The first Chief Information Security Officer (CISO) appointment was made in 1995. Since that time, the corporate world’s adoption of digital systems has mushroomed. Data, whether intellectual property or customer information, has become a competitive requirement — and the pandemic has accelerated the evolution of remote working, dramatically changing the network perimeter. As a result of all of this, security management has become exponentially more complex and the number of cyber threats a business faces are now innumerable.
This all falls at the feet of the CISO — but where they sit within an organization will influence their effectiveness in managing this increasingly intricate information security arena. Below I’ve outlined the typical chain of command for CISOs and how this impacts their ability to secure organizations.