{"id":14547,"date":"2018-10-25T18:23:04","date_gmt":"2018-10-25T12:53:04","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=14547"},"modified":"2018-10-25T18:25:55","modified_gmt":"2018-10-25T12:55:55","slug":"ciso-report","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/ciso-report\/14547\/","title":{"rendered":"What it takes to be a CISO: Success and leadership in corporate IT security"},"content":{"rendered":"<p>How do people working in a Chief Information Security Officer (CISO) position or its equivalent view cybersecurity? Which problems do they face? To learn the answers to those questions, Kaspersky Lab surveyed 250 security directors from around the world. Their opinions are very interesting, although I cannot say that I totally agree with all of my colleagues.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/10\/25055109\/ciso-report-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/10\/25055109\/ciso-report-featured.jpg\" alt=\"\" width=\"1460\" height=\"958\" class=\"aligncenter size-full wp-image-24389\"><\/a><\/p>\n<p>Let\u2019s look at the question about measuring the key performance indicators for a CISO. It is no surprise that most respondents said that their main job criterion is the quality and speed of incident response handling. In modern businesses, people tend to stop thinking of cyberincidents as failures of security. It is good to see that most specialists are beginning to understand that incidents are inevitable, even normal. Today, cybersecurity is primarily about the survival of the company.<\/p>\n<p>By survival, I mean having a level of protection that can guarantee that in the case of an <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener\">advanced persistent threat attack<\/a>, data leakage, or a massive DDoS, a company can restore itself without serious damages or lose no more than a predefined minimum. In other words, today\u2019s CISOs focus on incident response.<\/p>\n<p>On the one hand, that is really great. Just a couple of years ago, a \u201czero incident\u201d view of cyberprotection prevailed, and businesses thought that CISOs should be able to shield infrastructure from incidents with an iron-clad guarantee. But on the other hand, focusing solely on reactive technologies is no better. As I see it, CISOs must strike a balance. All elements of <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/asa-key-to-true-cybersecurity\/\" rel=\"noopener nofollow\">adaptive security architecture<\/a> are important: prevention, detection, response, and prediction.<\/p>\n<h2>Talking about risks<\/h2>\n<p>Most of the CISOs agree that the biggest risk to an organization after a breach is reputational loss. With that, I totally agree. I would answer the same way. Reputational damage is the basis of all other incident consequences \u2014 falling stocks, client confidence, sales, and so forth.<\/p>\n<p>Reputation is the real reason we do not hear a thing about the majority of security incidents. If a company can conceal a cyberincident, it does \u2014 although in some countries, laws require companies to disclose any information about security problems to their shareholders or clients.<\/p>\n<p>Apparently, CISOs see differences in the motives of cybercriminals and can tell state-sponsored attacks from financially motivated crimes. But as for me, I would place insider attacks at the top. In terms of losses, they are the most dangerous \u2014 and experience has proved a dishonest employee can potentially cause a lot more damage then external malefactors.<\/p>\n<h2>Influence on business decisions<\/h2>\n<p>It was interesting to see how security directors are involved in making business decisions. I was surprised to learn that not all considered themselves adequately involved. But what do they consider \u201cadequate\u201d?<\/p>\n<p>Essentially, there are two strategies. Security can control every step the business takes, approving each move. Alternatively, they can serve as a consultant, with the business asking if its way is OK.<\/p>\n<p>At first glance, total control seems more effective \u2014 and it would be, if cybersecurity was a goal in itself. In reality, that approach requires a lot more staff, and it slows business development. That can be particularly challenging for innovative companies that use business processes that do not yet have best practices for protection.<\/p>\n<h2>Budget justification<\/h2>\n<p>The answers to the question \u201cWithout a clear ROI, how do you justify your budget?\u201d upset me. It appears that the most popular means of justification are scare tactics \u2014 cybersecurity breach reports and evaluations of damages done to the company by past attacks. Yes, that works \u2014 the first time, and maybe the second. But when the third time comes around, the answer will be more like \u201cOK, that was scary. How do others manage things?\u201d<\/p>\n<p>It is more relevant for the business to learn about the experiences of other companies. Unfortunately, \u201cIndustry benchmarks and best practices\u201d ranked seventh in the arguments list, although such information can be found in the open. For example we have a useful tool: our <a target=\"_blank\" href=\"https:\/\/calculator.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_CISO_organic&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_link_blog_CISO\" rel=\"noopener nofollow\">IT Security Calculator<\/a>.<\/p>\n<p>This study provides a lot of food for thought. You can dig into the complete report <a href=\"https:\/\/www.kaspersky.com\/blog\/ciso-report\/24288\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=in_CISO_organic&amp;utm_content=link&amp;utm_term=in_kdaily_organic_link_blog_CISO#report\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<div class=\"jsBrightTALKEmbedWrapper\" style=\"width: 100%; height: 100%; position: relative; background: #ffffff;\"><script class=\"jsBrightTALKEmbedConfig\" type=\"application\/json\">\n            { \"channelId\" : 15591, \"language\": \"en-US\", \"commId\" : 338529, \"displayMode\" : \"standalone\", \"height\" : \"auto\" }\n      <\/script><br>\n<script class=\"jsBrightTALKEmbed\" src=\"https:\/\/www.brighttalk.com\/clients\/js\/player-embed\/player-embed.js\">\n      <\/script><\/div>\n<p><a name=\"report\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some comments from Kaspersky Lab\u2019s head of information security on the results of the CISO survey.<\/p>\n","protected":false},"author":2498,"featured_media":14548,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609],"tags":[2636,282,591],"class_list":{"0":"post-14547","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-ciso","10":"tag-cybersecurity","11":"tag-report"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ciso-report\/14547\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ciso-report\/12173\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ciso-report\/6059\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ciso-report\/16480\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ciso-report\/14675\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ciso-report\/13586\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ciso-report\/17241\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ciso-report\/16517\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ciso-report\/21613\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ciso-report\/24288\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ciso-report\/11107\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ciso-report\/11113\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ciso-report\/18006\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ciso-report\/21895\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ciso-report\/23832\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ciso-report\/21425\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ciso-report\/21428\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/ciso\/","name":"CISO"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2498"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=14547"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14547\/revisions"}],"predecessor-version":[{"id":14551,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/14547\/revisions\/14551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/14548"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=14547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=14547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=14547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}