment
IBM Security
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
Koen Maris
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
IOSR Journals
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
Armor
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
LearningwithRayYT
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
elinoraudley582231
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
AbdullahKanash
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
rabeetkashif
 

Similar to Chief Security Officer (20)

Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
infosec-it
infosec-itinfosec-it
infosec-it
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Finding a strategic voice
Finding a strategic voiceFinding a strategic voice
Finding a strategic voice
 
Insights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentInsights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer Assessment
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 

More from PLN9 Security Services Pvt. Ltd.

Port security
Port securityPort security
Patrolling
PatrollingPatrolling
Types of Security Services
Types of Security ServicesTypes of Security Services
Types of Security Services
PLN9 Security Services Pvt. Ltd.
 
Smms corporate presentation ppt
Smms corporate presentation pptSmms corporate presentation ppt
Smms corporate presentation ppt
PLN9 Security Services Pvt. Ltd.
 
Corporate Presentation (solar plants)
Corporate Presentation (solar plants)Corporate Presentation (solar plants)
Corporate Presentation (solar plants)
PLN9 Security Services Pvt. Ltd.
 
Physical Security
Physical SecurityPhysical Security
Negotiation Skill
Negotiation SkillNegotiation Skill
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
PLN9 Security Services Pvt. Ltd.
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
PLN9 Security Services Pvt. Ltd.
 
Motivational Skills
Motivational SkillsMotivational Skills
Types of Soft Skills
Types of Soft Skills Types of Soft Skills
Types of Soft Skills
PLN9 Security Services Pvt. Ltd.
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
PLN9 Security Services Pvt. Ltd.
 
How to Teach Soft Skills
How to Teach Soft SkillsHow to Teach Soft Skills
How to Teach Soft Skills
PLN9 Security Services Pvt. Ltd.
 
Campus Security
Campus SecurityCampus Security
Managing Conflicts @ Workplace
Managing Conflicts @ WorkplaceManaging Conflicts @ Workplace
Managing Conflicts @ Workplace
PLN9 Security Services Pvt. Ltd.
 
ATM Security Tips
ATM Security TipsATM Security Tips
Powerful Presentation Skills
Powerful Presentation SkillsPowerful Presentation Skills
Powerful Presentation Skills
PLN9 Security Services Pvt. Ltd.
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
PLN9 Security Services Pvt. Ltd.
 
'Leadership & Executive Coaching'
'Leadership & Executive Coaching''Leadership & Executive Coaching'
'Leadership & Executive Coaching'
PLN9 Security Services Pvt. Ltd.
 

More from PLN9 Security Services Pvt. Ltd. (20)

Port security
Port securityPort security
Port security
 
Patrolling
PatrollingPatrolling
Patrolling
 
Types of Security Services
Types of Security ServicesTypes of Security Services
Types of Security Services
 
Smms corporate presentation ppt
Smms corporate presentation pptSmms corporate presentation ppt
Smms corporate presentation ppt
 
Corporate Presentation (solar plants)
Corporate Presentation (solar plants)Corporate Presentation (solar plants)
Corporate Presentation (solar plants)
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Negotiation Skill
Negotiation SkillNegotiation Skill
Negotiation Skill
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Motivational Skills
Motivational SkillsMotivational Skills
Motivational Skills
 
Types of Soft Skills
Types of Soft Skills Types of Soft Skills
Types of Soft Skills
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
How to Teach Soft Skills
How to Teach Soft SkillsHow to Teach Soft Skills
How to Teach Soft Skills
 
Campus Security
Campus SecurityCampus Security
Campus Security
 
Managing Conflicts @ Workplace
Managing Conflicts @ WorkplaceManaging Conflicts @ Workplace
Managing Conflicts @ Workplace
 
ATM Security Tips
ATM Security TipsATM Security Tips
ATM Security Tips
 
Powerful Presentation Skills
Powerful Presentation SkillsPowerful Presentation Skills
Powerful Presentation Skills
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
'Leadership & Executive Coaching'
'Leadership & Executive Coaching''Leadership & Executive Coaching'
'Leadership & Executive Coaching'
 

Chief Security Officer

  • 1. Chief Security Officer © COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED PLN9 Security Services Pvt. Ltd. Complete Security Solution In Association With Tyco
  • 2. Chief Security Officer Chief Security Officer means what it sounds like: The CSO is the executive responsible for the organization's entire security posture, both physical and digital.
  • 3. Information Technology The title Chief Security Officer (CSO) was first used principally inside the information technology function to designate the person responsible for IT security. At many companies, the term CSO is still used in this way. CISO, for Chief Information Security Officer, is perhaps a more accurate description of this position, and today the CISO title is becoming more prevalent for leaders with an exclusive info security focus.
  • 4. Leader of the “Corporate Security" The CSO title is also used at some companies to describe the leader of the "corporate security" function, which includes the physical security and safety of employees, facilities and assets. More commonly, this person holds a title such as Vice President or Director of Corporate Security. Historically, corporate security and information security have been handled by separate (and sometimes feuding) departments.
  • 5. Forms of Security The merging all forms of security under a single organizational umbrella has been a controversial approach at times. At a tactical level, technology is being infused into physical security tools, which are increasingly database-driven and network-delivered. At a practical level, CSOs say a holistically managed security function can deliver better security at lower cost. On the other hand, CSOs without a broad skill base can find it challenging to overcome organizational inertia and politics to deliver on that vision.
  • 6. CSO Responsibility The CSO will oversee and coordinate security efforts across the company, including information technology, human resources, communications, legal, facilities management and other groups, and will identify security initiatives and standards. The candidate's direct reports will include the chief information security officer and the director of corporate security and safety.