{"id":2410,"date":"2020-04-28T10:02:23","date_gmt":"2020-04-28T10:02:23","guid":{"rendered":"http:\/\/kusuaks7\/?p=2015"},"modified":"2023-12-13T11:41:23","modified_gmt":"2023-12-13T11:41:23","slug":"cyber-security-maturity-stagnates-because-cisos-are-structurally-prevented-from-looking-beyond-day-to-day-firefighting","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/cyber-security-maturity-stagnates-because-cisos-are-structurally-prevented-from-looking-beyond-day-to-day-firefighting\/","title":{"rendered":"Cyber Security maturity stagnates because CISOs are structurally prevented from looking beyond day-to-day firefighting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2410\" class=\"elementor elementor-2410\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-8a81bd2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a81bd2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c47b72a\" data-id=\"4c47b72a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d042b0d elementor-widget elementor-widget-heading\" data-id=\"d042b0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>The Tactical Trap<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-939790a elementor-widget elementor-widget-text-editor\" data-id=\"939790a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMany CISOs struggle to look beyond day-to-day <a href=\"https:\/\/corixpartners.com\/first-100-days-new-ciso-firefighting\/\" rel=\"noopener\">firefighting<\/a> and get trapped in tactical games. We highlighted this last year in the context of our \u201c<a href=\"https:\/\/corixpartners.com\/first-100-days-new-ciso-summary\/\" rel=\"noopener\">100 Days<\/a>\u201d series and it is one of the major factors preventing organisations from developing better levels of cyber security maturity.\n\nIn many firms, this goes beyond incidents and the natural need to address those: It is often compounded by 3 structural elements literally trapping the CISO in tactical games, forcing endemic short <a href=\"https:\/\/corixpartners.com\/tenure-ciso-key-driving-security-transformation\/\" rel=\"noopener\">tenures<\/a> and creating the conditions for a systemic spiral of failure around cyber security.\n\nFirst, <strong>corporate short-termism,<\/strong> which is still prevalent in many organisations amongst senior executive communities:\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a88af5d elementor-widget elementor-widget-text-editor\" data-id=\"a88af5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cIn the long term, we\u2019re all dead\u201d and anything that would not impact the next quarter figures does not grab interest for very long. Cyber security matters are being pushed towards those levels of management by non-stop media reports around data breaches and the potential level of GDPR fines, but when faced by multi-year, 7 or 8 digits transformative programmes of work around security that would genuinely force the firm to alter the way it works, those executives often revert to what they\u2019ve been doing for decades around compliance: Looking for quick-wins and cheap boxes to tick so that they can \u201cshow progress\u201d while minimising spend and disruption.<\/p><p>\u00a0<\/p><p>The problem with cyber security, is that organisations facing that type of problems are generally in need of a structural overhaul of their security practices, and \u201cquick wins\u201d are often non-existent. Driving real and lasting change takes time. Simply \u201cfixing\u201d illusory quick wins has never been the base of any transformation.<\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c8a903e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c8a903e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af1e2d9\" data-id=\"af1e2d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37598e0 elementor-widget elementor-widget-text-editor\" data-id=\"37598e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Second, <strong>plain old office politics <\/strong>between IT and Security which have always been a component of the life of many CISOs, irrespective of their <a href=\"https:\/\/corixpartners.com\/why-still-talking-reporting-line-ciso\/\" rel=\"noopener\">reporting line<\/a> (and this is undoubtedly worse where the CISO does not report to the CIO):<\/p><p><span style=\"font-size: 19px;\">Technologists are trained and incentivised to deliver functionality, not controls, and many, over the past decades, have developed a culture which sees security measures as constraints instead of requirements.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43c411e elementor-widget elementor-widget-text-editor\" data-id=\"43c411e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMany CISOs are constantly bombarded by \u201curgent\u201d requests to define security measures coming from IT people who should know better but are just \u201cpassing the buck\u201d.\n\nThe CISOs often feel that they would fail by not responding, not realising that this is a game they cannot win, and a form of political and emotional blackmail which must be avoided, especially outside large organisations where teams and resources tend to be smaller: The CISO and their team simply cannot be expected to be deep technical security experts on all technology streams and across all platforms, or to \u201cdrop everything\u201d at any time to help projects.\n\nOf course, they can rely on external skills (budgets permitting), but fundamentally roles, responsibilities and demarcation lines should be clear, and resources placed where they should be: The security of IT systems should be the responsibility of the respective IT teams. The security team should assist, validate and control while retaining a degree of independence. This is the spirit of all organisational models developed over the past 20 years around IT security. It should be clear and the CISO and their boss should have the backbone to enforce it.