Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity & Business Resilience

Does the CISO belong in the C-suite?

By Andrew Jenkins
CISO two people sit at computer in workplace
December 17, 2021

The first Chief Information Security Officer (CISO) appointment was made in 1995. Since that time, the corporate world’s adoption of digital systems has mushroomed. Data, whether intellectual property or customer information, has become a competitive requirement — and the pandemic has accelerated the evolution of remote working, dramatically changing the network perimeter. As a result of all of this, security management has become exponentially more complex and the number of cyber threats a business faces are now innumerable.

This all falls at the feet of the CISO — but where they sit within an organization will influence their effectiveness in managing this increasingly intricate information security arena. Below I’ve outlined the typical chain of command for CISOs and how this impacts their ability to secure organizations.

When the CISO reports into the CIO/CTO

Historically, this has been the most common designation for a CISO. Over the past 20 years, the hierarchy of business needs has weighed in technology’s favor, with security being viewed as a necessary addition. As a result, boards tended to appoint Chief Information Officers (CIOs)/Chief Technology Officers (CTOs) and only hired CISOs when their security needs or regulators really demanded it.

However, this can often become problematic. In this position, the CIO/CTO has the final word on the technology and security budget. They can, and do, end up allocating more of that budget for large technology projects — whether they involve updating end-user computing, implementing a new CRM system or buying a sales platform. If this happens, the CISO only has a limited capacity to influence their security budget as a result of having no direct line to the board. Where this has played out, CISOs have been known to resign. A security breach is on their head, and their reputations are at stake. If they aren’t provided with adequate budget to secure an organization, it’s not worth their career to stay.

What’s more, if a board is looking for a high-caliber CISO, they can’t earn less that the CTO (which will happen if the CISO reports into the CTO). In the current tech executive market, CISOs now command as much, if not more than their CTO peers. Boards need to be cognizant of this.

When the CISO reports into the CRO

This is an increasingly common reporting line, particularly in highly regulated industries. There are a number of advantages for CISOs reporting into Chief Risk Officers (CROs). The first is confidence in the organization’s appreciation of risk. Where the CISO reports into the CRO, they have a distinct ability to influence the risk appetite of the organization. This professional background tends to provide CISOs with more personal comfort and makes them less likely to resign over what they perceive as an underappreciation of cyber threats.

The second advantage of this position is that an Information Technology (IT) department is not responsible for auditing its own security. There’s far less opportunity for IT teams to cut corners or sweep issues under the carpet if the CISO exists outside of their reporting structure. Ultimately, it makes it difficult for conflicts of interest to arise between individuals within the same business unit where auditing is concerned.

The final advantage is optics. Appointing both a CRO and CISO sends a message to employees, customers and shareholders that risk (particularly cyber risk) is taken seriously. While this won’t be necessary for many organizations, this sort of structure is being seen more and more in areas of financial services, telecommunications, pharmaceuticals, energy and critical infrastructure.

When the CISO reports into the COO

This is another common reporting structure for CISOs to find themselves in. Where this happens, the CISO will typically report into the Chief Operations Officer (COO) alongside the CTO or head of IT. This reporting structure means that cybersecurity and technology act on an equal footing where budget allocation is concerned, and neither is given unfair priority over the other. It also means that technology- and software-related decisions are usually made in tandem with cybersecurity.

CISOs reporting into COOs are usually highly effective, and the structure tends to be found in large companies operating in heavily regulated markets. For example, in large financial services companies like banks or building societies, the COO is often more akin to a deputy CEO — they will typically have a deep understanding of risk and security regulation as it relates to financial services. CISOs do well in these environments where the risk appetite is already very high and large data protection budgets are accepted by the board.

When the CISO reports into the CEO

This is somewhat less common, but the CISO community is becoming increasingly vocal about the need to report directly into the Chief Executive Officer (CEO). This position offers them greater organizational visibility and better enables them to build security protocols throughout an entire business. As a member of the C-suite, it also gives them a certain amount of clout when trying to influence the security and risk awareness of individual functions. Importantly, it means that the CISO can make a case for cybersecurity directly to the CEO and the board, usually resulting in improved threat awareness and greater allocation of budget.

However, CISOs should remember that this is a C-level position. CISOs reporting into CEOs should be able to combine technical expertise with strong business acumen. When interacting with their fellow C-suite members, they should be able to demonstrate their understanding of the organization’s goals and how cybersecurity can enable them. What’s more, they should have the type of leadership and communications skills required of a C-suite executive.

KEYWORDS: boardroom strategies c-suite CEO partnership Chief Information Officer (CIO) Chief Information Security Officer (CISO) security leaders security posture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Andrew Jenkins, Principal in the CIO & Technology Officers Practice at Odgers Berndtson, discusses the effectiveness of a CISO depending on where they sit within an organization.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • employees in conference room

    Cybersecurity workforce diversity efforts lag in the C-suite

    See More
  • Cyber risk c-suite

    Six ways to reduce cyber risk in the C-suite

    See More
  • buy in from the c suite

    5 Cyber Basics for the C Suite From the Outside In

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing