Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cyber Tactics ColumnCybersecurity News

The Top Three Cyber Security Leadership Qualities

There likely are hundreds of traits associated with great leaders.

By Steven Chabinsky
cyber feat
June 1, 2013

There likely are hundreds of traits associated with great leaders. For starters, great leaders demonstrate honesty, integrity, loyalty and humility. They treat people fairly, and they consistently display good judgment. Great leaders tend to be highly intelligent, and they are confident and effective communicators with the ability to inspire others, especially when times are tough. They accept responsibility and value the hard truth. They are calm under crisis, empathetic, and often have good senses of humor. Based on these factors, great leaders are trustworthy, and they repeatedly earn that trust.

It will come as no surprise that each of these qualities also is important and perhaps essential when it comes to cyber security leadership. Yet, of all that is required, these traits may not be the most significant. Consider instead my Top Three: Strategic Vision, Passion for Coordination and Courage to Drive Culture.

 

Strategic Vision

There are few areas as broad as cyber security, where so many resources are committed with such an imperfect view of the scope of the problem and how best to define success. The first order of business is to establish the risk environment. In this regard, cyber security leaders must distinguish and prioritize between risks associated with their internal corporate networks, their outward-facing customer networks, any computer integrated manufacturing systems, those products or services that are enabled by computer chips, and finally the impact that vendors might have on each of these. There’s a big difference, for example, between protecting the Personally Identifiable Information of your employees and customers from hackers versus ensuring that the medical devices or fighter jets your company produces doesn’t contain malware.

Which leads to the second strategic issue: recognizing the breadth of the bad guy’s playing field. Threat actors can and do come from most everywhere around the globe, and they have motives ranging from making a profit to causing harm. They can attack our cyber security through any of four distinct vectors: through the supply chain (to include the design, manufacture, delivery, installation and updating of software and hardware); remotely (whether through network intrusion, drive-by download, email attachment or DDoS attacks); proximately (including, for example, using rogue wireless access points); and by insiders (be it a corporate spy or an unwitting employee).

The third strategic issue is to appreciate the varying degrees to which your company’s risk may be lowered either through threat mitigation, vulnerability mitigation, consequence mitigation or a combination of the three, not all of which are equally effective against different threat actors or activities.

It is only upon identifying and prioritizing company data, products and services; evaluating the methods and motives to harm them; and considering the return on investment of specific mitigation strategies to protect them that a cyber security leader can define and implement a meaningful vision.  Significantly though, for a vision to be strategic it must mean more than a combination of well-designed policies and achievable programs.  It must answer the questions, “What does success look like, and are these policies and programs likely to get us there?”

 

Passion for Coordination

When some people talk about their jobs, they say, “It’s not my work, it’s my passion.” Seldom, however, do you meet people who list coordination as one of their passions.  Yet, that’s exactly what cyber security leadership requires, because the problem and the solution set are diverse and organizationally dispersed. The best cyber security leaders are inclusive, and understand the need not only to adopt the latest techniques for identifying malware, but also the need to assess technology procurement decisions, physical access controls, prioritization of key assets and services, legal compliance regimes and more.

For the federal government, the question had long been asked, “Who’s in charge” of cyber security? The answer was hard to come by. Finally it became clear, the true leaders were those who brought together multiple departments and agencies, determined all of their equities and capabilities, consolidated those into a national strategy and unified budget, and got approval from the President and Congress to move forward. It was through leadership through coordination.

 

Courage to Drive Culture

Although “You can have it all” makes for a catchy ad slogan, it’s a pretty lousy IT policy. Still, many employees consider it unacceptable to have “better” technology at home than in the workplace, or to be restricted from accessing certain websites from the office. Leadership requires the courage to press pause, and sometimes even to hit reverse. It is not necessary for a company’s most sensitive data to sit unencrypted on devices connected to the Internet, or for all employees to have access to that data. Instead, what is increasingly necessary is for leaders to step up and explain the business demands and cyber risks in such a way so employees appreciate, comply with and help achieve the strategic vision. That often requires the courage to drive culture, specifically a culture of security. 

 

About the Author:

 Steven Chabinsky is Chief Risk Officer and Senior Vice President of Legal Affairs for the cyber security technology firm CrowdStrike, where he advises the company and its clients on CrowdStrike’s incident response services, cyber intelligence products, and intrusion detection and attribution platform. He previously served as Deputy Assistant Director of the FBI’s Cyber Division. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chabinsky 2016 200px

Steven Chabinsky is global chair of the Data, Privacy, and Cyber Security practice at White & Case LLP, an international law firm. He previously served as a member of the President’s Commission on Enhancing National Cybersecurity, the General Counsel and Chief Risk Officer of CrowdStrike, and Deputy Assistant Director of the FBI Cyber Division. He can be reached at chabinsky@whitecase.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Keys to Employee Cybersecurity

    The Top 10 Cybersecurity Myths, Part 1

    See More
  • Cyber Security default

    The Top 10 Cybersecurity Myths, Part 2

    See More
  • The Top 12 Practices of Secure Coding - Cyber Tactics - Security Magazine

    The Top 12 Practices of Secure Coding

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing