The Tale Of Three CISOs And The Skills They Bring

As with any position, there will be different types of people that hold the CISO position. During our conversation with Rick Lemieux, CRO of itSM, we dove deep into the three archetypes of CISO that have emerged: the Visionary, the Teacher, and the Technician.

These three flavors of CISO each bring a unique set of skills to tackle similar challenges, and as a result, these various strengths and weaknesses illuminate their superpowers as well as opportunities for development to accomplish their goals.

Every organization, of course, is different in its needs from a CISO. For some organizations, the CISO is hired because the executive leadership team needs a clear path forward, in other cases, the organization is undereducated in information security best practices, and some organizations require a leader to build the actual security infrastructure necessary for the digital age.

The Visionary CISO

The Visionary CISO’s superpower is in their ability to align security practices with business outcomes. They can articulate a concrete vision for their security program and solicit buy-in from non-technical stakeholders with ease. A visionary CISO typically emerges in an organization that has an established information security program but is perpetually playing catch-up. The visionary CISO is best suited for these opportunities given that the organizations that they succeed most at have at least a limited awareness of the need for information security.

Consider this: an organization is reaching the point where the Director IT will give way to a CISO. This organization has the precursors to a mature cybersecurity program, but they have been reactionary to date. They have been hung up on regulations and checkbox compliance, securing new technologies as other departments embrace digital business; the strategy is a patchwork approach to keeping the organization secure. The plan is not in the hands of the cybersecurity team.

It is at organizations like this one that the visionary can shine. The CEO and board are aware that cybersecurity is essential and they may even be accustomed to investing in security to a degree. The challenge that a CISO at this type of organization will face is consolidating the fragmented initiatives and teams that are trapped in perpetually reacting to the organization into a group guided by a singular vision. For this CISO, it will require buy-in above all. They must be able to collaborate with the rest of the C-Suite to illustrate how security and risk management can empower business growth. In this case, the Visionary will be able to that most effectively.

You’ll notice, though, that the environment best suited for the Visionary already has the precursors to an active security program – the enterprise is already investing in security, and personnel is there (albeit distributed), and all that’s necessary is a guide to unite those pieces into a cohesive unit. Visionaries thrive in this environment because they’re best suited for unifying and reconfiguring existing pieces while adding more to existing infrastructure.

The Teacher

A Teacher CISO is best suited to tackle the problem of awareness within an organization. Where the Visionary can guide, the Teacher can teach.

Think of an organization that has a security team established, the senior leadership is adjusted to investing in cybersecurity, and they see the need for it. The senior leadership recognizes the need for security, but not the whole organization. In the digital age, a risk-aware culture is becoming ever important – attacks are no longer merely technical but leverage non-technical employees lack of risk-awareness to get access to secure systems. It is in this environment that the Teacher can add the most value. Where the Visionary is best at bridging the gap between the Board and information security teams, the Teacher is best at bridging the gap between IT and the rest of the enterprise. She brings an in-depth technical knowledge of course, but what makes her unique is being able to translate that jargon into non-technical concepts that other business units can understand.

The Teacher thrives in a position where the goal is to expand security awareness throughout the organization. A teacher CISO, though, needs to come into a situation where there is already buy-in from the CEO and Board. The Teacher is more a catalyst for change rather than a component of the reaction. The goal for a Teacher is to expand awareness throughout rather than building from the ground up.

The Technician

When most people outside of cyber think of a CISO they think of the technician. The Technician has the iconic technical leader – he brings a remarkably in-depth knowledge of the technology that drives security and the threats that organizations face.

The Technician thrives in an environment that is building from the ground up as he knows how to build things right. His brute force knowledge of security makes him difficult to relate to for non-technical stakeholders, but because his understanding is almost misunderstood, it becomes practically ethereal.

Consider the organization that is going through a digital transformation: rebuilding digital infrastructure around new initiatives and revenue models. The Technician can thrive in this environment for two reasons – first, an enterprise mid-digital transformation is most receptive to the technical thinking and personalities that the Technician brings. Second, is it during this time that the skillset of the Technician is most needed: with the rapid pace of change that is happening, the CISO holding this position needs to command their knowledge of security and implement it at the speed of the rest of the organization. Again, the brute force knowledge of the Technician ensures that the new infrastructure will be secure even after the initiative ends.

These are the poles.

As with any archetype, these three are caricatures of CISO’s today. Embedded within formation security leaders are aspects of each of these three types. The value of these three is not in knowing what skills to which you naturally gravitate. Instead, it is knowing which archetype to invoke based on the situation you find yourself in: vision, education, technology. A successful CISO is not bound to one over the other, and sure you may gravitate towards one or two but being aware that a specific skillset comes naturally also illuminates what skills you need to develop or outsource through hiring.

