SlideShare a Scribd company logo
1 of 2
Download to read offline
4/29/22, 2:51 PM Four Crucial Steps CISOs Should Consider During Uncertain Times
https://itsecuritywire.com/featured/four-crucial-steps-cisos-should-consider-during-uncertain-times/ 1/2
Four Crucial Steps CISOs Should Consider During
Uncertain Times
Any time of destabilization in an increasingly linked, data-driven world has the potential to have unanticipated
effects on organizations, regardless of where they live or operate. If firms are to stay resilient in difficult times,
the CISO’s position as a vital friend, advisor, and subject matter expert remains crucial.
The COVID-19 situation has wreaked havoc on Chief Information Security Officers (CISOs) more than anybody else.
The worldwide pandemic has hastened the move to remote working arrangements, and although many people have
embraced the option to work remotely, it has also brought with it a slew of security concerns. Protecting the
corporate network is no longer enough; now every employee’s home provides a new access point for prospective
cyber-attacks.
So, what should the CISO do when a security issue occurs (which will undoubtedly happen), to demonstrate
meaningful value to the company? Here are a few actions that CISOs may take to go from reactive to proactive
mode and increase their organization’s ability to respond to threats.
Continue to keep an eye on the issue and report on it
CISOs must ascertain that the company has access to real-time intelligence updates and a constant picture of the
threat landscape. This does not have to imply a glut of information. Instead, CISOs should convey a manageable
amount of situational awareness without diluting the value of the message. Risks should be communicated in the
order of their importance. They need to highlight the efforts that have already been made to reduce identified risks,
and concentrate on the ones that are still awaiting executive action.
Use the right terminology for the target audience
CISOs must always offer context and terminology that is suitable, avoiding technical jargon. They should extend
the analysis of the danger to include the threats to the company’s objectives. In addition, they must avoid
employing FUD (fear, uncertainty, doubt) methods to shock parties into action, and don’t utilize the circumstance to
push their own agenda.
Also Read: Three Common Cloud Computing Threats CISOs Need to Be Aware of
By Umme Sutarwala - April 28, 2022
4/29/22, 2:51 PM Four Crucial Steps CISOs Should Consider During Uncertain Times
https://itsecuritywire.com/featured/four-crucial-steps-cisos-should-consider-during-uncertain-times/ 2/2
Problems and challenges should always be accompanied by solutions or the chance to ‘address the problem’
together.
Pay special attention to the resiliency of high-risk assets
CISOs need to determine and prioritize essential assets, resources, networks, and suppliers that are in danger of
being disrupted. They must work with their individual owners within the company to define duties for reducing
high-risk regions. Business cases (what alternatives are available, what is the best strategy, why does the
proposed approach make sense, and what value it will provide to the organization) should be used to support the
narrative, as should budget and resource requirements. Also, CISOs must work closely with diverse teams to
provide them with tools, training, and resources while keeping their culture and security maturity in mind.
Prepare the company for incident response
Businesses should be prepared and able to act quickly in the event of an interruption or disaster. Rehearsing
current response plans with senior executives and important stakeholders, and fine-tuning them if required, is
always a smart idea. Incident response plans must always cover a variety of scenarios as well as critical measures
to be performed in the event of a destabilization. A specific chain of command must also be included in the plan
so that the organization can quickly transition into reaction mode if necessary.
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for
more updates.
Umme Sutarwala
Umme Sutarwala is a Global News Correspondent with OnDot Media. She is a media graduate with 2+
years of experience in content creation and management. Previously, she has worked with MNCs in the
E-commerce and Finance domain

More Related Content

Similar to Four Crucial Steps CISOs Should Consider During Uncertain Times.pdf

IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
Chris Cornillie
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
Daren Dunkel
 

Similar to Four Crucial Steps CISOs Should Consider During Uncertain Times.pdf (20)

Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
infosec-it
infosec-itinfosec-it
infosec-it
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Four mistakes to avoid when hiring your next security chief (print version ...
Four mistakes to avoid when hiring your next security chief (print version   ...Four mistakes to avoid when hiring your next security chief (print version   ...
Four mistakes to avoid when hiring your next security chief (print version ...
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint Security
 

More from Enterprise Insider

More from Enterprise Insider (20)

Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdfFive Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
 
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdfDark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
 
