Skip links

security

CISO Dr Ozkaya

6 Facts you need to know about CISO’s – Free Guide

What is a CISO ?

A CISO, or Chief Information Security Officer, is primarily responsible for an organization’s cyber security initiatives. CISOs are technologists, who can participate in high-level initiatives as business strategists. CISO’s ensure that IT systems comply with security and regulatory requirements. In summary a C(I)SO is the top Cyber executive of an organization. The Role CISO requires a combination of technical and soft skills, such as business acumen, leadership, communications and relationship building.

WHAT EXACTLY IS A CISO ?

Before we dive deep into the nuances of cyber chiefs’ career paths, it’s important to understand the nature of the role. So here is the 6 Facts you need to know about CISO role :

  • Trusted “security” advisor – As a CISO you need to translate technical matters into the language of the business – helping non technological executives and boards understand the technical matters and help them make risk-informed decisions confidently
  • Strategist – As a CISO, you need to get involved setting goals, determining actions to achieve the goals, and mobilizing resources to execute the “prioritized”  actions which needs to be tightly linked to businesses strategy.
  • Leader – As a CISO you need to have leadership skills not just to build an inspired and bonded diverse team  but also set an example as a role model to create culture of constant learning, innovation, and active collaboration.
  • Modern Marketer –Modern marketing is the ability to harness the full capabilities of the business to provide the best experience for the customer and thereby drive growth. As a CISO you need to evangelize cybersecurity capabilities to regulators, client prospects, insurers, and business partners — helping win new business, lower cost of capital, and maintain the license to operate.
  • Change agent – CISO’s should be able to create a cyber culture where everyone in the organization understand cyber risks and help you to mitigate them
  • Influencer – CISO’s should be able to influence critical stakeholders to support the cybersecurity transformation.
CISO : Cybersecurity Leadership Demystified by Erdal Ozkaya
CISO : Cybersecurity Leadership Demystified

How to Become a CISO

There is no direct path to the CISO role. While this is true, its really important to hire the right talent. Being a CISO used to be a hard core cybersecurity role, however, the function of the CISO involves much more business leadership and risk management.

Today, a CISO must be able to help executives at C-suite level to understand risk as it is about bits. CISOs in any enterprise organization must-have skills to be able explain security for non techies, build and maintain critical relationships and communicate at both senior and operational levels. Soft skills are critical to evangelizing security initiatives and celebrating wins, which need to be expressed as business outcomes.

Soft skills are critical to evangelizing the agenda and celebrating wins, which need to be expressed as business outcomes. The CISOs who can develop those skills can ‘sell security’ to their peers and other business line executives. So who can become a CISO ?

  • Experienced techies, such as cybersecurity architects, network security engineers, or IT Security Managers
  • An experienced technology risk manager
  • A CIO or technology leader with extensive experience building high performing teams, driving digital transformation, and sitting on executive committees

Who should not become a CISO

As a trusted security advisor in the past, I met many CISO’s who had no clue about cybersecurity, and unfortunately those CISO’s needed  the most help . CISO’s should not be just hired based on experience in the company, or for just being a program delivery manager. CISO’s are much more then just a delivery manager , politician or someone who is network well to get the “hot” seat which pays well. Mark my words, the organizations they follow tis path will have ex CEO’s which blame interns for using weak passwords.  ( Read the news article here : https://edition.cnn.com/2021/02/26/politics/solarwinds123-password-intern/index.html )

I met many CISO’s depending on our “advisory” or they were great leaders but had no clue of “what was exactly happening in cyber landscape”

Areas of focus for a CISO

CISO -Cybersecurity Hero Erdal

CISO Responsibilities

Some of the day to day tasks of CISO’s are :

Security Operations
Real-time analysis of immediate threats, and triage when something goes wrong.

Cyber-risk and Cyber Intelligence
Keeping abreast of developing security threats, and helping the board understand potential security problems that might arise from acquisitions or other big business moves.

Data Loss and Fraud Prevention
Making sure internal staff doesn’t misuse or steal data

Security Architecture
Planning, buying, and rolling out security hardware and software, and making sure IT and network infrastructure is designed with best security practices in mind.

