Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingEnterprise Services

A Look into a CISO’s First Quarter

By Wayne Reynolds
Is Your Vendor Risk Management Program Working? - Security Magazine
March 12, 2020

Becoming a new CISO brings new exciting opportunities and responsibilities but also new challenges and pressure. In the past few years, the role of the CISO has become increasingly complex as it evolves from a predominately technical role to a more strategic, advisory capacity.
 

Navigating Your First Quarter as a New CISO

The first quarter as a new CISO will be when the spotlight shines the hardest and all eyes will be on you. The pressure will be on to understand your new business, build relationships with your business peers, build a positive reputation for your department, and also position the security function as a business enabler.

During those first three months you’ll need to tackle four critical stages: assess the current state of security and strategize a consequent plan, communicate the results, participate in board meetings and measure the results of the plan.

 

Strategizing a Security Plan

One of the first notable landmarks in a new CISO role is the completion of an initial maturity assessment. Asking the right questions, such as what is the organization’s tolerance for risk? Do I need to educate on the concept of risk? Is the organization’s security program mature enough? Or simply learning about previous breaches, will help draw your own conclusions about the state of the security program and whether it’s based on an industry framework, such as NIST CSF or ISO 27001, or not.

However, the results of this assessment alone aren’t enough to inform security strategies. You need to decide what’s reasonable for your organization and know the current and desired levels of maturity for each security discipline. This will require a strong understanding of your regulatory environment, the security culture of the organization, as well as what is acceptable to your board and customers.

By completing this first stage, you’ll identify the top priorities, issues and gaps to create security strategies that will fit. Many CISOs struggle with prioritization at this point, trying to fix bigger, deeper business problems. This is the time to identify some small, manageable actions to start off with and build your political capital, while you work to understand and plan for long term important initiatives.

 

Communicating Maturity Assessment Results and Gaps

Once your plan is ready, you’ll need to strategize how to communicate the gaps you have identified to the rest of the business.

The first step is understanding how to frame the security needs of the company and how they relate to the business. It is essential to focus on the results but also on how you will face them. Remember that your goal is to get real cooperation from key stakeholders, so you need to get top management and the different business departments on your side if you’re going to initiate real change, and that means using a light touch, and sharing your plan in a language they will understand, tying back to overall business goals. Building relationships early is the key to success here.

CISOs need to be seen as business enablers, to that end talking about how security initiatives will mitigate critical foreseeable risks to profitability or how those will help expand the business in different areas will be critical. Try to focus on finding ways for your organization to generate revenue. This isn’t always possible but aiding revenue growth should always be one of our key strategies.

 

The First Board Meeting

Whether this is your first CISO role or not, the first board meeting at a new organization is a big event. The average CISO can spend 40-80 hours preparing a presentation deck for each board meeting. And depending on how complex the organization is, they can also go through 5-25 iterations before the final version is reached.

Why so much effort? Because getting the board to buy-in and support your security program is essential if you want to do your job right.

Fundamentally, your board needs an answer to one question: “Are we secure?” To answer this effectively, you’ll need to understand your board’s risk tolerance and what level of detail they expect from your presentations. Before you start preparing try to find out what your board expects from you. Try to gain an understanding of prior board meetings as well as the board members themselves. Research what other boards/organizations they are members of. Having this knowledge will prepare you when and if difficult conversations arise as well as speed building relationships with your board.

Your presentation should set the expectation that you can never be 100% safe from cyber threats, but you can achieve a reasonable level of resilience and reduce risks to the business. You should dive into the specifics including the maturity of the current program, the organization’s cyber risk level, where are the gaps, how you plan to address those and what timeline you’d propose.

Finally, be aware that board members probably don’t have a grasp of basic security concepts but are actively showing interest. Many board members are CEOs of other companies, so they likely already have some exposure to security risks and initiatives. Try to translate the security technical terms to non-technical audience. CISOs today need to speak in business language. In today’s environment you will most likely have a member that is the board’s “Cybersecurity Expert” or an Audit Committee, focus on building a relationship with them as quickly as possible.

 

Forecasting and Measuring Results

Metrics play an essential role in tying security initiatives to the needs of the business. There’s just one problem: there is no universally accepted way to measure the effectiveness of security programs or the return on investment.  Subjectivity plays a large part in strategic security metrics.

There are crucial considerations when designing your measurement system:

  • Give careful consideration to your audience’s needs. Your executive board will likely demand less operational detail than you’d need for a departmental meeting, and a slightly different focus to your risk committee.
  • Give details on where your budget was allocated, the results you obtained, the amount of incidents/vulnerabilities you were able to resolved and what is the trend and how those have affected the company’s risk posture, the average time threats are in the environment before being removed (dwell time) and the effects of your initiatives in the overall risk levels of the organization.
  • Choose and develop a set of metrics that will convey the success of the program and that meets the needs of all of your audiences. Ideally you will be ready to produce separate, focused dashboards for each audience you share your results with.

Ensure that your metrics are strategic in nature. Many CISOs today struggle in board conversations because they are reporting tactical items. Tell a story with your metrics and how they improve your company’s overall risk posture.

 

Closing the Quarter

After you have finished this cycle, new challenges and opportunities will arise. As you move forward, open communication and maintaining the new relations you have formed will be paramount to continue building a security program that is inclusive and is viewed as a business driver.

KEYWORDS: Chief Information Security Officer (CISO) cyber security cybersecurity risk management security program

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Wayne reynolds

Wayne Reynolds is an Advisory CISO for Kudelski Security, where he works with executives and program leaders to help businesses drive security programs to align with the business and maximize proactive threat mitigation to best serve the enterprise as a whole. He has more than 30 years of experience in the information security space, including working as CISO for Armor Cloud Security and GameStop, SVP / Head of Security State Management for Citi and IT Security Manager for Conde Nast. He ensured the execution of security and compliance services to more than 1,200 customers in 45 countries, majority of which were governed by PCI and HIPAA regulations. Wayne also served for 20 years in the United States Marine Corps as a Cyber Chief, where he led Marines across multiple disciplines and through multiple combat deployments.  Wayne is a frequent contributor to Kudelski Security’s Modern CISO blog, focusing on the latest issues and trends impacting security leaders today: https://modernciso.com/.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • dark web cyber

    A look into the pricing of stolen identities for sale on dark web

    See More
  • Top 3 Misconceptions About Data After Death - Security Magazine

    Using a Privacy-First Mindset to Transform Data into Intelligence

    See More
  • cyber-security-data-freepik-(1).jpg

    The engagement effect: A CISO’s guide to securing hybrid workplace networks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!