Cyber Security and the Culture of Alienation

Jean-Christophe Gaillard Jean-Christophe Gaillard
October 28, 2020 Big Data, Cloud & DevOps

Empirical, bottom-up and organically developed cyber security functions need to evolve

The 2020 Information Security Maturity Report from ClubCISO makes interesting reading.

It compiles responses from 100 of their members to a questionnaire sent in March 2020, around the time of the COVID-19 lockdown decision in the UK. Comparing results year or year is not entirely meaningful for such surveys, in absence of any form of data normalisation (you have no guarantee that the panel responding is the same year on year); yet some interesting patterns emerge.

The typical respondent is a CISO working for a mid-size or large organisation (82% have more than 500 staff), headquartered in the UK or Ireland (75%), and has spent more than 10 years in the Infosec industry (69%); 60% have been in their present role for less than 2 years.

The typical respondent is a CISO working for a mid-size or large organisation (82% have more than 500 staff), headquartered in the UK or Ireland (75%), and has spent more than 10 years in the Infosec industry (69%); 60% have been in their present role for less than 2 years.

Collectively, they paint a slightly uncomfortable picture: The picture of CISO roles and security practices still operating bottom up, disconnected from the dynamics of the business: When asked which concerns most affect their ability to deliver against objectives, 49% mention the culture of the organisation (as if they were not part of it), 36%, the speed of business change (as if it was happening all around them but without them), 33%, the level of board support (although in response to another question, 58% say they would like to report to board level…).

It would be fascinating to ask some of the questions to the direct bosses of the respondents and compare results.

Of course, in such context of alienation from the business, budgets are hard to get by for CISOs (41% mention budgets as a main concern and 57% mention insufficient staff), frustration builds up and leads to attrition: When asked why they left their last role, 47% of respondents mention “not seeing eye to eye with senior leadership” (!), not having sufficient resources to make their role a success (in their view of course), or frustration with their organisation’s approach to security.

But another shocking fact is that 89% of respondents say they don’t have a security operating model in place (82% say they are working on one at varying degrees). This element alone puts the rest of the survey into perspective: In absence of a structured framework to work against, most cyber security practices can only operate “as they go along”, in project mode or in firefighting mode: How can you justify budgets, attract or retain talent without a referential to work against , and in absence of a clear governance model, roles, responsibilities and – to a degree – clear career paths?

And again, how can you claim you do not have enough staff in absence of a target operating model, detailing tasks and the resources required to deliver those tasks? It can only be a finger-in-the-air exercise; the very kind any half-decent CFO would smell miles away.

This kind of empirical, bottom-up and organically developed cyber security function does not work and needs to evolve.

What is required is structure, business acumen and top-down engagement.

The emphasis on security culture throughout the report is valuable and meaningful, but it cannot be the only axis of action for the CISO: Security awareness has always been a low hanging fruit, and an easy sell for CISOs, when they cannot find other levers. You can’t go very wrong by distributing mouse mats and leaflets, and it does not cost the world. But this is not what culture change is about. And there cannot be any culture change that does not come top-down.

The culture of alienation many CISOs have developed is probably comfortable for some; there is always someone to blame (“the business”) and another juicy job to move into afterwards.

But it does not help organisations, and society at large.

To break this spiral of failure, the profile of the CISO needs to evolve and the board needs to take ownership.

This is no longer just about tech – if it ever was. This is about protecting the business against cyber-attacks which have now become a matter of “when, not if”. This is no longer something you can push down in the organisation.

If the board does not see the need – or does not feel qualified – to step in, nothing will never change for good around cyber security because it has simply become too complex and too transversal. Bottom-up approaches will continue to pour cash down the drain and CISOs will continue to leave every other year out of frustration. And breaches will continue to happen.

If the board wants to set directions, they should drive : Appoint someone they trust and can talk to (it does not have to be a technologist), and empower that person to build or rebuild cyber security practices across the firm, in the light of what the board wants and expects.

The COVID crisis is presenting most organisations with unprecedented situations, but it does not make cyber security less of a priority. On the contrary, cyber security – whether it is in support of remote working, e-commerce or digitalised supply chains – will be a pillar of the “new normal”.

Now is the time to deal with it strategically, and from the top down.

  • Experfy Insights

    Top articles, research, podcasts, webinars and more delivered to you monthly.

  • Jean-Christophe Gaillard

    Tags
    Board SupportBusiness ChangeCISO RolesOrganisation CultureSecurity Practices
    © 2021, Experfy Inc. All rights reserved.
    Leave a Comment
    Next Post
    Are You Managing Your Emotional Wake? Three Ways Leaders Can Positively Impact Those Around Them

    Are You Managing Your Emotional Wake? Three Ways Leaders Can Positively Impact Those Around Them

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    More in Big Data, Cloud & DevOps
    Big Data, Cloud & DevOps
    Cognitive Load Of Being On Call: 6 Tips To Address It

    If you’ve ever been on call, you’ve probably experienced the pain of being woken up at 4 a.m., unactionable alerts, alerts going to the wrong team, and other unfortunate events. But, there’s an aspect of being on call that is less talked about, but even more ubiquitous – the cognitive load. “Cognitive load” has perhaps

    5 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    How To Refine 360 Customer View With Next Generation Data Matching

    Knowing your customer in the digital age Want to know more about your customers? About their demographics, personal choices, and preferable buying journey? Who do you think is the best source for such insights? You’re right. The customer. But, in a fast-paced world, it is almost impossible to extract all relevant information about a customer

    4 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    3 Ways Businesses Can Use Cloud Computing To The Fullest

    Cloud computing is the anytime, anywhere delivery of IT services like compute, storage, networking, and application software over the internet to end-users. The underlying physical resources, as well as processes, are masked to the end-user, who accesses only the files and apps they want. Companies (usually) pay for only the cloud computing services they use,

    7 MINUTES READ Continue Reading »

    About Us

    Incubated in Harvard Innovation Lab, Experfy specializes in pipelining and deploying the world's best AI and engineering talent at breakneck speed, with exceptional focus on quality and compliance. Enterprises and governments also leverage our award-winning SaaS platform to build their own customized future of work solutions such as talent clouds.

    Join Us At

    Contact Us

    1700 West Park Drive, Suite 190
    Westborough, MA 01581

    Email: [email protected]

    Toll Free: (844) EXPERFY or
    (844) 397-3739

    © 2025, Experfy Inc. All rights reserved.