{"id":8920,"date":"2020-07-15T07:20:36","date_gmt":"2020-07-15T07:20:36","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/?p=8920"},"modified":"2023-11-28T15:17:05","modified_gmt":"2023-11-28T15:17:05","slug":"does-the-role-of-the-virtual-ciso-make-any-sense","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/does-the-role-of-the-virtual-ciso-make-any-sense\/","title":{"rendered":"Does the role of the \u201cVirtual CISO\u201c make any sense?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8920\" class=\"elementor elementor-8920\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-541effcc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"541effcc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e7d021a\" data-id=\"2e7d021a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cae4422 elementor-widget elementor-widget-heading\" data-id=\"cae4422\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\n<h3 class=\"wp-block-heading\"><em>Outsourcing something simply because you don\u2019t understand it is rarely a good start.<\/em><\/h3>\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e48f1dc elementor-widget elementor-widget-text-editor\" data-id=\"e48f1dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Faced by constant reports of cyber-attacks in the media, most small and medium-size organisations have woken up to the\u00a0<a href=\"https:\/\/corixpartners.com\/cyber-security-when-not-if\/\" target=\"_blank\" rel=\"noreferrer noopener\">reality<\/a>\u00a0of cyber threats over the past few years.<\/p>\n\n\n\n<p>Many still don\u2019t really know what to do to protect themselves and turn to \u201c<a href=\"https:\/\/www.csoonline.com\/article\/3259926\/what-is-a-virtual-ciso-when-and-how-to-hire-one.html\" target=\"_blank\" rel=\"noreferrer noopener\">virtual CISO\u201d<\/a>\u00a0services for assistance.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb7bff2 elementor-widget elementor-widget-text-editor\" data-id=\"bb7bff2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>While this is better than doing nothing or relying blindly on the security of cloud providers, those externalised, part-time services \u2013 often delivered remotely \u2013 are rarely the magic bullet they pretend to be\u2026<\/p>\n\n\n\n<p>And let\u2019s eliminate upfront any language ambiguity: The idea of a \u201c<em>virtual<\/em>\u201d solution to a\u00a0<em>concrete<\/em>\u00a0problem created by\u00a0<em>real<\/em>\u00a0threats is dangerous, and the \u201cvirtual CISO\u201d shortcut is definitely one the security industry should try to eliminate: Beyond marketing and hype, either you need a CISO or you don\u2019t, but their role \u2013 and their actions \u2013 cannot be \u201cvirtual\u201d to counteract real threats.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f752515 elementor-widget elementor-widget-text-editor\" data-id=\"f752515\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Moving on from those considerations, the concept of an externalised, part-time and partly remote CISO role is generally attractive to small and medium-size organisations for numerous reasons:<\/p>\n\n\n\n<p>First, rightly or wrongly, they often see cyber security as a complex technical matter and feel that they do not have the right skills in-house; at the same time, they also think they do not need a full-time security role given their size. Of course, both aspects of that statement are disputable: It is not rare to find IT analysts with cyber security as their hobby who could make perfectly suitable CISOs in small firms; and the scale of the role depends of the level of maturity of each firm, its regulatory obligations and its security ambitions.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8dcbd4 elementor-widget elementor-widget-text-editor\" data-id=\"e8dcbd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Second, an externalised role is seen by many as a cheaper and more flexible, task-driven stepping stone for them to understand what the CISO job really entails and the value it can bring, before committing further.<\/p>\n\n\n\n<p>Finally, for some, externalising the position is also a way of ensuring a degree of independence with regards to internal politics.<\/p>\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af089ba elementor-widget elementor-widget-text-editor\" data-id=\"af089ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Those last two aspects are defendable and may lead to positioning the role at a level where it really adds value. But organisations must also consider the following points to avoid taking a wrong direction:<\/p>\n\n\n\n<p>\u201cWe can\u2019t afford a full-time role\u201d is an excuse often heard around the appointment of a so-called \u201cvirtual CISO\u201d<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddd6327 elementor-widget elementor-widget-text-editor\" data-id=\"ddd6327\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>But this is not just about what one organisation can \u201cafford\u201d: Anybody who has spent enough time in the security industry would know that money appears out of\u00a0<a href=\"https:\/\/corixpartners.com\/knee-jerk-reactions-data-breaches-damaging-case-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">nowhere<\/a>\u00a0at the first sight of an incident \u2013 or of an audit point in some firms\u2026<\/p>\n\n\n\n<p>And how can you determine how much to spend on security until you really understand what you need to do to protect yourself and meet your regulatory obligations?<\/p>\n\n\n\n<p>Outsourcing something simply because you don\u2019t understand it is rarely a good start.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8514d9 elementor-widget elementor-widget-text-editor\" data-id=\"b8514d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>The decision around right-sizing and externalising \u2013 or not \u2013 the role of the CISO must primarily be about what one organisation wants and needs to achieve around cyber security, and the message it wants to send to its ecosystem on that matter.<\/p>\n\n\n\n<p>Having a CISO of some sort will always be better than not having one when it comes to demonstrating adherence to security values but relying on an externalised part-time service could send a weak confidence signal to customers, partners or potential investors.