fbpx

The 2023 Fortune 500 CISOs Analysis

Guaranteed Results

After months of research and analysis, we are releasing the most complete study on the 2023 Fortune 500 Chief Information Security Officers (CISOs) and want to offer up some observations you may find interesting.  Most of the lists of the Fortune 500 CISOs on the internet are from previous years and are now significantly outdated.

See the full searchable Fortune 500 CISOs list here 

In addition, they only provide names, companies, and titles. I wanted to go much deeper.  As a Retained Executive Search firm that specializes in placing CISOs and their direct reports, we are deeply engrained in the CISO community and knew it could be a highly useful resource.   

This list is always changing.  We have a high degree of confidence that most of the data is correct as of November 2023.  However, every time we reviewed the data over the past few months, more changes have occurred. We have changed over 100 of the individuals and updated all 500 profiles. Our goal is to continuously update this list until the 2024 Fortune 500 is updated, then we will rework it entirely.  Please help us keep this list updated.  If you have corrections, updates, or suggestions, please submit them here.

Why is this list needed? 

  1. Complexity of the CISO Role: It shines a light on what is the most complex and difficult executive role proven by the shortest retention rate of all the executive positions.  The CISO position often has an extraordinarily broad list of responsibilities.  Here’s a quick glimpse of those responsibilities: Personas of a CISO.
  2. Support for the CISO:  The CISO role is frequently a high-stress, under-appreciated, and under-funded position. In a recent Fortify Experts leadership survey, 64% of leaders felt they were underfunded and understaffed.  CISOs have all the pressure to protect the company, but often not the support to do it effectively. 
  3. Lack of CISO:  19% (94) of Fortune 500s do not have a dedicated CISO.  Many Fortune 500s have not elevated security to the executive level.  
  4. Diversity: Raise the level of visibility on the lack of diversity within the Fortune 500 CISO position.

Data Sources:

We have scoured all of our data sources and tried to cross-reference them to ensure our list is as accurate as possible.  Here’s a sample of the data sources used.

  1. Personal LinkedIn Networks: I am personally connected with 30,000 people over 10,000 ow which are security leaders. Plus, our team is directly connected with similar-sized LinkedIn networks.
  2. Talent Management Database: We are constantly interviewing, monitoring and updating over 20,000 security leadership profiles, plus leverage AI to scan for public profile changes.
  3. LinkedIn Recruiter License:  The LinkedIn Recruiter tool allows us to access to all of the LinkedIn profiles. Most people are limited to only seeing within 3 degrees of their connections   It also gives us powerful filtering and discovery tools, plus allows us to set up CISO job change alerts.
  4. CISO Forums: We host monthly CISO Forums to stay up to date on current trends and changes within the industry.
  5. Cybersecurity DIVAS: We started the non-profit Cybersecurity DIVAS to promote the successes of women in security and to build mentorships to improve diversity in security. See the list of over 200 Cybersecurity DIVAS (women security leaders) who have been incredibly impactful in Security.
  6. Other Data Sources: We subscribe to many data tools such as ZoomInfo, Checkmate, and SalesQL, plus we belong to security organizations such as Infragard, ISSA, ISACA, etc.

F500 List Observations:

Elevating the Importance of the Role: With 19% of the Fortune 500 firms (94 of them) not having a designated CISO, does it send the wrong message to the public and investors that those companies either view security as a technical problem or it is not critical to their success?

Fifty-one (10.2%) of the F500 firms without a CISO designate the Chief Information Officer (CIO) as their acting CISO. Most security executives criticize this approach, because they say that the CISO role can be in direct opposition to the CIO. They say it is like the “fox watching the hen house” because both roles have competing agendas and budgets.

In addition, the combined CIO/CISO role is criticized because of the breadth of responsibilities required by the CISO. This often includes risk management, governance, compliance, 3rd party assessments, technical controls, pen testing of systems, security engineering, and architecture. Critics say this addition is too much for a CIO of a major corporation to oversee adequately.

Seventy-four of the 94 firms without CISOs, designate a Director level resource as the top security person. Most often this is a Director of Security or Information Security that reports to the CIO.

In 2019, HelpNet Security reported that 38% of the F500 did not have a CISO. Today it is down to 19%. While this is a significant improvement, the increasing number of breaches (2023 is the worst year ever) and the severity of them, the fact that 94 major corporations still do not have a dedicated CISO is pretty eye-opening.

To elevate security across public companies, the Securities and Exchange Commission (SEC) adopted new cybersecurity rules that go into effect on Dec 18th, 2023. The new rules require companies to disclose their cybersecurity risk management strategies and governance policies. Plus, they require companies to file disclosures within four business days of experiencing a material (i.e. potential stock impacting) cyber-incident.

The goal of the SEC was to put additional pressure on public firms to provide cybersecurity visibility which should lead to a higher awareness and attention. This will likely lead to more firms elevating security and assigning an official CISO.

Learn how to hire a great CISO with our Insider’s Guide.

Download Now!

Retention:

For many years, it has been reported by multiple sources, such as Forbes and CSO magazine, that the average tenure for a CISO is about 24 months. In our research, this is still true with the SMB market, we did not find it true with the CISOs at the F500 firms. In fact, the CISO tenure averaged just over 4.5 years. The median of the CISOs’ tenure was 3.6 years.

The average CISO tenure within the company was 8.3 years with a median of 5.3 years. We found a large portion of CISOs (38%) were promoted from within the firm. This proves that sometimes the grass is not always greener on the other side. Many loyal, long-term employees have been rewarded with an internal promotion up to the CISO level.

Note: The average and mean were calculated from the best available data sources. When there was no clear data available, those numbers were not included in the final results. Plus, many leaders are not as quick to update social media profiles which may lead to errant or outdated data. Please submit all corrections here.

Turnover

There were a number of turnovers within the past 6 months (May to Nov 2023) where 27 or about 5% of the F500 companies changed CISOs. There are 10 firms that have recently had their CISO position vacated either through a release or resignation and have yet to announce a replacements. These firms are:

24Kroger
119Lennar
209Becton Dickinson
262BorgWarner
269Ball
276DCP Midstream
329Ovintiv
413CenterPoint Energy
460ARKO
491SVB (Assets purchased by First Citizens Bank)
Fortune 500 CISO Vacancies – Nov 2023

Diversity

Throughout the 1990s and early 2000s, security was not a sexy career choice for most women. It had a reputation of being a heavily male-dominated and ego-driven career path full of nerds. The women who survived that era were battle-scared and toughened. Very few rose to the top.

This gave rise to the purpose behind Cybersecurity DIVAS when we created it back in 2020. We wanted to honor those women who succeeded in what were often unfriendly work cultures. Our goal was to promote and normalize those successes and to create real one-on-one mentorships between these leaders and women aspiring to be like them.

2021 Fortify Experts Cybersecurity Diversity Study

With the help of Cybersecurity DIVAS and many other diversity initiatives. some progress is being made as we are getting closer to 25% of cybersecurity roles being filled by women.