Identity and Access management
Ensuring that only authorized people have access to restricted data and systems.

Program Management
Keeping ahead of security needs by implementing programs or projects that mitigate risks—regular system patches, for instance.

Investigations and Forensics
Determining what went wrong in a breach, dealing with those responsible if they’re internal, and planning to avoid repeats of the same crisis.

Governance
Making sure all of the above initiatives run smoothly and get the funding they need—and that corporate leadership understands their importance.

CISO Responsibilities: 
  • A CISO is appointed to provide cyber security leadership and guidance for their organisation.
  • The CISO within an organisation is typically responsible for providing strategic-level guidance for their organisation’s cyber security program and ensuring compliance with cyber security policy, standards, regulations and legislation. They are likely to work with a Chief Security Officer, a Chief Information Officer and other senior executives within their organisation.
  • The CISO oversees their organisation’s cyber security program and ensures their organisation’s compliance with cyber security policy, standards, regulations and legislation.
  • The CISO regularly reviews and updates their organisation’s cyber security program to ensure its relevance in addressing cyber threats and harnessing business and cyber security opportunities.
  • The CISO implements cyber security measurement metrics and key performance indicators for their organisation.
  • The CISO coordinates cyber security and business alignment through a cyber security steering committee or advisory board, comprising of key business and ICT executives, which meets formally and on a regular basis.
  • The CISO coordinates security risk management activities between cyber security and business teams
  • Overseeing incident response activities
  • Contributing to business continuity and disaster recovery planning
  • Developing a cyber security communications strategy
  • Working with suppliers and service providers
  • Receiving and managing a dedicated cyber security budget
  • Overseeing cyber security personnel
  • Overseeing cyber security awareness raising

CISO : Cybersecurity Leadership Demystified by Erdal Ozkaya

My new book will , which is planned to be published in 2021 will be a desk reference book for CISO’s and everyone who wants to be CISO….

You can find the details at  Amazon (when ready) :

You can find the details at  Packt (when ready) :

 

The Essential 7 for CISO role?

As  CISO – especially in a new organization – you need to balance between a Cybersecurity guru and business acumen.  Of course you will need to start creating a cybersecurity strategy – or revise it if it exists – creating a budget , build your team but also spend time o manage the expectations of your stakeholders.

  1. Do you know what are you doing in your next 100 days  Do you know all your assets ,  crown jewels – are they reflected in your 100 days plan ?
  2. What is your Incident Response Plan? Are you ready to recover from a cyber attack ? Did you asses the organization and presented the finding to the board?
  3.  Are you up to date ? Did you prioritize the  essential 10-15 critical few key controls, are they tested and ready for coverage and maturity?
  4. What is your scope? Are roles and responsibilities defined in writing and assigned to accountable executives and their teams ?
  5. Do you have a measurable cyber-resilient culture change program in place ? Don’t forget its CISO’s priority to work with the CEO/ Board and create a cyber culture organization wide , with Assume Breach in mind
  6. Do you know your key customers ? Did you start to reach them out and build / strengthen relation?
  7. Create / define your partners ! Leverage new innovations

CERTIFICATIONS

While certifications are good to show what you know, keep in mind that certifications don’t make one a stronger professional. Certifications won’t turn a CISO candidate from analyst to C-suite dweller overnight. But what they can do is offer expertise across the many areas CISOs must have basic knowledge of, if not in-depth expertise

  • EC Council CCISO
  • SANS Leading Cybersecurity Change , Build a Security based culture
  • SANS  Security Leadership Essentials for Managers

Based on a study by Digital Guardian 53 of the Fortune 100 CISOs held the CISSP (certified information systems security professional by (ISC)²) certification and 22 held the CISM (certified information security manager by (ISC)²) . The top five certifications held by Fortune 100 CISOs include CISSP, CISM, ITIL, CISA (Certified Information Systems Auditor  by ISACA) and CRISC (Certified in Risk and Information Systems Control).

