Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Enterprise Cybersecurity: Three Topics to Discuss With Your CISO

By Alexander Moiseev
SEC1119-awareness-Feat-slide1_900px
January 17, 2020

As a consumer, I appreciate that many products and services have become so intuitive that companies can seemingly foresee our needs and offer future recommendations based on our preferences and prior behaviors. However, as an executive at a tech company, I also have a deep understanding of how challenging this can be for businesses to fulfill the ever-changing needs of customers.

Despite this challenge, it is exciting to be on the cutting edge of how technology makes this possible by allowing enterprises to make decisions based on data analysis, automate manufacturing and better target and deliver to customers through digital channels. With this growing range of automation and digitalization in place, information security now plays an important role in the overall organization strategy, and business leaders need to consider security concerns more closely than ever.

With this in mind, I’ve spoken to IT security leaders from enterprises around the world to learn what their concerns are and how their companies can overcome these roadblocks.

Security and IT – Cooperation or Chain of Command?

The increasing importance of cybersecurity is becoming clearly reflected in organizational structures as companies tend to have IT and IT security as two separate departments. Twenty-nine percent of Chief Information Security Officers (CISOs) say that not reporting to IT is the number one change in their role and 39 percent ranked it the second most important, according to a recent survey of IT security leaders.

Most security heads believe that this is a change for the better as being separated from IT gives cybersecurity experts more independence for impartial judgement. However, this doesn’t mean that the teams can work completely independent from one another. For example, some security essentials like patching, access control and secure infrastructure configuration remains the responsibility of IT. Additionally, if the two departments do not communicate well, the cybersecurity department may not be informed of new IT initiatives and cannot asses them in advance to ensure they are protected.

The majority of CISOs consider their relations with IT as positive, but confirm that there can be conflicts. Some feel that it can be difficult to determine who has the final say on important matters such as deciding on patch management routines, the level of flexibility and access to the systems for remote workforce or shutting down computers and servers during a possible breach. Since cybersecurity is still viewed as a bottle neck, security requirements can make it difficult to launch new IT projects or maximize performance of the information systems.

To create a well-balanced work environment, businesses should decide on the right structure for them, taking into account the level of maturity, budgets for IT and IT security and the size of the workforce in each department. In some cases, it may not be worth separating the IT department until you are confident the two departments could work well together. Additionally, it would be worth considering having an executive in place who can take charge of making sure both teams make the necessary compromises.

Is It Enough to Count Blocked Attacks?

It is becoming increasingly important that business find a balance between exploring new opportunities and minimizing risks, including those related to cybersecurity. To achieve this, mature enterprises must incorporate risk assessment and management.

Throughout their career, IT security leaders will see a variety of metrics to measure the state of exposure to cybersecurity risks. This includes the number of incidents an enterprise experienced over a certain period, the amount of threats blocked by prevention solutions, the number of completed cybersecurity projects or implemented solutions, how many issues were patched and even the amount of money allocated to cybersecurity. However, implementing measurable metrics doesn’t necessarily mean one is assessing cybersecurity risks.

While it is a typical business approach to speak using numbers versus industry jargon, figures and charts, when used as the only metric, do not tell you everything about the actual state of security. The quantitative data should be enriched with qualitative analysis to determine what cybersecurity risks can affect IT assets and how likely these situations are.

Cybersecurity risk management is a challenging task, but proves its worth as it allows companies to prepare for the most likely and significant risks for business. Risk assessment is key to establishing accurate plans for further steps on how to mitigate risk and respond. To achieve this, company leaders need to ask CISOs to calculate cybersecurity risks and also to participate in the process to bring their broader business expertise and insights to the discussion.  

Is It a Lack of Security Talent or Lack of Education?

The shortage of qualified cybersecurity personnel is seen as an ongoing problem in the industry, and 70 percent of respondents of the aforementioned survey of CISOs confirm this. With this is mind, we spoke with several CISOs to learn what they think about the lack of talent in the industry.

Interestingly, some of the respondents think that the issue is not finding the right candidate, but high expectations of a new employee. CISOs confirmed that business leaders require immediate effect from a new hire, so they have to look for highly qualified candidates with unique skillsets instead of developing such talent internally. Unfortunately, this greatly narrows the pool of candidates as there are many different technologies and solutions on the market making it difficult to find a person who has all the necessary skills and experience.

Another reason why enterprises are reluctant to educate new hires with less experience is concerns that they would invest in people who receive elevated training and then leave for a better paying job. However, given that such security specialists are rare, there is no guarantee that a skilled professional will not receive a job offer with more interesting tasks or higher salary. 

To solve the issue with this shortage of talents, it is important for businesses to approve “backup” vacancies in the information security department that are not related to urgent projects. It is also important that the new hires will be mentored and given not only routine responsibilities like log reviewing or first-line alert monitoring, but also the chance to learn something new and grow professionally.      

It is becoming clear that enterprise security depends not only on implemented solutions, but also on how well-tuned internal processes are in terms of communication between departments, hiring, training of personnel and budgeting. I recommend business leaders pay attention to these pertinent areas and discuss them with their respective CISOs before challenges arise in order to make the best decisions for their organization.

KEYWORDS: automation cyber security cybersecurity data analysis IT security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alexander moiseev2
Alexander Moiseev is the Chief Business Officer of Kaspersky, where he is responsible for sales strategy and marketing globally. Previously, he was Kaspersky’s Chief Sales Officer, where he led global sales and new business development. He graduated from Moscow State University with a degree in engineering with mathematics and cybernetics.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • budget-enews

    How to Decide on Your Company’s IT Security Budget

    See More
  • SEC_Web_5Minutes-Lee-0222_1170x658.jpg

    5 minutes with Jason Lee, Zoom CISO: Top 4 cybersecurity trends for 2022

    See More
  • Enterprise Ireland's tabletop discussion on cybersecurity includes a range of execs and experts coming together to share their thoughts

    Execs at TikTok, Microsoft and more offer their opinions on a range of cybersecurity topics during video discussion

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!