However, the biggest void is the lack of diversity at the security architect level. This has traditionally been the required pathway to get to the CISO level. Since this architect role is the least diverse role in cybersecurity (less than 7% women), executive leadership have been trying to accelerate diversity by skipping over this architecture space and promoting women and minorities out of different pathways. Most often, this involves promoting someone from the GRC career pathway or general IT instead of the more technical security architecture pathway.

2021 Fortify Experts Cybersecurity Diversity Study

While many, many excellent leaders have emerged from these alternative pathways, I think it has created some weaknesses in the role. In my observations, when a publicized breach occurs, I have to admit I look for the pathway taken by the CISO and there seems to be a correlation between breaches and leaders who have come up through the GRC or general IT route and have not spent time in security architecture. It would be interesting to study this to see how strong the correlation is. Leaders with this alternative history can do an excellent job as long as they surround themselves with the right leadership team and are willing to listen to them.

In my very humble opinion, firms should be doubling down on diversifying the security architect roles to help grow a more technically-minded diverse leadership pool of candidates. In 2023, we helped several firms increase diversity in their security architecture teams.

Now, off my soapbox and back to the F500.

Our list includes pictures. This is the first list you can visually search to quickly tell the diversity or lack of diversity in each leader. When we only look at the dedicated security leaders (excluding CIOs), we find that 13.8% of them are women. This is slightly up from the 13.3% across all security leaders in the 2021 Fortify Experts Diversity Study.

There are 23 African American F500 CISOs which is 4.7% of the total CISO population but only 4 of those are African American women (0.8%). I did not dive deeper into the other minorities, because when we are engaged on a CISO diversity search, those are the two categories that clients are most interested in. For most firms interested in improving diversity numbers, Latinos, Cubans, Indians, Asians, and Veterans don’t appear to move the needle on diversity decisions.

Diversity should be seen as a strength. As a Certified Birkman Coach, we also encourage building diverse teams based on neurodiversity instead of just focusing on ethnic or gender diversity.

Many studies have proven that neurodiverse teams can be up to 33% more creative and productive. In creating a neurodiverse team, we focus more developing teams based on a mix of different core personality types such as:

  • Drivers/Task Masters – People who demonstrate strong leadership skills to keep the team moving forward.
  • Communicators – People with strong communicators who can sell the ideas internally and externally.
  • Analytical/Process Oriented – People who look love to look for patterns and analyze data to derive solutions.
  • Deep Thinking Creatives – People who are more introspective that come up with creative problem solving solutions.

Neurodiversity is more about how a person think, not what their skin color or gender is. However, it naturally leads to a more diverse team because you begin to look for people that are different than other members of the team.

Highly productive neurodiverse teams result because brainstorming, problem-solving and creativity come from a team with a wider perspective.

I do believe a diverse leadership team is important in setting the tone but, I encourage firms to not solely focus on the leadership. Instead, build from the bottom up to create a strong base that you can promote up. Again, this is the purpose of www.cybersecuritydivas.com to build a pool of talented diverse security candidates who are ready to take on the next generation of security challenges.

Conclusion

I hope you find this F500 CISO list useful. Help us keep it up to date here. If you are looking to hire a CISO, that is our specialty. We work with and interview CISOs every day from the F500s, to startup CISOs, to virtual CISOs. We have developed a sure-fire methodology to help you identify, assess, evaluate, and hire the very best CISO for your specific situation.

Download our free Insiders Guide to “How to Hire a CISO”.

About Tim Howard

Tim Howard is the founder of 5 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as providing expert leadership advisory consulting.  

He has a passion for helping CISOs develop higher-performing teams through coaching, creating topic-rich CISO Forums, and by helping them improve their careers.

He also teamed up with Lyndrel Downs to launch www.CybersecurityDIVAS.com to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the cybersecurity industry.

Tim has been leading technology staffing teams for over 20 years and has degrees from Texas A&M University in Industrial Distribution and Marketing.  

Invite me to connect:  www.linkedin.com/in/timhoward

Employment Opportunities

Powerful Tips on How You Can Land Your Next Dream Job

As an executive search firm owner for over 15 years, I’ve seen some very powerful job-hunting techniques that will really help accelerate your job-hunting process, but more importantly, help you land not just any job but your next dream job.  These techniques work in a hot or a slower job market.   I’ve written articles about each one of these techniques below and have also provided you real-time links for which companies are hiring RIGHT NOW!

I hope these help you in your job search.  If we can be of assistance, please reach out.  Below you will find many tips so if you know someone else who could also benefit from this, please share it with them.

Recovering From a Job Loss:

Finding Job Opportunities:

Attracting Hiring Managers:

Interview Prep: 

Job hunting is a full-time job itself and companies are hiring.  Within these articles, you will find ways to be more strategic and productive, than just applying on-line.  We hope you find this helpful.  Your diligence and technique will outperform your luck.  Good hunting.

About Tim Howard

Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments

In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.

He also teamed up with Lyndrel Downs to launch www.CybersecurityDIVAS.com to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the cybersecurity industry.

Tim has been leading technology staffing teams for over 20 years and has degrees from Texas A&M University in Industrial Distribution and Marketing.  

Invite me to connect:  www.linkedin.com/in/timhoward

12 Reasons Why You Should Invest in a Retained Search to Hire Cybersecurity Experts

There is a tremendous misconception that retained searches are too costly but the ROI proves differently.

The reason the majority of CXO searches are conducted through retained searches is because the ROI exceeds the cost of the search.  For cybersecurity positions, many of the same ROI reasons apply. 

Why should I consider a retained search for cybersecurity talent?

  • Shortage of Cybersecurity Talent:  

    Today there is projected to be more than 3.0 million more security job openings than there are qualified people to fill those positions. Retained Search firms who specialize in cybersecurity will already have the network and relationships to quickly identify where the right sources are.  
  • Cybersecurity Expertise:

We often find that clients do not understand the breath of the security role and do not have the expertise on staff to accurately and adquately identify if candidates truly have the skills needed to perform at an effective level.  By hiring a specialized cybersecurity retained search firm who interviews security professionals every day, they can help align and qualify candidates to ensure there is a good technical and cultural fit.

  • Top Talent Attraction:

    The top security talent (i.e. leaders, architects, engineers, etc. ) is in high demand. They are bombarded with recruiting emails every day.  A retained search will always attract many more of these embedded candidates who are very hard to get their attention.
  • Salary Cost Savings:

If you over pay for talent, you can generally find people, but then you are stuck paying for those salaries well beyond the hiring date.  Our firm, Fortify Experts, is frequently brought in to find Top Talent at market rates.  Clients often find that when you have highly targeted retained searches uncover more affordable talent because they don’t target active job seekers.

  • More Targeted and Refined Candidate Matching: 

    Only 20-25% of potential security candidates will even respond to typical recruiting calls or emails.  Retained searches increase the response rate to over 65%!  This allows a more rifle-targeted approach instead of a shotgun approach.
  • Commitment:   

Security searches are hard.  Contingent recruiters have no “skin” in the game to stick with hard searches.  They only get paid if they make a placement, therefore, they quickly gravitate to the newest and easiest position to fill.  Retained searches require a dedicated commitment to fill the position.

