SlideShare a Scribd company logo
#RSAC
SESSION ID:
Stan Dolberg Phil Gardner
IANS Research - The 7 Factors of
CISO Impact
CXO-W01
Co-Founder, Chief Executive Officer
IANS
@IANS_Security
Head of Research
IANS
@IANS_Security
#RSAC
“It is the mark of an educated
mind to be able to entertain a
thought without accepting it.”
Aristotle
#RSAC
Phil
Stan
#RSAC
Helping information security
and IT risk professionals make
smarter decisions since 2001
Institute for Applied Network Security
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
60-65%
Foundational
25-30%
Transitional
5-10%
Executive
CISO
Impact
Quotient
(CIQ)
#RSAC
#RSAC
#RSAC
{ {&
#RSAC
{ {CISO Impact
#RSAC
The 7
Factors
of CISO
Impact
#RSAC
16
#RSAC
… safeguard
information
assets across
space and
time
THE PROMISE
… don’t
control
most of the
resources
THE ‘BUT’
… master
proactive
engagement
with the
business
THE ‘GOTTA’
#RSAC
Progress Starts with Assessment
Information Security
Organizational Engagement
CISO Impact
Technical Infrastructure
Information Security
Control Strength
Assessment Standards:
• ISO 27001
• NIST
• COBIT 5
• …
#RSAC
{ {CISO Impact
#RSAC
CISO
Impact
Diagnostic
Over 400 Completes in 200 days
75% Fortune 1000
1000 Completes EOY 2015
#RSAC
Defense / Military
Energy
Financial Services
Healthcare
Manufacturing
Public Sector / Non-Profit
Retail
Services
Technology
TelecomTransportation
FinanceServices
#RSAC
7%
31%
62%
Foundational
Executive
Transitional
CISO
Impact
Data
#RSAC
CISO
Impact
Quotient
(CIQ)
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
(Representative Set of Data)
#RSAC
7%of CISO Impact diagnostics
that scored
Executive
Finance
Breaking down the
#RSAC
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Foundational
Transitional
Executive
#RSAC
32%of respondents are
in Financial Services...
...yet Financial Services comprises
52% of Executive CIQ
#RSAC
What’s Your
CISO Impact
Quotient
(CIQ)?
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
#RSAC
What’s
Your
CIQ Goal?
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
Factor 1: Gain Command of the Facts
 Acquire the data on information
assets to support a company-
specific risk profile
 Build a consensus with the
business on what matters and on
the impact of compromise
 Develop a robust planning tool
including company and industry
data to provide an outlook
#RSAC
Who has
Command
of the
Facts?
Defense/Military
Energy
Financial Services
Healthcare
Manufacturing
Public Sector NFP
Retail
Services
Technology
Telecommunications
Transportation
Factor 2: Get Business Leaders to Own Risk
 Educate / advocate for the mind-
shift that business owns InfoSec
risk
 Build key alliances with the
business to gain a foothold
 Run exercises, games, and
simulations to make it personal
 Develop strong stewardship policies
and follow-through tools
#RSAC
…walking the tightrope
Factor 3: Embed into Key Processes
 Embed safe coding practices into
software development processes
 Wire criteria into vendor due
diligence
 Build consultations into new
business initiatives
 Work your way to the front-end
of mergers and acquisitions
#RSAC
Technology
Manufacturing
Defense
Factor 4: Run Infosec Like a Business
 Develop financial discipline to
tie budgets to business impact
 Culture sophisticated resource
management skills
 Build strong project
management capabilities within
InfoSec
#RSAC
Factor 5: Technical and Business-Capable Team
 Change the game with
competency models that
balance technical, business,
and interpersonal skills
 Apply models & lay out career
paths to retain those who can
represent the CISO
 Invest in leadership and
management development for
the CISO and directs
#RSAC
Creative Strong Communicator
& Listener
Positive
Story teller
Collaboration Able to execute
Humor
Conflict resolution
Factor 6: Communicate the value
 Build a value proposition for
how InfoSec helps the company
grow and win
 Proactively and consistently
communicate that value
 Engage with stakeholders to
learn how to express the value
in terms with meaning to them
#RSAC
Factor 7: Organize for Success
 How stretched thin is InfoSec
between day to day ops and
strategy / policy / architecture?
 CISO and BISO reporting?
Technology?
 Dotted line reporting outside
tech?
 Mechanisms that put CISO and
team in direct contact with
leaders?
#RSAC
95% of Foundational
CISOs Report to
Technology
40% of Executive
CISOs Report
to Technology
#RSAC
{ {&
#RSAC
The 7
Factors
of CISO
Impact
#RSAC
What’s Your
CIQ Goal
(now)?
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
Take the CISO Impact Diagnostic
 25 questions / 20 minutes
 Get instant feedback on how you measure up in your industry
 Register to get an in-depth report
Embark on your CISO Impact Journey
https://rsa.iansresearch.com/
https://rsa.iansresearch.com/
THANK YOU
Questions?
©2015 IANS All Rights Reserved

