SUBSCRIBE

CISOs donโ€™t get the respect they need, says consultant

Jeff Bardin doesnโ€™t sound like an angry man, perhaps because he has a cold.

But on the line three days ago from California the U.S. security consultant sounds terribly resigned at how chief information security officers are treated โ€” at least in his country.

What prompted my call was his column last month for an IT security Web site where he protested that CISOs are scapegoats for security problems that arenโ€™t their fault. I wanted him to expand on that.

โ€œItโ€™s not a thankful environment,โ€ he tells me, which is why he isnโ€™t a CISO any more. โ€œItโ€™s a constant battle against traditional culture, itโ€™s a battle where they (other staff) see you as a person of โ€˜Noโ€™ โ€” and thatโ€™s not true, itโ€™s โ€˜Yes, but this way.’โ€

Bardin has 27 years of experience in IT security, including a year as director of the office of risk management at EMC, vice-president and chief security strategist for consulting firm Xa Systems and an intelligence officer for an army battalion that served in Afghanistan. Heโ€™s is now chief intelligence officer for Treadstone 71, a Washington, D.C.-area consultancy he formed with his wife that does risk analysis, benchmarks an organizationโ€™s information security and network security and teaches customers how to comb social networks for signs of an attack.

Most CISOs, he complains to me, still reports to the CIO. โ€œThat is a major issue and a problem, because the CIO is under all kinds of pressure to deliver new features and functionality, and that does not always include security. So security takes a back seat to the features and functionality thatโ€™s coming down from the business, and the business doesnโ€™t always get to see or hear the security issues because theyโ€™re embedded within IT.

โ€œIn addition they still see it as purely a technical issue, and itโ€™s notย  โ€” itโ€™s an information issue. And information is all over the corporation.โ€

So, he continued, many CISOs are cautions when talking to their CIOs, fearing they may be fired for trying to push an agenda counter to the CIOโ€™s strategy, or that they may get shut out of certain conversations, โ€œwhich Iโ€™ve seen over and over.โ€

What will it take to elevate the role of the CISO?

โ€œI would have thought that after all these years and all the different breaches things would change,โ€ he replied, โ€œbut we still continue to double down on the technologies that are not protecting us, we double down on the same organizational structures.

โ€œI think itโ€™s going to take time to weed out the current batch of CIOs and change the model where any CIO must have three to five years as a CISO before they can actually become a CIO,โ€ and organizations understand information security is not just a technical issue.

โ€œIโ€™m just not sure how to get peopleโ€™s attention on this to make them realize this cannot be embedded down into where it is today, itโ€™s canโ€™t be just a subset budget-wise, and that CIOs have to be measured on information security if theyโ€™re breached theyโ€™re fired. Iโ€™ve only seen a few CIOs fired.โ€

As a consultant he has recommended customers change their structure. โ€œMany times they say โ€˜OK, but we need to mature the program first.โ€™ Thatโ€™s fair, he said, but inevitably nothing happens.

Some of that he blames on CIOs who fear the CISO will say something to the C-suite that makes them look bad. ย Chief executives might not want another person in the C-suite, I suggest. There are other ways, Bardin replies โ€” having the CISO report to the chief operating officer, for example, or the audit. But his point is the CISO should have a separate budget based on assessing corporate risk, and not on technology.

With an outlook that, I tease, how does he get out of bed in the morning? Bardin laughs. โ€œAs a consultant, I donโ€™t own it,โ€ he says. โ€œThey donโ€™t have to take my advice.โ€

On the other hand, he also faults some IT people for being ambitious enough to inflate their resumes or Linkedin accounts to become CISOs.

โ€œThere are a few in very large Fortune 100 companies,โ€ he says, who have managed to get by HR background checks. Some say they drove a project, when they were only a team member, or have created โ€œphony metricsโ€ on performance, or created a title like director of cybersecurity when they were only a IT director. โ€œIt does a disservice to the CISO who has really worked to get there.โ€

Bardin also believes that too many organizations rely on defensive strategies โ€” defence in depth, looking for evidence of penetration along the kill chain โ€” rather than go on offence.

Security pros should be involved in cyberintellignce to learn who the organizationโ€™s adversaries are. By penetrating their online forums and gather information passively on their skills and tactics are organizations can build their defences.

And, he adds, if necessary, they can go on a pre-emptive strike if necessary.

โ€œIโ€™m advocating โ€” and this usually stirs up a lot of conversation โ€” that corporations do this. How they do it, and what their liability is and whether they ask a third party to do it for them, this is their business. Thereโ€™s ways to make sure thereโ€™s complete anonymity, itโ€™s offย  your corporate network, youโ€™re using methods to hiding the IPs where itโ€™s coming from. But if you donโ€™t sling back at these folks theyโ€™re going to continue to come back and hit you.โ€


Related Download
Under the hood Sponsor: Jolera


Under the hood

Download this paper to read how Jolera can solve your data protection challenges and find out what the right tools are to implement in your IT department.
Register Now


Tech Jobs

Categories