Security Technology Executive

JUL-AUG 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/1013012

Contents of this Issue

Navigation

Page 11 of 83

that are essential to the success and stability of the company at hand. In today 's ever-evolving information security environment, CISOs need to be prepared to adapt their defenses to address a sophisticated range of attackers and simultaneously help drive innova- tion within the business by being a champion of new technologies like AI, IoT and blockchain which have the potential to impact all industries. Despite what they 'll hear from most vendors, technology alone is not a silver bullet that can ensure the secu- rity of an organization. In many cases, the first step toward creating a sustain- able defense is to address attacks that prey on human vulnerabilities and error. Therefore, it is of utmost importance that a CISO establishes an enterprise- wide culture that embraces security as a core compo- nent of doing business. In conclusion, the mod- ern CISO must solidify support from the C- suite and Board of Directors by clearly articulating how security protects mission-critical operations and provides a sustained competitive advantage through innovation and brand loyalty. While doing this is often easier said than done, individuals in this new- ly-evolved role are at an advantage when it comes to the sheer opportunity at-hand. One should cling to opportunities for continued growth of their skillset, as well as explore partner - ship opportunities with experienced CISOs at advi- sory firms and industry authorities who know how to clearly articulate how security protects mission- critical operations and develop and implement programs that not only execute best practices in information security to protect but inspire innova- tion for growth. 12 SECURIT Y TECHNOLOGY E XECUTIVE • July/August 2018 • www. SecurityInfoWatch.com CYBERTECH By Jonathan Steenland Jonathan Steenland is responsible for co-leading Zyston's CISO A d v isory and Consulting Ser v ices. Prior to joining Zyston, Jonathan ser ved as Chief Information Securit y Officer at Fujitsu where he was responsible for developing strategic securit y programs for Fujitsu's global business. Prior to joining Fujitsu, Jonathan worked for the U.S. Department of Defense and the U.S. A rmy. He is passionate about creating innovative securit y programs that are aligned with business needs, prov iding sustained competitive ad vantages for clients, as well as developing next-generation cybersecurit y professionals through Zyston's leadership development program known as Top Gun. Zyston.com. G iven the ever-changing nature of today 's threat landscape, the role of Chief Information Security Officer (CISO) can now be considered one of the most critical inside any organiza- tion. Whether CEOs and Boards – or even CISOs – recognize it as that is another thing. Regardless, it's time to face the truth of the matter – gone are the days of information security being viewed as only a technical function within an organization. R e c e n t e v e n t s h a v e proven that without proper cybersecurity measures in place, a company can be seriously compromised – both financially and repu- tationally to mention a couple. C- suites and Boards across the world are becom- ing increasingly savvy when it comes to the realization that information and secu - rity can no longer be consid- ered as simply an IT issue. To t a ke a n a ccu ra t e assessment of a company's threat landscape, as well as manage its ongoing security posture, CISOs must have an expanded, active working relationship with both the CEO and the Board. Therefore, it's important that modern CISOs be strong leaders and confident communicators that can clearly identify, convey and intelligently discuss business issues that bring upon security challenges (versus simply the status quo of simply talking technology and various product fixes). Organizations need strong CISOs who can effec- tively influence change within, influencing the people, processes and technology that are success- fully able to drive the day-to-day functionality and success of the security program. Most importantly, today 's CISOs need to ensure his or her program considers its most mission-critical business needs and has a thorough understanding of the processes From Technology Function to Core Business Asset: The Elevated Role of Today's CISO » ...technology alone is not a silver bullet that can ensure the security of an organization. « — Jonathan Steenland

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2018