The CxO Business Executive and Security Leadership’s Guide to Cyber Security Harmony
By: Aaron Pritz–CEO and Co-Founder, Reveal Risk
Let’s face it: The relationship between many cyber security leaders, broader business executive leaders, and their boards at companies are not ALL exactly thriving. Despite a lot of industry discussion, tactical use of FUD (fear, uncertainty, and doubt), and an endless media barrage of breaches, there is still a major disconnect between business leaders, boards and cyber security leaders.
Some of the vocal narrative I’ve heard on both sides of the leadership equation include:
The Frustrated CxO (CEO, CFO, COO, CRO, CMO, CIO, CPO etc.):
The Frustrated CISO/Cyber Security Leader:
The truth is that all these statements, perceptions, and poor leadership behaviors are rooted from some experience or set of experiences the leader previously had that has driven them to think and operate the way that they do. You aren’t going to fix this overnight. Let’s look at some potential root causes.
The CxO’s Common Issues:
The day where cyber security can be solely managed within the dark basements of IT are no longer a reality for most companies. Many CxO leaders know this, but they often struggle to translate this into action. I’ve observed various strategic/political and motivational/capability root causes result in lack of appropriate executive action and involvement:
The CxO and board must proactively take action if he/she wishes to address the common problems that plague cyber security teams today. They need to remember in a hierarchical structure, it often takes the right engagement level, attitude, humility, and empathy to get the most out of subordinate leaders that are often nested layers beneath them. Not leveraging these soft skills plus a foundational approach (that this guide provides) can silo and disconnect key leadership interactions. These ten proactive themes and questions can help focus the engagement on both sides of the table and maximize the value of the time that must be spent on cyber security to obtain the desired executive understanding, action, and harmony.
The CxO’s Solutions:
While this playbook is designed for the CxO, it can be used by security leaders to proactively engage with executive stakeholders and achieve harmony.
1.BUSINESS RISK: What are our most critical risks to our specific business and operations?
2. THREAT LANDSCAPE: What are our most concerning threats that we are seeing right now? (Note: You want to focus on the current state and slightly into the future because there is no crystal ball.)
3. CURRENT STATE MATURITY: Where are we right now in our IS (Information Security) program maturity journey?
4. FUTURE STATE MATURITY: What are we striving to achieve in our IS program journey over time?
5. MEASUREMENT OVER TIME: How will we measure progress towards our goals of getting from our current state to our desired future state outcomes?
6. INTERNAL PARTNERING: How are we partnering across cyber security, physical security, IT, legal, compliance, and privacy for both efficiency as well as risk coverage?
7. EXTERNAL PARTNERING: How is the cyber security team connected to cross-company sharing groups or individual relationships?
8. CISO’S BIGGEST CONCERNS: What most concerns you about the current state of cyber security at our company? (Sometimes this is phrased as “what keeps you up at night” but I’ve seen some awkward answers to this question because it varies across egos and sleeping habits vs asking it more forward to the true intent).
9. EXECUTIVE SUPPORT: What help do you need from the company and executive team? (financial, organizational change/sponsorship, governance, making decisions)
10. Workforce Awareness and Engagement: How is the organization engaging around information security and what is cultural maturity?
Leaders need to treat this discussion playbook truly as a guide vs a script. And as with any important initiative, it cannot be a onetime discussion. Conversations should be dynamic, and people still need to use their analytical and conversational acumen. However, if more company leaders were having this level of conversation and action (even 80%), cyber security would be in a completely different state of control and transformation. Think about the big publicized breaches and how many leaders were caught off guard, not in the right loop, and blamed specific people or things when the problems were truly holistic.
***
Do you have any other key questions or ways that you focus these leadership engagements? Feel free to leave a comment and this playbook will be updated as needed to maximize the value for all. Also share your feedback if you found this helpful.
At Reveal Risk, we evaluate, design and deliver strong processes and results in cyber, privacy, risk that work efficiently, are fit-for-purpose, and are sustained. If you find that you want assistance in building your company’s cyber security strategy, governance, and plan towards desired state maturity, please don’t hesitate to connect with us at info@revealrisk.com.
317.759.4453
About the Author
Aaron Pritz is senior IT/Security/Privacy/Risk leader with over 20 years of experience including at a large pharmaceutical company in the Midwest. Aaron co-founded Reveal Risk in 2018 after seeing significant corporate leadership and “execution of strategy-to-operations” capability gaps in the cyber security and privacy consulting industry. Aaron is a creative thinking strategist that brings strategies to life through engaging approaches and teamwork. He is an active industry influencer and speaker on the topics of business-driven risk management, insider theft, and cyber security in healthcare, and is no stranger to helping companies progress both before and after incidents/breaches (ideally the former!).