What CISOs Can Do Today

What CISOs Can Do Today

In part three of our series, we laid out the five top priorities for CISOs as they shift their focus to the executive aspects of their roles and build out their teams. In this final part of our series, I join my colleagues Aileen Alexander from Korn Ferry and Paul Calatayud from Palo Alto Networks to look at those priorities [...]

Top 5 Priorities of the CISO of Tomorrow

Top 5 Priorities of the CISO of Tomorrow

As the role of the CISO continues to evolve, areas that were once the personal responsibility of the CISO will shift to other members of their team. What does that mean for the CISOs of tomorrow? How will how they shift their focus to the “executive” aspects of their roles and build out their teams? How will [...]

Archetypes of the Modern CISO

Archetypes of the Modern CISO

As described in part one of this series, the role of the modern CISO has changed significantly over the past few years. CISOs have higher visibility and accountability than ever before, which has moved them from back-of-the-house operations into a key public-facing role. This changing dynamic requires new attributes for successful CISOs in terms of competencies, experience, traits, and [...]

The Changing Role of the CISO

The Changing Role of the CISO

Over the past decade, the role of the CISO has evolved to keep pace with today’s dynamic threat and regulatory environment. Cybersecurity has expanded well beyond the confines of IT and is now a concern at the highest enterprise level. This has impacted how CISOs are viewed within the organization,  as well as their typical reporting [...]

What’s The Best Reporting Structure for the CISO?

What’s The Best Reporting Structure for the CISO?

As cybersecurity risk management has emerged as a top strategic priority for companies across industries, the question of whom the CISO should report to has likewise risen in importance. Historically, the CISO reported to the CIO, but companies are increasingly considering a number of alternatives—from placing the CISO in the risk or enterprise data groups [...]