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
 
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdf
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdfThree Strategies for Fostering Teamwork in a Hybrid Setting.pdf
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdf
 
Communication is Key to Addressing Ransomware and Extortion.pdf
Communication is Key to Addressing Ransomware and Extortion.pdfCommunication is Key to Addressing Ransomware and Extortion.pdf
Communication is Key to Addressing Ransomware and Extortion.pdf
 
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 
Why MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdfWhy MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdf
 
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdfFour Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
 
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdfWhy CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
 
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdfIndispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdf
 
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdfFive Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
 
How an Inclusive C-Suite Changes Organization Perspective.pdf
How an Inclusive C-Suite Changes Organization Perspective.pdfHow an Inclusive C-Suite Changes Organization Perspective.pdf
How an Inclusive C-Suite Changes Organization Perspective.pdf
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Four Crucial Steps CISOs Should Consider During Uncertain Times.pdf

  • 1. 4/29/22, 2:51 PM Four Crucial Steps CISOs Should Consider During Uncertain Times https://itsecuritywire.com/featured/four-crucial-steps-cisos-should-consider-during-uncertain-times/ 1/2 Four Crucial Steps CISOs Should Consider During Uncertain Times Any time of destabilization in an increasingly linked, data-driven world has the potential to have unanticipated effects on organizations, regardless of where they live or operate. If firms are to stay resilient in difficult times, the CISO’s position as a vital friend, advisor, and subject matter expert remains crucial. The COVID-19 situation has wreaked havoc on Chief Information Security Officers (CISOs) more than anybody else. The worldwide pandemic has hastened the move to remote working arrangements, and although many people have embraced the option to work remotely, it has also brought with it a slew of security concerns. Protecting the corporate network is no longer enough; now every employee’s home provides a new access point for prospective cyber-attacks. So, what should the CISO do when a security issue occurs (which will undoubtedly happen), to demonstrate meaningful value to the company? Here are a few actions that CISOs may take to go from reactive to proactive mode and increase their organization’s ability to respond to threats. Continue to keep an eye on the issue and report on it CISOs must ascertain that the company has access to real-time intelligence updates and a constant picture of the threat landscape. This does not have to imply a glut of information. Instead, CISOs should convey a manageable amount of situational awareness without diluting the value of the message. Risks should be communicated in the order of their importance. They need to highlight the efforts that have already been made to reduce identified risks, and concentrate on the ones that are still awaiting executive action. Use the right terminology for the target audience CISOs must always offer context and terminology that is suitable, avoiding technical jargon. They should extend the analysis of the danger to include the threats to the company’s objectives. In addition, they must avoid employing FUD (fear, uncertainty, doubt) methods to shock parties into action, and don’t utilize the circumstance to push their own agenda. Also Read: Three Common Cloud Computing Threats CISOs Need to Be Aware of By Umme Sutarwala - April 28, 2022
  • 2. 4/29/22, 2:51 PM Four Crucial Steps CISOs Should Consider During Uncertain Times https://itsecuritywire.com/featured/four-crucial-steps-cisos-should-consider-during-uncertain-times/ 2/2 Problems and challenges should always be accompanied by solutions or the chance to ‘address the problem’ together. Pay special attention to the resiliency of high-risk assets CISOs need to determine and prioritize essential assets, resources, networks, and suppliers that are in danger of being disrupted. They must work with their individual owners within the company to define duties for reducing high-risk regions. Business cases (what alternatives are available, what is the best strategy, why does the proposed approach make sense, and what value it will provide to the organization) should be used to support the narrative, as should budget and resource requirements. Also, CISOs must work closely with diverse teams to provide them with tools, training, and resources while keeping their culture and security maturity in mind. Prepare the company for incident response Businesses should be prepared and able to act quickly in the event of an interruption or disaster. Rehearsing current response plans with senior executives and important stakeholders, and fine-tuning them if required, is always a smart idea. Incident response plans must always cover a variety of scenarios as well as critical measures to be performed in the event of a destabilization. A specific chain of command must also be included in the plan so that the organization can quickly transition into reaction mode if necessary. For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates. Umme Sutarwala Umme Sutarwala is a Global News Correspondent with OnDot Media. She is a media graduate with 2+ years of experience in content creation and management. Previously, she has worked with MNCs in the E-commerce and Finance domain