  • Confidentiality:

When replacing vital leadership many firms do not want to blast to the general public a position is vacant or open especially if this position is a replacement position.  Retained searches are much easier to conduct with complete confidentiality.

  • Reputation: 

Posting a security leadership position can attract many unwanted inquiries especially after a breach.  From the news media to every security leader “want-a-be”, most firms do not want the attention a security leadership posting will bring to the organization.

There is a tremendous misconception that retained searches are too costly but the ROI proves differently.

The reason the majority of CXO searches are conducted through retained searches is because the ROI exceeds the cost of the search.  For cybersecurity positions, many of the same ROI reasons apply. 

Why should I consider a retained search for cybersecurity talent?

  • Shortage of Cybersecurity Talent:  

    Today there is projected to be more than 3.0 million more security job openings than there are qualified people to fill those positions. Retained Search firms who specialize in cybersecurity will already have the network and relationships to quickly identify where the right sources are.  
  • Cybersecurity Expertise:

We often find that clients do not understand the breath of the security role and do not have the expertise on staff to accurately and adquately identify if candidates truly have the skills needed to perform at an effective level.  By hiring a specialized cybersecurity retained search firm who interviews security professionals every day, they can help align and qualify candidates to ensure there is a good technical and cultural fit.

  • Top Talent Attraction:

    The top security talent (i.e. leaders, architects, engineers, etc. ) is in high demand. They are bombarded with recruiting emails every day.  A retained search will always attract many more of these embedded candidates who are very hard to get their attention.
  • Salary Cost Savings:

If you over pay for talent, you can generally find people, but then you are stuck paying for those salaries well beyond the hiring date.  Our firm, Fortify Experts, is frequently brought in to find Top Talent at market rates.  Clients often find that when you have highly targeted retained searches uncover more affordable talent because they don’t target active job seekers.

  • More Targeted and Refined Candidate Matching: 

    Only 20-25% of potential security candidates will even respond to typical recruiting calls or emails.  Retained searches increase the response rate to over 65%!  This allows a more rifle-targeted approach instead of a shotgun approach.
  • Commitment:   

Security searches are hard.  Contingent recruiters have no “skin” in the game to stick with hard searches.  They only get paid if they make a placement, therefore, they quickly gravitate to the newest and easiest position to fill.  Retained searches require a dedicated commitment to fill the position.

  • Confidentiality:

When replacing vital leadership many firms do not want to blast to the general public a position is vacant or open especially if this position is a replacement position.  Retained searches are much easier to conduct with complete confidentiality.

  • Reputation: 

Posting a security leadership position can attract many unwanted inquiries especially after a breach.  From the news media to every security leader “want-a-be”, most firms do not want the attention a security leadership posting will bring to the organization.

6 Critical Questions to Ask a Cybersecurity Search Firm Before you Hire Them

As a generalist technology executive search firm owner for almost 15 years and now having run a specialized cybersecurity search firm for the past 5 years, I have found there are critical differences between the two areas. I hope to shed some light on those differences here.

As a hiring manager or talent acquisition leader, it is essential to properly qualify search firms upfront, otherwise, search firms can waste a tremendous amount of your time, and it may result in a mishire of a security expert which can be extremely painful and costly to replace. Plus, it could put your company and your company’s data at risk.

As you may know, finding the right security talent is not easy. There are a lot of ‘wannabe security folks” out there who try to pass themselves off as security experts. They know common buzzwords that can trick many recruiters who are not intimately familiar with security. Most often, when a search firm is engaged, you are looking to hire a person with existing skills who can “hit the ground running.” A security-focused recruiter can dig deeper to uncover if candidates have the appropriate practical and proven experience for that specific position.

“It’s not who’s looking for you, it’s who you are looking for.”

Therefore, here are some questions you should be asking any search firm before you hire them to work on critical security roles:

  1. How many security engineers, architects or executives have they placed in the past 6 months?  If this is a larger search or staffing firm, ask who would be assigned to your recruiting effort and then ask how many security professionals has that person placed? Just because a national firm has placed security professionals, it does not mean the person assigned to you will know anything about the security domains which are important to your company. Also, ask for references from their clients and talk to the security professionals they have placed. Did the candidate and the client enjoy the experience? How responsive was the firm? Did they help elevate the reputation of the hiring company during the search?
  2. Are they active members of any security organizations such as ISSA, ISACA, InfraGard, CSA, etc.?  Security professionals often avoid posting their details to LinkedIn, job boards, and social networks. In fact, I would be leary of those security professionals who post too many details on the internet. To find the highly desired, embedded security candidates, a search firm must actively participate and build trust within the security community.
  3. Is the search firm actively involved in making a difference within the cybersecurity community?  Security professionals are inherently suspicious, otherwise, they wouldn’t be good at what they do. They work with people whom they know and trust. A search firm that is recognized, influential, and a trusted insider will be able to attract those passive or embedded candidates and leverage a strong referral network within the community. Does the firm host events such as CISO Forums? Are they publishing useful security-related content? Are they improving the industry by leading efforts such as diversity initiatives (i.e. Cybersecurity DIVAS) or hack-a-thons.
  4. Do they recruit off of a job description, or do they take the time to understand the gap which needs to be filled? When interviewing a search firm, listen to the questions they ask. Are they only interested in the ‘skills’ they can search on, or do they understand the functions of the role?  Are they asking probing questions about how a new hire can make a bigger impact on the team?  Whether it be a SOC Analyst or a Cloud Security Architect, knowing the normal day to day challenges within that role allows a search executive to evaluate the candidates more thoroughly and accurately.
  5. How do they qualify security candidates? Ask the search firm or recruiter what qualification questions they would ask for a variety of security domains. If they say they need to get back to you, you know they are scrambling or Googling for those questions. Qualifying firewall engineers, threat analysts, SIEM developers, and Cloud Security Architects is very different. Evaluating a CISO across all the 12 main security domains can be very challenging. A search executive who can’t speak the language or properly qualify the talent will waste your time and not be able to attract the talent you want to hire.
  6. How many current security positions are they recruiting for now? Are they a “wannabe” security recruiter? Do they have a current queue of security professionals they are working with or will they start this search from scratch?  Their website job postings will tell the real story. Review their existing posted positions. Are they a generalist or are they really focused on security roles?

As described, recruiting security experts is a very different process than hiring IT support or development personnel. Most recruiters rely heavily on in bound candidates from job postings listed on LinkedIn, Monster, Career Builder, Indeed, ZipRecruiter, etc. It is extremely rare for great security candidates to come in through job postings.

Case in Point: Over a one year period, our firm received over 10,000 resumes from one of those above sources (out of respect I won’t name which one). We only placed one “inbound” candidate after reviewing those 10,000 resumes and that person was released in under three months which was a blemish on our reputation. This is why our motto continues to be, “It’s not who’s looking for you, it’s who you are looking for.”

Security candidates who do have extensive LinkedIn profiles will continue to be pursued heavily even after they are hired.

Really good cybersecurity professionals don’t need to respond to a job posting. They often receive 10-20 recruiting calls and emails every day. Rarely will they respond to an unknown recruiter as they know they are in extremely high demand. If they want a new position, they most often leverage their trusted security network.