More Related Content

Viewers also liked

Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
nooralmousa
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
Bill Burns
 
The CIO & CISO - Shoulder To Shoulder
The CIO & CISO - Shoulder To ShoulderThe CIO & CISO - Shoulder To Shoulder
The CIO & CISO - Shoulder To Shoulder
Vishal Kapoor
 
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?
North Texas Chapter of the ISSA
 
Emotional intelligence at the workplace day 1
Emotional intelligence at the workplace  day 1Emotional intelligence at the workplace  day 1
Emotional intelligence at the workplace day 1
Fabian Thomas
 

Viewers also liked (9)

Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 
The CIO & CISO - Shoulder To Shoulder
The CIO & CISO - Shoulder To ShoulderThe CIO & CISO - Shoulder To Shoulder
The CIO & CISO - Shoulder To Shoulder
 
Keith Fricke - CISO for an Hour
Keith Fricke - CISO for an HourKeith Fricke - CISO for an Hour
Keith Fricke - CISO for an Hour
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO Series
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISONTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISO
 
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?
 
Emotional intelligence at the workplace day 1
Emotional intelligence at the workplace  day 1Emotional intelligence at the workplace  day 1
Emotional intelligence at the workplace day 1
 

Similar to IANS 2015 RSA Presentation

The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
IANS
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
tlinde
 

Similar to IANS 2015 RSA Presentation (20)

The five secrets of high performing cisos
The five secrets of high performing cisosThe five secrets of high performing cisos
The five secrets of high performing cisos
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Less tech more talk the future of the ciso role
Less tech more talk the future of the ciso roleLess tech more talk the future of the ciso role
Less tech more talk the future of the ciso role
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employees
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
Ten Tenets of CISO Success
Ten Tenets of CISO SuccessTen Tenets of CISO Success
Ten Tenets of CISO Success
 
Partnership with a CFO: On the Front Line of Cybersecurity
Partnership with a CFO: On the Front Line of CybersecurityPartnership with a CFO: On the Front Line of Cybersecurity
Partnership with a CFO: On the Front Line of Cybersecurity
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
 
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security DollarsHacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
RWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance FrameworkRWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance Framework
 
Top 10 SOAR companies from 2022 December2022.pdf
Top 10 SOAR companies from 2022 December2022.pdfTop 10 SOAR companies from 2022 December2022.pdf
Top 10 SOAR companies from 2022 December2022.pdf
 
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To CiroDon't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
 
Threat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty TrainingThreat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty Training
 

More from Andrew Sanders

More from Andrew Sanders (6)

IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6
 
IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5
 
IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4
 
IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3
 
IANS Connector Event Deck: Factor 2
IANS Connector Event Deck: Factor 2IANS Connector Event Deck: Factor 2
IANS Connector Event Deck: Factor 2
 
What is an IANS Connector Event?
What is an IANS Connector Event?What is an IANS Connector Event?
What is an IANS Connector Event?
 

Recently uploaded

一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 

Recently uploaded (12)

一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 

IANS 2015 RSA Presentation