Most Effective CISOs Have Business Background, Says IBM Security Leader

  /     /     /  
Publicated : 22/11/2024   Category : security


Most Effective CISOs Have Business Background, Says IBM Security Leader


Knowing how to manipulate the corporate system is more important than techie cred.



Dont feel insecure about your lack of a heavy technical background, CISOs, because the most successful CISOs are those with a business background, said Kris Lovejoy, general manager of IBM Security Services, at an IBM security leadership forum Wednesday.
Lovejoy provided a preview of research IBM conducted about the state of the CISO; the full report will be released next month. Among the findings: Most CISOs report into IT (and the CIO) because thats where the money is, while others are reporting to their CEO, chief operating officer, or chief administrative officer.
The reporting structure is one of the reasons that CISOs coming from the business side are more effective, says Lovejoy, because they know how to manipulate the system and get things done despite the challenges of organizational politics or bureaucracy.
Sixty-three percent of the enterprises included in the study have a dedicated CISO. Lovejoy said this number was too low. Its such a nascent career, she said, and that scares me.
Theyre not getting it from magical means, but rather through human error. Therefore, she advised CISOs to focus on the end-users, by building a culture of security awareness and hardening endpoints.
Other advice: Dont fool yourself that your organization is not using cloud services. Talk to your CMO, advised Lovejoy, because most of the projects that employ third-party cloud services (often for website building or hosting) are run by the marketing department.

Last News

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security

▸ Homeland Security Background Checks Breach Raises Concerns. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Most Effective CISOs Have Business Background, Says IBM Security Leader