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6462dc0 elementor-widget elementor-widget-text-editor\" data-id=\"6462dc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Then it is worth considering the real nature of the role itself, even in small to medium-size organisations: It cannot be reduced to tasks and projects; \u201cSecurity by Design\u201d and \u201cPrivacy by Design\u201d principles are becoming the\u00a0<a href=\"https:\/\/corixpartners.com\/security-privacy-by-design-a-cultural-revolution-and-a-matter-of-corporate-social-responsibility-for-tech-firms\/\" target=\"_blank\" rel=\"noreferrer noopener\">norm<\/a>, and to work well, the role of the CISO must be embedded within operational processes.<\/p>\n\n\n\n<p>In small and medium firms, those processes are simpler than in larger structures and rely on people who simply know each other and work together.<\/p>\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a940d8 elementor-widget elementor-widget-text-editor\" data-id=\"1a940d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Developing an inner knowledge of the organisation and its culture is always going to be key for the CISO in small firms, and it will definitely be harder to establish if the role is externalised and delivered on a part-time basis or remotely. At best, it could take a long time to deliver value; at worse, it could simply become useless.<\/p>\n\n\n\n<p>Finally, organisations deciding to take that route must also consider the portfolio of other clients their externalised CISO would be supporting. This is absolutely essential to avoid conflicts of interests \u2013 for example up and down the supply chain \u2013 and the risk of confidentiality breaches \u2013 for example towards competitors.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fc1308 elementor-widget elementor-widget-text-editor\" data-id=\"3fc1308\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Overall, beyond any cynical \u201cbox-checking\u201d and before jumping to ready-made conclusions, small and medium firms should consider the following questions to determine the type of CISO they need:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What\u2019s their initial level of cybersecurity maturity?<\/li>\n<li>What\u2019s their ambition in terms of maturity development?<\/li>\n<li>In which regulatory framework do they operate? And how is it likely to evolve over the short to mid-term?<\/li>\n<li>What is the level of cybersecurity maturity of the supply chain or the ecosystem around them?<\/li>\n<li>What are the levels of cybersecurity expectations of their customers, partners or investors?<\/li>\n<\/ul>\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-858a8f4 elementor-widget elementor-widget-text-editor\" data-id=\"858a8f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>It\u2019s only by looking at their own cybersecurity context in that way that they will be able to right-size and position a CISO role which will work for them.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Faced by constant reports of cyber-attacks in the media, most small and medium-size organisations have woken up to the reality of cyber threats over the past few years.nMany still don\u2019t really know what to do to protect themselves and turn to \u201cvirtual CISO\u201d services for assistance.<\/p>\n","protected":false},"author":529,"featured_media":8921,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[451,450,452],"ppma_author":[3178],"class_list":["post-8920","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-cyber-attacks","tag-cyber-threats","tag-virtual-ciso"],"authors":[{"term_id":3178,"user_id":529,"is_guest":0,"slug":"jean-christophe-gaillard","display_name":"Jean-Christophe Gaillard","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b55e5afa-fb86-428a-a054-3be0451df2a4-150x150.jpg","user_url":"https:\/\/www.corixpartners.com","last_name":"Gaillard","first_name":"Jean-Christophe","job_title":"","description":"Jean-Christophe Gaillard\u00a0is Managing Director and Founder at Corix Partners. He is also a Non-Executive Director with\u00a0<a href=\"https:\/\/www.stratasecurity.co.uk\/\">Strata Security Solutions<\/a>, a specialized cybersecurity firm. He has been co-president of the Cyber Security group of the\u00a0<a href=\"https:\/\/www.telecom-paristech.org\/\">Telecom Paris Tech alumni association<\/a>\u00a0since May 2016. He is the author of \u201c<a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noopener\">Cyber Security: The Lost Decade<\/a>\u00a0\u2013 A Security Governance Handbook for the CISO and the CIO\u201d, He contributes regularly to\u00a0<a href=\"http:\/\/www.thedigitaltransformationpeople.com\/authors\/jc-gaillard\">The Digital Transformation People<\/a>,\u00a0<a href=\"http:\/\/www.business2community.com\/author\/jc-gaillard\">Business 2 Community<\/a>, and\u00a0<a href=\"https:\/\/www.iotforall.com\/\">IoTforAll<\/a>\u00a0platforms, as well as the\u00a0<a href=\"https:\/\/www.thebtn.tv\/\">Business Transformation Network<\/a>. He is an expert contributor on the\u00a0<a href=\"https:\/\/ciowatercooler.co.uk\/members\/jean-christophe-gaillard\/activity\/\">CIO Water Cooler<\/a>\u00a0and has previously published articles on\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/bridging-gap-security-it-operations\/\">InfoSecurity<\/a>\u00a0Magazine, \u00a0<a href=\"http:\/\/www.computing.co.uk\/ctg\/opinion\/2396800\/how-to-achieve-effective-cyber-security-in-a-hyperconnected-world\">Computing<\/a>, the C-Suite.co.uk,\u00a0<a href=\"http:\/\/www.informationsecuritybuzz.com\/?s=gaillard\">Info Sec Buzz<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.director.co.uk\/blog-cyber-insurance-what-do-you-think-youre-buying-20323\/\">IoD Director<\/a>\u00a0websites."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/529"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=8920"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8920\/revisions"}],"predecessor-version":[{"id":34464,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8920\/revisions\/34464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/8921"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=8920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=8920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=8920"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=8920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}