Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

5 Minutes With

3 Types of CISOs and How to Recognize Them

By Jordyn Alger, Managing Editor
5 Minutes with Marlatt
Image courtesy of Marlatt
October 13, 2025

The role of Chief Information Security Officer (CISO) is not an easy one. While there exists plenty of advice and strategies for CISOs, the role can be a challenge even at the best of times — especially if the CISO is lacking in skills that may not be immediately apparent. 

Here, Security magazine talks with Bryan Marlatt, Chief Regional Officer (North America) at CyXcel, about different types of CISOs based on their skillsets. 

Security magazine: Tell us about your background and career.

Marlatt: I have spent over 30 years in IT and cybersecurity. Throughout that time, I’ve worked in the DOD, both as a civilian and in uniform, built and managing networks, delivered technologies and services with a value added reseller (VAR), led a team of sales engineers at a security technology company, consulted analysts and board members with a Big 4 consulting firm, been an established CISO with multiple companies in different industries, and now lead the US practice at a global legal and cyber pre-incident/post-incident consulting firm (CyXcel).

Security: Can you explain the various types of CISOs and how they differ from each other?

Marlatt: Over my years in the cyber, I’ve been able to recognize three types of CISOs. 

The first type is the Security Engineer CISO. This is a person that has grown up in cybersecurity and was overpromoted into the role of CISO. This CISO has blinders to only see and understand the technical aspects of the cybersecurity program.

The second type of CISO is the Business CISO. This type of CISO has never touched a technology and often has grown up in other areas of the business, such as sales, project management, or the like. This CISO has the blinders turned in the other direction, only being able to understand the needs of the business, but doesn’t know how to translate them into security capabilities to meet those needs of the business. 

And finally, we have the Fully Functioning CISO. This CISO has grown up in areas or roles that helped them understand that the needs of the business drive the needs of IT and cybersecurity. This CISO has the blinders off and can understand the role of the analyst and can translate the risks to the business at the board level. 

Unfortunately, there are many more of the first two types of CISOs than the last.

Security: If only one type of CISO is in an organization, does this leave the institution open to security gaps?

Marlatt: Absolutely. If an organization has one of the first two types of CISO, they will greatly rely on their team members to fill the gaps. If it’s the Security Engineer CISO, it’s much harder as most organizations don’t have a role that will help the CISO interpret the needs of the business. It’s only larger organizations that have Security Architects or Program Management to help drive clear understanding of the business needs. If the organization has the Business CISO, they can generally rely on the technologists of the team to understand the technology requirements and help develop them into plans. 

Both the Security Engineer CISO and the Business CISO fall short the help lead the business in overall strategy. And with these two types of CISOs, they generally don’t teach their teams the importance of learning the business or having a broad skills set in cybersecurity knowledge, which leads to replication of the same types of future CISOs.

Security: How can organizations ensure they have a multi-disciplinary CISO? As for CISOs, how can they seek to broaden their skillsets and become multi-disciplinary?

Marlatt: The best way to identify a strong CISO that can meet the requirements of both technical and business understanding is in the interview process. 

See what the CISO already knows about your business. See what kinds of questions they ask related to the business. But also have a technical portion of the interview. It can’t be a "stump-the-chump" exercise, but understand what they know about the key capability requirements needed for any security program. Understand what tools were used in their previous roles and why they selected them. If you hear that they didn't help select the technologies or they ran a status quo environment, they may not be the right CISO. Understand what types of transformational work they completed and what business problems they were trying to solve for. Understand if they have been through a cybersecurity incident and what role they played. Did they work hand-in-hand with the business, or were they focused on how the threat actor got in? And finally, ask them what their business peers and employees would say about them if asked. This will tell you a lot.

You might think that some of the CISO certifications out there are the answer, but unfortunately, they are not. Finding a CISO with a broad range of experiences and/or the right education is key. Someone who has been in many different types of cybersecurity roles across different industries will show a breadth of understanding of regulatory compliance. It’s always great to see a CISO with technical experience and an MBA, showing they had the foresight to expand their knowledge and better understand the business aspects. Sometimes you find an outlier that was just made for the CISO role, no matter their background and education. 

No matter what, finding the right CISO is critical to any organization given the current impact cybersecurity incidents bring to organizations.

Security: Is there anything we haven’t discussed that you’d like to add?

Marlatt: With current regulations and impacts that have come to CISOs in the past few years (e.g., Joe Sullivan at Uber and Tim Sullivan with SolarWinds), taking on the CISO role isn’t for the faint of heart. 

As I watch open CISO roles float across the screen on LinkedIn, some with very low salaries, it’s clear that some companies don’t know what they are asking for. Just because your insurance carrier has a box for CISO in their multi-page questionnaire doesn’t mean you have to assign that title to an unqualified individual. 

Not only do companies need to choose the right type of CISO, CISOs need to make sure they can meet the requirements of the role they are being asked to fill. Read the job description to know if what that company wants is a CISO, or just someone sitting in the seat with a title. If is the latter, you may find a seat next to Joe, Tim and the other CISOs out there just waiting for prosecution.

KEYWORDS: 5 minutes with Chief Information Security Officer (CISO) CISO CISO leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Security guard

Connected Security: How Proactive Real-Time Tech Keeps Security Workers Safe

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Child on laptop

    3 Major K-12 Cyber Risks and How to Mitigate Them

    See More
  • Man standing in front of window

    CISOs respond: 49% of CISOs plan to leave role without industry action

    See More
  • Person skiing

    How to Protect Organizations During the Winter Olympics, According to CISOs

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing