When a corporate Board
invests in security, they expect results. Usually, this means, “Keep us from
having a headline making breach.” The
threat landscape, the implications for the firm’s risk profile and the options
available to mitigate risk are not well understood.
In fact, according to
CSO Magazine, “Because cybersecurity issues are complex and technical, it is
common for directors to express anxiety regarding whether the board has
sufficient expertise and is informed enough to serve its risk oversight
function in this area.”
That anxiety can lead to
bad decision making, for example, “more than half of boards delegate
responsibility for overseeing cybersecurity risk oversight solely to a
compliance or audit committee,” according to CSO. A focus on compliance is not
the same as focusing on managing corporate-wide risk. The Board understands
what they want, but they don’t have a firm grasp on what they need.
What if they could be
presented with information about cyber security in a familiar format, with
familiar terms, like the CEO gets from all of their direct reports? Whether
it’s the head of marketing, sales, engineering or business development, the
conversations are grounded in data. They weigh investments versus expected
returns.
Even if the Board have
not explicitly asked for it…
Even if they,
themselves, don’t realize it…
This is what they hired
the CISO to deliver.
This is what the CISO is
accountable to prove.
The result they need –
above all else – are:
- Proof of protection from unacceptable impacts
- Determination of ideal risk appetite
- Best cost options to achieve the above
For the CISO, it’s been
a struggle to find ways to answer these questions.
This results in a BIG
GAP.
The CISO faces
consequences in failing to bridge the BIG GAP.
Because the Board wants:
- Protection from unacceptable business impacts, they must challenge the CISO’s strategy if the CISO can’t define and repeatably prove progress to that goal.
- Determination of ideal risk appetite, they must hold the CISO accountable if the CISO can’t show them evidence that stands up to scrutiny.
- To spend to get the greatest return, they must challenge the security budget if the CISO can’t prove maximum value from current and planned investment.
The above are day-to-day
challenges that can lead to the CISO becoming the ‘fall guy’. This doesn’t
necessarily need to be because of a public security breach, it can occur by
simply being perceived as ineffectual by business leadership.
This makes the life of
the CISO rather challenging, frustrating, and unrewarding.
To bridge this gap, a
CISO needs to answer these questions in terms the business, not just security
people, can understand and leverage.
- What are you trying to protect, and why?
- What level of protection do you have?
- What level of protection is justified and defensible?
- Do you have the plan to show how to achieve this cost effectively?
- Can you show that what you have achieved was done cost effectively?
- Can you show that protection results are to plan?
The Protection Problem
Space is about results – and the goals, strategy and business plan to achieve
them.
The Security Problem
Space is about execution and assurance – and the integrated operational plan to
orchestrate it.
There is a fundamental
difference between the mindsets.
The 6 questions are a
foundation to bridge this gap and articulate, in a common language and
understanding, the conversion of investment into actions into results and
linking operational plans to business plans to achieve those results.
It’s important to point
out that not even fully ‘integrated’ security programs, in the world’s largest
organizations, with massive budgets come close to bridging this gap.
Business leadership do
not need to know how or what security does – they need to make ‘opportunity
cost’ decisions. How much impact mitigation can you give me for $x? Is there a
point of diminishing return? What does this investment curve look like? Is
there a sweet spot? Can it be defensible to stop trying to protect against some
threats?
Even if they want to
invest, can security deliver the robust evidence of results that business leadership
can leverage in their interactions with their challengers.
In upcoming posts,
we will continue to deconstruct this problem and will dive into many facets of
how a CISO can help answer these questions in a pragmatic and objective way.