More and more security professionals are reducing their social footprint on LinkedIn and other social platforms. Security candidates who do have extensive LinkedIn profiles will continue to be pursued heavily even after they are hired. This leads to a higher turnover rate, salary demand, and a lower return on investment. Therefore, those professionals may not be the ones you want to target. This is why it may be a big advantage to hire a firm who has already built a deep and trusted network within the industry.

To conduct a successful security search, search professionals must know this domain well, leverage trusted relationships, and be influential in the industry to be able to attract those highly valuable embedded candidates.

About Tim Howard

Tim Howard is the founder of Energy Sourcing (www.energysourcing.com) and Fortify Experts (www.fortifyexperts.com) which helps companies hire and deploy exceptional “Embedded” talent through executive search perm placement and expert consulting. 

In addition, he has a passion for helping companies develop Higher Performing Teams by working with them to increase effective communications, improve non-productive behaviors and on-board faster by providing clients with “Employee Operating Manuals“.

He has teamed up with Lyndrel Downs to launch www.CybersecurityDIVAS.com to help promote the most influential women in cybersecurity and provide a mentoring program to help increase encourage and support more diversity within the industry.

He has been leading technology staffing teams for over 15 years and is the founder of three other technology firms. He has degrees from Texas A&M University in Industrial Distribution and Marketing.  

Invite me to connect:  www.linkedin.com/in/timhoward

CISO Forum: Securing AI – Cybersecurity Leaders’ Take On Generative AI and LLMs

A Deep Dive into AI and the Concerns and Strategies of Security Leaders With the rapid adoption of Generative AI and Large Language Models (LLMs), a subset of Generative AI, such as OpenAI’s ChatGPT and Google’s BARD and others, securing a business against cyber threats just became infinitely harder.

At the recent CISO Executive Forum hosted by Fortify Experts, over 35 security leaders discussed the concerns of employees using LLMs in the workplace.

Chart 1: Security Leaders’ Concerns

Security Leaders Express Concerns In a survey conducted among the forum’s security leaders, a staggering 100% expressed varying degrees of concern regarding the security risks associated with the use of LLMs in their organizations.

Integration of Generative AI in Major Software Leading software companies such as Microsoft, Salesforce, and Canva are actively incorporating Generative AI into their core offerings to empower users. Consequently, businesses are faced with the reality that they can no longer simply restrict access to AI. This AI empowerment, while beneficial, also presents an unforeseen challenge: it empowers malicious actors with unprecedented avenues to exploit users and organizations.

“Businesses will have 10 times the number of attacks coming at them now,” warns one Chief Information Security Officer (CISO).

Chart 2: The Emergence of Shadow AI

The Rise of Shadow AI Similar to the concerns surrounding Shadow IT a few years ago, a new threat has emerged—Shadow AI. This term refers to users employing unapproved and unauthorized AI systems for business activities. The ramifications of Shadow AI include privacy breaches, loss of intellectual property, and an open door for attacks. Even well-intentioned actions, like code checks for vulnerabilities, can inadvertently create security risks.

Chart 3: Top Security Vulnerabilities

Top Security Vulnerabilities When asked about their primary security concerns, a substantial 64% of security leaders cited the disclosure of sensitive data as their top worry. This was closely followed by 50% expressing concerns about supply chain impacts and the introduction of additional third-party risks. These vulnerabilities underscore the critical need for robust cybersecurity measures.

Chart 4: Current Actions Taken by Companies

Current Actions Taken to Address LLM Security Concerns An alarming revelation from the survey is that over 85% of the represented companies have implemented very few technical controls to prevent users from sharing sensitive data or reducing potential vulnerabilities when using LLM AI solutions. Only 14% felt they had adequate controls in place.

Chart 5: Current LLM Security Maturity

To address LLM security concerns, 29% of respondents reported limiting access to approved users, while 7% have opted to block access to all LLMs in the workplace. 50% of leaders were in the process of developing appropriate use policies and procedures for LLMs.

The Acceleration of Generative AI Generative AI is advancing at an astonishing pace, introducing new productivity capabilities daily. The upcoming release of OpenAI’s GPT-5 promises to revolutionize AI capabilities again by seamlessly integrating voice, text, and images. It will serve as a virtual assistant, capable of content creation, task execution, teaching, visual analysis, and offering recommendations.  Businesses risk falling behind if they do not harness the full potential of Generative AI.

Embracing AI Securely In the face of these transformative changes, leaders who advocate for blocking AI entirely may find themselves sidelined. Instead, security leaders must embark on a journey to enable AI securely, ensuring that businesses not only survive but thrive in this new AI-powered era. In the next article, we will dive deeper into the discussions with these 35 security leaders, exploring strategies for securely enabling AI within organizations and fortifying the future of cybersecurity.

About Tim Howard

Tim Howard is the founder of 5 technology firms including Fortify Experts which helps companies hire Cybersecurity Leadership and AI Cyber Advisors which helps companies to Securely Enable AI through Strategic Risk Assessments and deploying AI Secure Solutions. 

In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures. He also teamed up with Lyndrel Downs launch  www.CybersecurityDIVAS.com to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the cybersecurity industry.

Tim has been leading technology staffing teams for over 20 years and has degrees from Texas A&M University in Industrial Distribution and Marketing.   Invite me to connect: www.linkedin.com/in/timhoward

8 Ways Leading CISO’s Create Higher Performing Security Teams

“Part of the CISO role is to be looking toward the future and seeing past the current hot news or operational health dashboard.  Solving today’s issues will not help you a year from now.  You must be very good at solving today’s reactive challenges along with taking the time to prepare and predict for what is coming in the future.”  Walt Czerminski – CISO

Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics.  Recently, we discussed how these successful security leaders have been able to create higher-performing security teams.  Here is a summary of their top tips or suggestions on how to Create a Higher Performing Security Teams.

  1. Measure Success Through Business-Focused Metrics

Chief Information Security Officers (CISO) are often technical experts and can be easily enamored by technology.  The allure of the latest sexy visual dashboard or newest analytics can be a draw for the sake of being cool technology.  However, it may not solve relevant business issues facing the unique business challenges that the security team is there to serve.

Therefore, the security leaders we interviewed recommended starting by understanding the business strategy.  By partnering with each Business Unit (BU), leaders can begin to develop how their security program can enable the BU not disable them.  Several leaders suggested that a robust security program could even become a competitive advantage for each BU.  The program might be able to win the trust with new customers or offer enhanced security solutions to existing customers.

Several security leaders discussed how implementing the NIST cybersecurity framework allowed their BUs to promote this additional level of data security as a competitive advantage. With all the news about 3rd party data breaches, applying additional levels of security and controls could attract more business.

Although proven and thoroughly tested, NIST is not the only framework to leverage. Depending on the industry, other security frameworks have specific expanded controls such as  CIAQ cloud security assessmentS2-Scored Risk AssessmentCybersecurity Maturity Model, or a whole host of other financial industry standards.  Some of these may be required within that industry or they could provide a competitive advantage even if they are not required.

Synergize the security program’s mission with the broader vision and mission of the business.

Different BU may place a higher level of importance on remote access, systems sustainability, elevating technical competency, data privacy, cloud technologies, product security, compliance, or even insider threats. Therefore, understanding their independent risk profile is essential to begin defining specific goals and baseline security controls for each BU.

While many of these attributes will be common across BUs, the attention to specific BU goals can be leveraged to provide the financial support and resources to ensure those goals and metrics are achieved.

Then develop appropriate metrics in concert with the BUs to measure progress against those goals. “How to Measure Anything,” by Doug Hubbert, is a suggested read to help quantify risks and turn business goals into quantifiable metrics.

To hold all parties accountable, those metrics should be available to everyone – the security team, the business units, and the executive board.

With a clear data-driven vision, the security team and business can get behind a unified mission and purpose to help improve the security posture across the organization. Managing through metrics provides clarity on what is currently being accomplished and how much progress has been accomplished over time.

  1. Make it Personal 

With over 90% of cyber attacks still coming in through employees’ devices, successful security leaders often discuss how creating a security-focused corporate culture can be more impactful than developing the most complete strategy, deploying the latest sophisticated AI technology, or even having the highest performing security team.

Security strategies often fail when the business culture does not support them or see the intrinsic value of the strategy.  However, by creating an army of cyber-vigilant employees who are deputized to help the security team perform, the program as a whole will be more effective.

Culture Trumps Strategy Every Time.

Start at home.  One method of creating an effective business-focused security culture is to make it personal.  First, raise personal awareness of the dangers and risks of not being digitally safe at home.  Then, teach the employees how to protect themselves and their families at home. Since, work is now at home for many people, raising personal safety awareness at home will more naturally raise employees’ safety awareness at work.

Personal Security Assessments.  More firms are now requiring employees to complete safety awareness training before they are allowed to work from home.  One such free tool is the www.s2me.com security assessment which walks individuals through the risks associated with connected devices such as routers, mobile devices, connected TVs and appliances, etc.  It also gauges employees’ current security practices such as password use and storage, backups, and data recovery capabilities.

This assessment helps them evaluate how secure their personal practices are, how secure their network is, how it could be compromised, and where vulnerabilities may be introduced into their systems. The assessment provides an objective score and recommendations on how to improve their security score.  In addition, the S2 tool monitors the user’s email for them and will notify them when it shows up in possible breach reports.

S2 also has a corporate version called S2Teams which allows companies to send out these assessments to employees and then anonymously aggregate results back to the security team to help them understand where security training is needed the most.

Some employers are also providing employees with tools such as password managers like LastPass so they can more securely manage their personal and business passwords.

Take it to the Office.  ExxonMobil went as far as creating internal infomercials showing a character called, “One Click” which took a humorous approach to show how one wrong click could take down the whole company and bring the wrath of his co-workers down upon him.

Provide a carrot and a stick.  Many firms have deployed email phishing training tools such as PhishMe (Confense.com) or KnowBe4.com which is more of an entire security training platform.  Companies can provide a carrot to employees by rewarding them for reporting phishing attacks, or by not being fooled by them.  Conversely, for employees who are not diligent and careful, the company can provide additional training or even disciplinary actions including termination if the employees continue to be digitally careless.

Create Security Evangelists. Some security leaders engaged business users and taught them how to test for vulnerabilities within their own systems.  This raised their security awareness level and helped them become security evangelists within their business units.

By engaging all employees to protect their own personal digital assets, it will translate to protecting the company’s digital assets.  Building a security culture mindset of “See something, say something” helps the business users become part of the solution and not part of the problem.

  1. Teach the Team How to Fail Forward

Make it Ok to fail.  Face it, we will fail at protecting all of our data.

Bad guys are better resourced than we are, so we will always be playing catch up.

At some point, no matter how good we are, someone will click on the wrong link, data will get shared without our permission, and most likely our passwords will get exposed by one of the hundreds or thousands of technology firms we use every day to conduct our digital lives.

Security leaders need to communicate to the team, to the business, and to the board that failure is part of the process.  Success will follow failures.  Great leaders don’t focus on those failures.  They learn from them.  Leaders tell us, it is more important to be consistent in your approach and doing the next right thing to drive long-term results.

An example of how to turn failures into success is how one becomes good at a video game. There are no user instructions on how to play a new game such as Mario Bros, Fortnite, Call of Duty, Overwatch or most other video games.  So how do you become good at these games?  You die a lot!  You learn from each failure and you keep trying new things until you make it further in the game.

Since things do not always go right on a security team, leaders need to create an environment where employees know that they will be protected if the team experiences a failure or breach.

Communicate that “We all make mistakes” and admit when you mess up as well.  When a leader shows a high degree of vulnerability, it sets the example of how the team needs to respond when they mess up.  Being authentic creates the space for people to approach you when they recognize their own failures instead of hiding them.

Due to the sting of a failure, we often learn more from our failures more than we do from our successes.

As hard as it may be, displaying a normalized reaction, even during failures or stressful times, can reassure employees. Great security leaders encourage their employees to keep trying new things. If they are not occasionally failing, then they are likely not pushing themselves enough.

  1. Empower Your Team by Creating Psychological Safety

Highly effective security leaders create a culture that encourages employees to think for themselves. Much like creating a safe place to fail, creating a psychologically safe work culture helps empower employees so they can accomplish what is needed to be done without constant oversight.

Employees need to be empowered in their own area of responsibility so they can take ownership of that specialty.  We don’t want robotic employees. The goal is to build employee’s confidence so they make better decisions on their own.

One leader suggested that if an employee asks, “What should I do in this situation?” Put it back on them, “What would you do if you were in my shoes?”  Even if the answer is not exactly what you would do, if it is acceptable enough, then let them do it.  This will help build an employee’s confidence, trust, and better decision-making.

In a culture where there are public criticisms, employees will avoid stepping out of their comfort zone and only do what they are told.  They will be less willing to offer up creative solutions which could lead to better ways to evaluate data or streamline processes for fear of criticism.

When giving feedback, criticize in private, praise in public.

By sharing what you can with the team on the challenges you face as a leader, it can help them buy into more ownership in the solution. While it is not a democracy, often encouraging collaboration will provide fresh ideas and let the team feel more empowered.

One leader encouraged his security team time to take several hours a month to work on creative pet projects which could be useful to the firm.  More often than not, those projects would be implemented.  Whether it is 2 hours per week or 2 hours per month, it could pay off in dividends.

By creating a psychologically safe culture that encourages employees to exercise their creative side, they get the opportunity to feel important by becoming part of the solution. This encourages them to continue to become more independent and think more creatively.

  1. Establish Robust and Routine Training 

To keep up with the constantly changing threat landscape, every security team needs to be constantly learning and adapting.  Leaders need to be able to evaluate a team’s current strengths and weaknesses both individually and holistically.

Several security leaders suggested creating fundamental blocks of training, where everybody takes the same baseline training when they join the team to provide some level setting. Then build role-based tracks with more specialized training for specific roles.

In addition, understanding an individual’s career interests and goals will help you map additional training to foster their growth and long-term job satisfaction.

Here are several good tools for skills assessment, training, and suggested career path options:

One of the best-known security training organizations is SANS (www.sans.org), but it is expensive and can be like drinking from a fire hose.