In Summary :

The CISO is the guardian of the organization, who build the cyber strategy be the advisor to the board and who is still a technical  executive. CISO is also known as  CSO  (Chief Security Officer ) and VP of security.

The demand for business-centered technical CISOs will continue to grow, as having the right CISO will provide assurance to companies their strategic business partners, regulators, and customers that their cybersecurity capabilities are robust and fit for purpose.

And I for sure recommend you to aim to be a CISO as data breached soar, so will CISO’s paychecks.

If you want to learn more on how to be a CISO wait for my new book which should be published in Q4 2021. Continue reading 6 Facts you need to know about CISO’s – Free Guide

DevSecOPs

4 Benefits of Development Security Operations

Benefits of Development Security Operations DevSecOps , short for development, security, and operations —automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery. Learning institutions are continually releasing developers into the world. However, most of these institutions only focus on teaching developers […]

Windows 10 Security in Real Life

Windows 10 Security in Real Life

As a Network Administrator, do you wonder how Windows 10 can help you protect against everyday security threats? Join popular experts Erdal Ozkaya and Raymond Comvalius for an in-depth look at the most secure Windows ever, and see how to put the new features to work for you right away, as you build up your Windows 10 security skills. Start with a look at how the security landscape is different today, and then take a look at how to protect your systems at the device level. See a demo of secure logon with Windows Hello and Credential Guard. Learn to protect your data with Windows Information Protection and Conditional Access. Plus, find out how Windows Defender Advanced Threat Protection can help you to detect, investigate, and respond to Advanced Persistent Threats.

 

Digital Banking and Security Conference Erdal Ozkaya Azerbaijan

Digital Banking and Security Conference in Azerbaijan 17 – Join for FREE

Digital Banking and Security Conference

Happy to announce that I will be doing a keynote at the Digital Banking & Security Conference in Azerbaijan, I am looking forward to meet many friends as well our valued customers… If you want to meet me while I am there please reach out to your Microsoft account team to book a meeting

For more Free Events

https://www.erdalozkaya.com/category/free-events/

Continue reading Digital Banking and Security Conference in Azerbaijan 17 – Join for FREE

Secutity

Security in the Enterprise

Security in the Enterprise Course Review: Security in the Enterprise Another very popular course is Security in the Enterprise, instructed by Simon May and Erdal Ozkaya. This course is for those who wish to find out how cybercriminals operate. A good security professional knows that in order to provide the best possible defense, one must learn […]

KempMVP

Exchange and Load Balancing ( Free Video 2 )

Exchange and Load Balancing MVP Erdal Ozkaya talks about Exchange Microsoft MVP Erdal Ozkaya talks to KEMP technologies  Norbert Kiss about deploying Microsoft Lync, Exchange and web applications with a look into high availability and security with a Load Balancer/Reverse Proxy and recent deployments in Australia, Singapore, Hong Kong, New Zealand and the Philippines.  

Feedback 16

Troy Hunt talks I’ve seen, that have inspired me

Troy Hunt talks I’ve seen, that have inspired me Troy Hunt, an Australian IT Professional, who has a bright future in front of him. If you still don’t know him, I highly recommend to follow him at Twitter and keep an eye on his Personal blog. He is sharing not just great information but also […]

MCT Summit Erdal

MCT Summit Stockholm – 2011

MCT Summit

The MCT Summit (MCT standing for Microsoft Certified Trainer) is an opportunity for MCTs around the nation to meet, learn about new technologies, and grow as instructors and presenters through many professional development presentations and classes.

This year I had 2 session to present for my MCT peers:

  • Halt Hackers MCT Edition
  • Windows Intune, what you need to know

It was great to be with the MCT’s in Stockholm, Sweden ; and I am really pleased to get the wonderful feedback from my peers. Hopefully with their support our Security community will grove . As I always say WE ARE BETTER TOGETHER

MCT Summit Erdal
MCT Summit Erdal
http://www.iamct.org/summit/2011

More MCT Related Blog Posts  Continue reading MCT Summit Stockholm – 2011

Explore
Drag