Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalLeadership & ManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Leadership & Management

A chief security officer (CSO) by any other name

By Michael Gips
leaving workplace

Prostock-Studio / iStock / Getty Images Plus via Getty Images

leader ship and management
leaving workplace
leader ship and management
September 7, 2022

No less a word wizard than Shakespeare said that a rose by any other name would smell as sweet. But would “The Bard” himself agree that a Chief Security Officer (CSO) by any other name would retain the same authority, respect and gravitas?

About two decades ago, the security profession staked its claim to the C-suite by adopting and popularizing the CSO title, but the term has faced challenges. If you tell anyone outside of security that you are a CSO, they may well guess that you are a strategy officer, a sales officer or you lead an organization’s scientific or sustainability efforts. Even if they surmise correctly that you are in security, they might conclude that you own cybersecurity only.

What’s more, CSO may not even be the most popular term for an organization’s senior security executive. Hundreds of different titles populate the corporate landscape. In fact, you can create your own with this handy senior security title generator. Simply pick one term from each column.

table

We haven’t come very far in naming conventions in the last 20 years. Likewise, progress has been marginal in standardizing a CSO’s duties, responsibilities and authority.

In an article written by Steve Hunt almost 20 years ago, he wrote, “The role of the chief security officer (CSO) has burst onto the corporate scene in North America and Europe in the last two years. Today, there are more than 200, but their respective job descriptions, reporting structures, qualifications and compensation are wildly diverse.” A mere review of today’s titles still bears out this reality.

Acknowledging that the CSO term hasn’t pushed other job titles out of the market, ASIS International (ASIS) has renamed its Chief Security Officer standard the Senior Security Executive (SSE) standard. As a member of the group that reimagined and redrafted that standard from its 2013 iteration, I can attest to differences of opinion on whether to keep the original name or go generic. Not everyone was ready to abandon CSO for SSE.

In my view, this was a strategic choice to emphasize the substance and purpose of the standard over its titular significance. For example, the new document accentuates the central role of Enterprise Security Risk Management (ESRM) in a CSO’s role and responsibilities. In addition, it incorporates, by reference, the security competency model created by ASIS, the Apollo Group, and the University of Phoenix and endorsed by the U.S. Department of Labor.

Moreover, the updated standard better positions the CSO as a critical business partner and advisor to other senior executives. Here is the key language from the executive summary:

"The SSE takes a holistic view of security and the organization’s operations to establish and implement effective protective strategies across various functions to support asset protection and organizational effectiveness. Accordingly, the [Senior Security Executive] coordinates with other organizational functions to develop, implement, and manage policies, plans and procedures that establish organizational responses across the broad spectrum of business and organizational risks."

Maybe the question isn’t whether the SSE title smells as sweet as CSO does, but whether heads of security pass the sniff test when interacting with their organizational peers. Following the updated standard can help them pass that test.

KEYWORDS: enterprise enterprise security risk management security leadership security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Education sector experiencing cyber incidents or attacks more than any other vertical

    Educational organizations are hit by phishing attacks targeting cloud data more than any other vertical

    See More
  • Becoming a Global Chief Security Executive Officer

    See More
  • Security and Compliance Compensation report

    The salary of a Chief Security Officer

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing