The first Chief Information Security Officer (CISO) appointment was made in 1995. Since that time, the corporate world’s adoption of digital systems has mushroomed. Data, whether intellectual property or customer information, has become a competitive requirement — and the pandemic has accelerated the evolution of remote working, dramatically changing the network perimeter. As a result of all of this, security management has become exponentially more complex and the number of cyber threats a business faces are now innumerable.
This all falls at the feet of the CISO — but where they sit within an organization will influence their effectiveness in managing this increasingly intricate information security arena. Below I’ve outlined the typical chain of command for CISOs and how this impacts their ability to secure organizations.
Educational Webinars, Videos & Podcasts: Receive cutting-edge insights and invaluable resources, empowering you to stay ahead in the dynamic world of security.
Empowering Content: At your computer or on-the-go, stay up-to-date when you receive our eNewsletters curated with the latest technology and services that address physical, logical, cyber and enterprise resilience.
Unlimited Article Access: Dive deep into the world of cybersecurity and risk management leadership with unlimited access to our library of online articles.