Here are some other examples of inexpensive or even free training:

  • Black Hill Information Security Team(blackhillsinfosec.com) – They offer a “Pay what you can” model and provide good entry-level training.
  • Find other industry professionals who are willing to share their case studies to expose your team to real-world examples.
  • Focus on cross-training team members to ensure there is more breath of experience across the team.
  • Invite vendors in for lunch and learn sessions.
  • Encourage your team to join and participate in security focused organizations such as ISSA, ISACA, InfraGard, CSA, etc.
  • Allow the time to attend conferences (in person & on-line) for education.

One leader requires his employees to block out time on their calendars every week so they can dedicate it to reading and continued education.  Especially in cybersecurity, training increases job performance and satisfaction, plus reduces attrition because employees are stimulated intellectually and feel valued.

  1. Create Mentorships Inside and Outside of Security

One highly-effective technique to accelerate competency is to create formal mentorships between junior resources and more senior resources within the security team.   Training fades within a few weeks so it is better to pair someone up with a mentor to help apply the training in real-world scenarios.  The senior resource is held accountable to answer any and all questions, and to raise the level of competency of the junior resource.

Mentoring provides a growth opportunity for both parties.  

As cybersecurity becomes more of a business-focused problem instead of a technical problem, improving soft skills is essential to the success of the team.  Soft skills will also drive more employee advancement up through the ranks.

Mentoring helps senior resources develop communication, teaching, and leadership skills.  It also helps reduce the egos of these more knowledgeable employees which leads to a more inclusive work environment.

Another effective technique used by successful security leaders is to partner up team members with mentors from other departments.  This accomplishes multiple goals.

  1. It gives them a coaching advocate outside of the security team.
  2. It helps them work on their soft skills.
  3. It gives them the bigger picture of the company’s purpose, which in turn, helps them see the importance of their role.
  4. It allows the business person to learn more about the security teams’ mission and leads them to become more of a security advocate within the business.

Mentorships both inside and outside of the security team can accelerate employee growth and job satisfaction for both the mentor and the mentee.

  1. Show You Genuinely Care About Them

Security teams always experienced stress.  After Covid hit, the stress level on most teams exploded.  People, devices, and data went remote which had not been remote before. Most security teams had to put in overtime to catch up with securing, people, assets, and data.

Even though environments may have settled some, focusing on the mental health of employees is still critical.  Being aware of an employees’ personal situation and tuning in to their level of stress will help you identify those who need additional emotional support or maybe even need time off to recharge. Engaging employees at the personal level can have long-term benefits by creating more loyal employees.

Some leaders schedule a weekly coffee check-ins or virtual happy hours to provide the opportunity to have informal conversations.  This can give them the outlet they need to fulfill the absence of interpersonal relationships they miss by not being in the office.

Creating real relationships with employees drives loyalty, performance and tenure.

One leader takes remote walks with employees. She schedules a Facetime call with an employee and then they both go for a walk in their separate neighborhoods all while carrying on their check-in conversation.

Since employees were working overtime, one leader suggested employees take off 90 minutes per week during work hours to do something for themselves.  Then on Friday they shared what they did.  Another leader forbade meetings on Friday so everyone could focus on their own work.

A leader also described how he brought in various self-improvement coaches via Zoom to stimulate thoughts and mental improvements.

Creating space for employees to know they are valued and individually important to the team, allows them to recover faster when they are down, and thrive more when things are good.

  1. Raise Your Teams Emotional IQ 

Security leaders are always studying and trying to anticipate the behaviors of threat actors.

Effective security leaders use that same skill to anticipate an employees’ needs, their unique motivators, what situations create stress for them, and how to optimize their work environment and assignments to maximize their performance.

There are several tools that can help reveal these nuances to accelerate a leaders’ understanding of how best to motivate his or her team.

One of the easiest ways to gain this insight is to conduct employee behavior assessments such as a Birkman Behavior and Occupational Assessment.  A behavior assessment is much more in-depth than a standard personality test such as a Briggs-Myers, DISC, Predictive Index, etc.  Those generally focus only on the outward personality people want you to see.  The Birkman looks deeper into what motivates someone at their core, how they stress, why they have communication challenges with certain people, and what their occupational passions are.

Leaders can leverage this behavioral training by also using it to elevating the teams’ emotional IQ.  Creating self-awareness often is the first step to self-improvement.

It also allows you to train employees to become more aware of the differences in how others approach situations creating a more inclusive and creative culture.  Creating co-worker awareness helps the team appreciate these differences and even value them.  The more in tune the team is with each other, the better they will communicate and work together.

Teams with higher emotional IQ seek out more diversity of thought because it makes the whole team stronger. This creates teams that are more diverse, inclusionary, creative, and productive.

Teams that understand that “diversity of thought” is a strength, thrive and produce more. 

Fortify Experts has developed a shortcut to quickly accelerate the team’s emotional IQ by creating an Employee Operating Manual for each team member.  This one page summary helps accelerate on-boarding, communication, productivity, and job satisfaction.  It immediately allows managers and teammates to know them as if they have been working together for years and helps the team understand how to best work with the individual to create less conflicts and more productivity.

In Summary:

Thanks to the input of the security leaders who joined our CISO Forum which provided such insightful advice to on how to create a higher performing security team.

If you are a security leader and would like to participate in our monthly CISO Forums where we discuss valuable and actionable information as well as best practices and challenges, please register here.

About Tim Howard

Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments

In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.

With each new hire, his firm produces an Employee Operating Manual to help clients understand how to motivate and maximize productivity while meeting the needs of each employee.

He also teamed up with Lyndrel Downs to launch Cybersecurity DIVAS to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the industry.

Tim is married with 3 kids. He is an avid runner and has completed two IronMan Texas events. He is also a graduate of Texas A&M University. 

Invite Tim to connect:  www.linkedin.com/in/timhoward

10 Ways AI can Accelerate your Job Search

Finding a new job in the field of cybersecurity can be a challenging task, but AI can definitely assist in various ways. Here’s a comprehensive list of 10 ways AI can be used to help cybersecurity experts find a new job, along with descriptions and examples of AI technologies for each:

1.  Resume Optimization: AI can analyze your existing resume and recommend improvements to highlight relevant skills and experiences for cybersecurity roles.

  • ResyMatch: ResyMatch is an AI-powered tool that analyzes your resume and provides suggestions for improvement. It highlights keywords, skills, and experiences relevant to the cybersecurity job market, enhancing your chances of getting noticed by recruiters.
  • RezScore: RezScore evaluates your resume’s content and structure using AI algorithms. It identifies areas for improvement, such as readability, keywords, and formatting, to help you create a more impactful resume.
  • SkillSyncer: scans your resume and job descriptions to ensure that your skills align with the requirements of cybersecurity positions. It provides recommendations to enhance your resume’s relevance to specific job roles.

2. Job Matching: AI algorithms can match your skills and preferences to suitable job openings in the cybersecurity sector.