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba50bed elementor-widget elementor-widget-text-editor\" data-id=\"ba50bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFinally, in many cases,<strong> the <a href=\"https:\/\/corixpartners.com\/cyber-security-misleading-message-technology-industry\/\" rel=\"noopener\">greed<\/a> of the tech industry<\/strong>, which is only aggravating the situation:\n\nFor each of those alleged \u201cquick wins\u201d or \u201curgent\u201d issue to fix, there are countless vendors bidding to sell their stuff to put a tick in that box, irrespective of any bigger picture.\n\nThis is a pressure the CISO must resist. Over time, this accumulation of point solutions simply leads to a product <a href=\"https:\/\/corixpartners.com\/security-products-vendors-proliferation\/\" rel=\"noopener\">proliferation<\/a> problem which makes everything more difficult for the CISO and their team: From incident management to compliance reporting, security operations become burdened by the need to collect data across multiple platforms often in inconsistent formats, resources requirements escalate, and it aggravates the perception that security is just a cost and a pain, instead of a necessary barrier against real and active threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2febf4 elementor-widget elementor-widget-text-editor\" data-id=\"e2febf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe CISO and IT must build the discipline to work with a small number of security vendors and service providers around which they can structure effective and efficient security operations, properly segregated, proportionate to the threats the business is facing and the resources available to fight them.\n\nClarity of roles and responsibilities across Security and IT, and a clear approach putting People and Process first ahead of ready-made Technology solutions, are the basis on which the CISO can avoid the tactical trap. It is also the only basis over which cyber security maturity can grow, across any organisation, large or small.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Many CISOs struggle to look beyond day-to-day&nbsp;firefighting&nbsp;and get trapped in tactical games.&nbsp;In many firms, this goes beyond incidents and the natural need to address those. Clarity of roles and responsibilities across Security and IT, and a clear approach putting People and Process first ahead of ready-made Technology solutions, are the basis on which the CISO can avoid the tactical trap. It is also the only basis over which cyber security maturity can grow, across any organisation, large or small.&nbsp;<\/p>\n","protected":false},"author":529,"featured_media":4318,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[100],"ppma_author":[3178],"class_list":["post-2410","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-fraud-amp-risk"],"authors":[{"term_id":3178,"user_id":529,"is_guest":0,"slug":"jean-christophe-gaillard","display_name":"Jean-Christophe Gaillard","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b55e5afa-fb86-428a-a054-3be0451df2a4-150x150.jpg","user_url":"https:\/\/www.corixpartners.com","last_name":"Gaillard","first_name":"Jean-Christophe","job_title":"","description":"Jean-Christophe Gaillard\u00a0is Managing Director and Founder at Corix Partners. He is also a Non-Executive Director with\u00a0<a href=\"https:\/\/www.stratasecurity.co.uk\/\">Strata Security Solutions<\/a>, a specialized cybersecurity firm. He has been co-president of the Cyber Security group of the\u00a0<a href=\"https:\/\/www.telecom-paristech.org\/\">Telecom Paris Tech alumni association<\/a>\u00a0since May 2016. He is the author of \u201c<a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noopener\">Cyber Security: The Lost Decade<\/a>\u00a0\u2013 A Security Governance Handbook for the CISO and the CIO\u201d, He contributes regularly to\u00a0<a href=\"http:\/\/www.thedigitaltransformationpeople.com\/authors\/jc-gaillard\">The Digital Transformation People<\/a>,\u00a0<a href=\"http:\/\/www.business2community.com\/author\/jc-gaillard\">Business 2 Community<\/a>, and\u00a0<a href=\"https:\/\/www.iotforall.com\/\">IoTforAll<\/a>\u00a0platforms, as well as the\u00a0<a href=\"https:\/\/www.thebtn.tv\/\">Business Transformation Network<\/a>. He is an expert contributor on the\u00a0<a href=\"https:\/\/ciowatercooler.co.uk\/members\/jean-christophe-gaillard\/activity\/\">CIO Water Cooler<\/a>\u00a0and has previously published articles on\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/bridging-gap-security-it-operations\/\">InfoSecurity<\/a>\u00a0Magazine, \u00a0<a href=\"http:\/\/www.computing.co.uk\/ctg\/opinion\/2396800\/how-to-achieve-effective-cyber-security-in-a-hyperconnected-world\">Computing<\/a>, the C-Suite.co.uk,\u00a0<a href=\"http:\/\/www.informationsecuritybuzz.com\/?s=gaillard\">Info Sec Buzz<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.director.co.uk\/blog-cyber-insurance-what-do-you-think-youre-buying-20323\/\">IoD Director<\/a>\u00a0websites."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/529"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2410"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2410\/revisions"}],"predecessor-version":[{"id":34907,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2410\/revisions\/34907"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/4318"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2410"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}