  • Jobscan: Jobscan is a tool that compares your resume against job descriptions using AI. It identifies matches and suggests adjustments to your resume to better align with the specific requirements of cybersecurity job listings.
  • ZapInfo: ZapInfo (now Indeed) uses AI to match your skills and preferences with available job openings. It gathers information from various job boards and recommends positions that closely match your cybersecurity background.

3. Skill Gap Analysis: AI can assess your skill set and identify areas where you might need to upskill or acquire new knowledge.

  • Skillometer: Skillometer uses AI-driven assessments to evaluate your current skill set against industry-specific benchmarks for cybersecurity roles. It then offers recommendations for improving any identified skill gaps.
  • Degreed: Degreed’s AI platform maps your existing skills and experiences to cybersecurity roles and identifies areas where you can expand your capabilities through personalized learning pathways.

4. Interview Preparation: AI-powered tools can simulate job interviews, offering practice and feedback to improve your interview skills.

  • InterviewBuddy: InterviewBuddy offers AI-enabled mock interview sessions. It provides real-time feedback on your answers, body language, and presentation, helping you refine your interview skills for cybersecurity roles.
  • Interviewing.io: Interviewing.io provides anonymous, AI-powered practice interviews with experienced technical professionals. It offers insights into your performance and helps improve your communication skills for cybersecurity interviews.

5. Company & Prospect Research: AI can gather and summarize information about potential employers, aiding your understanding of their cybersecurity practices.

  • Crystal Knows: Crystal analyzes online profiles and communication patterns to provide insights into individuals’ personalities. This information helps you tailor your networking approaches for effective connections in the cybersecurity industry.
  • ZoomInfo: ZoomInfo’s AI technology collects data from online sources to create comprehensive company profiles. It assists in researching potential employers’ cybersecurity initiatives, market presence, and key decision-makers.

6. Customized Cover Letters: AI can generate personalized cover letters for each job application, highlighting your relevant experience.

  • Text Blaze: Text Blaze is an AI-powered text expansion tool that helps you create personalized cover letters efficiently. It saves time by generating customizable templates for your cybersecurity job applications.
  • GrammarlyGo: Grammarly’s AI-powered writing and voice assistant ensures your cover letters are error-free and well-structured. It suggests improvements to your writing, enhancing the quality of your job application materials.
  • WriteSonic: WriteSonic is an AI copywriting tool that helps you craft engaging and tailored cover letters and blog articles. It generates content based on input and provides options for customization to suit various cybersecurity blog articles and topics.

7. Salary Negotiation: AI can provide insights into salary ranges for specific roles and locations, helping you negotiate better offers. 

  • PayScale: PayScale’s AI-driven salary data helps you benchmark cybersecurity roles’ compensation. It provides insights into salary ranges based on factors such as experience, location, and specific job roles.
  • Glassdoor’s Know Your Worth: Glassdoor’s tool uses AI to estimate your market value based on your skills, experience, and the current job market trends in the cybersecurity sector.
  • Salary.com: Salary.com offers AI-powered compensation data for various industries, including cybersecurity. It helps you understand fair salary ranges for different cybersecurity job positions.

8. Personal Branding: AI tools can assist in developing your online presence, curating content, and positioning you as a cybersecurity thought leader.

  • SocialBee: SocialBee uses AI to curate and schedule social media content that aligns with your cybersecurity expertise. It helps maintain a consistent online presence, positioning you as a thought leader in the industry.
  • BrandYourself: BrandYourself’s AI-driven platform helps manage your online reputation. It identifies potential negative content and provides guidance on creating positive online branding for yourself.
  • DrumUp: DrumUp uses AI to discover and suggest relevant content for sharing on your social media channels. It assists in building your personal brand by sharing valuable insights and articles within the cybersecurity domain.

9. Skill Development Pathways: AI can recommend learning paths and courses tailored to your career goals within cybersecurity.

  • Pluralsight IQ: Pluralsight IQ uses AI to assess your cybersecurity skills and knowledge. It then suggests personalized learning paths to help you develop specific competencies required for your desired job roles.
  • Udemy’s Learning Paths: Udemy offers learning paths curated by AI for different cybersecurity career trajectories. These paths include relevant courses to help you build skills progressively.
  • LinkedIn Learning’s Learning Paths: LinkedIn Learning uses AI to recommend learning paths based on your career goals within AI & cybersecurity. It guides you through a series of courses to develop expertise in targeted areas.

10. Personality and Culture Fit Analysis: AI can assess your personality traits and match them with company cultures for better fit. 

  • Birkman Behavior and Occupation Assessment: The Birkman assesses personality and behavior traits across over 5M profiles to evaluate how you stack up on certain communication traits. It helps you tailor your communication style to match the preferences of those you’re interacting with.
  • Plum: Plum’s AI-driven platform measures personality traits and matches them to company cultures. It ensures you align well with the organizations you’re considering.

These AI technologies, combined with your own expertise and effort, can greatly enhance your job search journey as a cybersecurity expert. Remember that while AI tools offer valuable assistance, they should be used in conjunction with human judgment and careful consideration.

Job Hunting Tips:

Finding Job Opportunities:

Attracting Hiring Managers:

Interview Prep: 

Job hunting is a full-time job itself and companies are hiring.  Within these articles, you will find ways to be more strategic and productive, than just applying on-line.  We hope you find this helpful.  Your diligence and technique will outperform your luck.  Good hunting.

About Tim Howard

Tim Howard is the founder of 5 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as provides expert consulting and NIST based security assessments

In addition, he has a passion for helping CISO’s develop Higher Performing Teams through coaching, by creating interactive CISO Forums and by helping them create highly-effective team cultures.

He also teamed up with Lyndrel Downs to launch www.CybersecurityDIVAS.com to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the cybersecurity industry.

Tim has been leading technology staffing teams for over 20 years and has degrees from Texas A&M University in Industrial Distribution and Marketing.  

Invite me to connect:  www.linkedin.com/in/timhoward

Did the Target on the CISO Back Just Get Bigger?

Why the SEC Ruling could make it more difficult for CISOs.

After a year of speculation, the SEC finally ruled on its new cybersecurity initiative.  Many security leaders are extremely disappointed with the watered-down ruling.  There was hope that the SEC would dictate that each public board must have a named director who would be responsible for overseeing cyber risks.  

While the ruling fell short of requiring a “named” director, instead, it loosely outlined that the board needs to have cyber awareness on the board and to have a plan for addressing cyber risks.

Security Leaders (i.e. CISOs) had been campaigning for the named director to give them an ally in the board room.  Too often the board lacks the knowledge and desire to address cyber risks to the level a CISO feels is adequate to protect the company. 

I’ve always contended that the CISO role is the most difficult executive position because of its breadth of responsibility, and the lack of executive support.  

Often, the lack of boardroom understanding about cyber risks makes it difficult to garner the support and budget to adequately protect the firm.  But yet, CISOs are still seen as the ones to blame if a cyber event happens.  

This causes frustration with both the CISO and the Board which is a core reason the average tenure of a CISO is only 24 months. This is the shortest tenure of any of the CXOs.

So will the new regulation improve or hurt the CISO position? I think both. 

It will elevate the awareness of cybersecurity in the boardroom as it requires there to be:

  • Cyber Risk Knowledgeable Board Oversight 
  • Defined Cyber Risk Processes
  • Timely Disclosure of Breaches (4 days)

With the SEC monitoring over 12,000 public entities, Boards can no longer ignore cybersecurity.  Investors and consumers will be more informed about the cyber health of public companies. 

Therefore, the target on the CISOs back just got bigger and more visible.

Learn how to hire a great CISO with our Insider’s Guide.

 

They will need to develop public-facing cyber policies that the board will need to agree to and adhere too.  Boards will add CISO oversight as a watchdog and for compliance to cyber policies and reporting. 

In addition, CISOs will be held accountable for quickly discerning the impact of cyber events and the information which needs to be disclosed, plus how and when it is reported and communicated. 

In the short term, the CISO position will be burdened with establishing new processes and procedures to meet SEC expectations. They will also have to communicate it and get buy-in across the organization. 

In the long term, the new SEC requirements should provide additional visibility that CISOs need.  Maybe it will help the rest of the executive team take cyber risks as seriously as the CISO does.

Conclusion

At Fortify Experts, we understand the challenge of finding and hiring a CISO that fits your company’s goals. That’s why we’re committed to helping executive leadership teams find the right CISO for their organization and have developed a step-by-step guide on how to hire a great CISO who meets your firm’s expectations.


Request your free copy of How to Hire a Great CISO by Fortify Experts today and take the first step towards establishing a strong security program for your organization.

Verizon 2023 Data Breach Report – Key Stats

Here are the key stats in the recently published Verizon 2023 Data Breach Report. It contains crucial information that can help safeguard your company. The report is available for viewing at the link provided below.

So whether you are an executive or a security leader protecting against cybersecurity threats is imperative.

We summarize 14 practical actions you can take now to improve your ability to fortify your defenses and prevent potential breaches.

Don’t hesitate to reach out to Fortify Experts if you need any assistance in bolstering your cybersecurity. We’re here to help!

To view the full report:
https://www.verizon.com/business/resources/T5f1/reports/dbir/2022-data-breach-investigations-report-dbir.pdf

5 Reasons Why a BoD Should Hire a Cybersecurity Advisor

The impact of a cyber attack can be devastating to a business.  Even if your firm has a competent Chief Information Security Officer (CISO), who is watching them?  Rarely does the Board of Directors (BoD) have sufficient knowledge to ensure the security program is delivering an appropriate level of security that properly balances the company’s risk tolerance with adequate protection. 

  • According to a 2022 study by IBM, the average cost of a data breach in the U.S. was $9.44 million. This cost includes direct costs such as investigation, remediation, and legal fees, as well as indirect costs such as lost revenue and reputational damage.
  • The FBI’s 2022 Cyber Crime Report found that the financial impact of cybercrime has dramatically increased from $6.9B in 2021 to $10.3B in 2022.  
  • In March 2022, the SEC proposed a mandatory cybersecurity disclosure to be added to Form 8-K as Item 1.05 to disclose any material cybersecurity incidents within 4-days of discovery.
  • As of March 2023, the SEC has also started taking cyber vulnerabilities much more seriously than it has in the past. They recently fined Blackbaud, a South Carolina tech company $3 million for making “misleading disclosures” about a 2020 ransomware attack.
  • 73% of customers would consider leaving a company after a data breach.

Do you have a cyber security advisor or expert on your Board of Directors? 

Here’s why you should.

The criticality of protecting a company’s digital assets and reputation elevates the need for oversight.  Public companies can significantly benefit from hiring an experienced cybersecurity board advisor to oversee and evaluate the security program and its leadership. Just as the Board of Directors provides financial and operational oversight, it should also provide risk and security oversight.

The trend to hire cyber experts on the BoD is on the rise as shown in the 2022 Audit Committee Transparency Barometer survey but most BoDs are still lacking in the expertise to oversee a critical area of risk.

https://thecaqprod.wpenginepowered.com/wp-content/uploads/2022/11/caq_2022-ac-barometer_2022-11.pdf

5 Reasons to Hire an Experienced Cybersecurity Advisor as a Board Member

1. Provide strategic direction and oversight

An experienced cybersecurity advisor as a board member can help public companies develop a comprehensive cybersecurity strategy that aligns with the company’s overall business strategy. They can also provide oversight to ensure that the company’s cybersecurity measures are effective and in line with industry best practices. According to a report by the National Association of Corporate Directors (NACD), “the board’s role in cybersecurity governance includes ensuring that the company has an effective cybersecurity program in place and providing oversight of management’s efforts to manage cyber risk.”

2. Define the Appropriate Level of Risk Tolerance

Every business has a different appetite for risk. Aligning the cost of a cybersecurity program with the firm’s risk tolerance is a delicate balance. An advisor can oversee the effectiveness of the company’s cybersecurity practices, such as regulatory compliance, vulnerability assessments, penetration testing, and employee training programs to assure they align with the desires of the BoD.

3. Increase stakeholder confidence

Cybersecurity breaches can significantly impact a company’s reputation and financial performance. When a company suffers a data breach, stakeholders, including customers, investors, and employees, may lose confidence in the company’s ability to protect its data. Hiring an experienced cybersecurity advisor as a board member can help increase stakeholder confidence in the company’s cybersecurity measures.

4. Improved decision-making

By having an experienced cybersecurity advisor on the board, the company can make better-informed decisions regarding cybersecurity matters. The cybersecurity advisor can provide the board with valuable insights into the current threat landscape and help the board understand the potential impact of cyber-attacks on the company’s operations and reputation. This can help the board make informed decisions regarding the allocation of resources toward cybersecurity measures.

5. Reduced cyber risk

An experienced cybersecurity advisor can help the company identify and address potential cybersecurity risks, reducing the likelihood of a cyber-attack. An advisor can be a welcomed sounding board for the security leader to ensure they are implementing cybersecurity best practices and staying ahead of emerging threats. The partnering between the advisor and security leader can accelerate improvements in the firm’s cybersecurity posture and reduce the risk of a data breach. 

The security advisor can improve the strategy, confidence, and reputation of both the security program and the firm. Thereby, resulting in significant cost savings in breach avoidance, plus, allowing the BoD the ability to sleep better at night knowing vital employee, product, and client data is properly protected.

Identifying a board-level security advisor is challenging.  Fortify Experts hosts CISO Forums and works with security advisors every day.  Download our new ebook on How to Hire a Great CISO.

Learn how to hire a great CISO with our Insider’s Guide.

 

About Tim Howard

Tim Howard is the founder of 4 technology firms including Fortify Experts which helps companies hire the Best Cyber Talent on the Planet as well as providing expert consulting and NIST-based security assessments

In addition, he has a passion for helping CISOs develop higher-performing teams through coaching, creating topic-rich CISO Forums, and by helping them create highly-effective team cultures.

He also teamed up with Lyndrel Downs to launch www.CybersecurityDIVAS.com to help promote the most influential women in cybersecurity and provide a mentoring program to help encourage and support more diversity within the cybersecurity industry.

Tim has been leading technology staffing teams for over 20 years and has degrees from Texas A&M University in Industrial Distribution and Marketing.  

Invite me to connect:  www.linkedin.com/in/timhoward