As with any position, there will be different types of people that hold the CISO position. During our conversation with Rick Lemieux, CRO of itSM, we dove deep into the three archetypes of CISO that have emerged: the Visionary, the Teacher, and the Technician.

These three flavors of CISO each bring a unique set of skills to tackle similar challenges, and as a result, these various strengths and weaknesses illuminate their superpowers as well as opportunities for development to accomplish their goals.

Every organization, of course, is different in its needs from a CISO. For some organizations, the CISO is hired because the executive leadership team needs a clear path forward, in other cases, the organization is undereducated in information security best practices, and some organizations require a leader to build the actual security infrastructure necessary for the digital age.

The Visionary CISO

The Visionary CISO’s superpower is in their ability to align security practices with business outcomes. They can articulate a concrete vision for their security program and solicit buy-in from non-technical stakeholders with ease. A visionary CISO typically emerges in an organization that has an established information security program but is perpetually playing catch-up. The visionary CISO is best suited for these opportunities given that the organizations that they succeed most at have at least a limited awareness of the need for information security.

Consider this: an organization is reaching the point where the Director IT will give way to a CISO. This organization has the precursors to a mature cybersecurity program, but they have been reactionary to date. They have been hung up on regulations and checkbox compliance, securing new technologies as other departments embrace digital business; the strategy is a patchwork approach to keeping the organization secure. The plan is not in the hands of the cybersecurity team.

It is at organizations like this one that the visionary can shine. The CEO and board are aware that cybersecurity is essential and they may even be accustomed to investing in security to a degree. The challenge that a CISO at this type of organization will face is consolidating the fragmented initiatives and teams that are trapped in perpetually reacting to the organization into a group guided by a singular vision. For this CISO, it will require buy-in above all. They must be able to collaborate with the rest of the C-Suite to illustrate how security and risk management can empower business growth. In this case, the Visionary will be able to that most effectively.

You’ll notice, though, that the environment best suited for the Visionary already has the precursors to an active security program – the enterprise is already investing in security, and personnel is there (albeit distributed), and all that’s necessary is a guide to unite those pieces into a cohesive unit. Visionaries thrive in this environment because they’re best suited for unifying and reconfiguring existing pieces while adding more to existing infrastructure.

The Teacher

A Teacher CISO is best suited to tackle the problem of awareness within an organization. Where the Visionary can guide, the Teacher can teach.

Think of an organization that has a security team established, the senior leadership is adjusted to investing in cybersecurity, and they see the need for it. The senior leadership recognizes the need for security, but not the whole organization. In the digital age, a risk-aware culture is becoming ever important – attacks are no longer merely technical but leverage non-technical employees lack of risk-awareness to get access to secure systems. It is in this environment that the Teacher can add the most value. Where the Visionary is best at bridging the gap between the Board and information security teams, the Teacher is best at bridging the gap between IT and the rest of the enterprise. She brings an in-depth technical knowledge of course, but what makes her unique is being able to translate that jargon into non-technical concepts that other business units can understand.

The Teacher thrives in a position where the goal is to expand security awareness throughout the organization. A teacher CISO, though, needs to come into a situation where there is already buy-in from the CEO and Board. The Teacher is more a catalyst for change rather than a component of the reaction. The goal for a Teacher is to expand awareness throughout rather than building from the ground up.

The Technician

When most people outside of cyber think of a CISO they think of the technician. The Technician has the iconic technical leader – he brings a remarkably in-depth knowledge of the technology that drives security and the threats that organizations face.

The Technician thrives in an environment that is building from the ground up as he knows how to build things right. His brute force knowledge of security makes him difficult to relate to for non-technical stakeholders, but because his understanding is almost misunderstood, it becomes practically ethereal.

Consider the organization that is going through a digital transformation: rebuilding digital infrastructure around new initiatives and revenue models. The Technician can thrive in this environment for two reasons – first, an enterprise mid-digital transformation is most receptive to the technical thinking and personalities that the Technician brings. Second, is it during this time that the skillset of the Technician is most needed: with the rapid pace of change that is happening, the CISO holding this position needs to command their knowledge of security and implement it at the speed of the rest of the organization. Again, the brute force knowledge of the Technician ensures that the new infrastructure will be secure even after the initiative ends.

These are the poles.

As with any archetype, these three are caricatures of CISO’s today. Embedded within formation security leaders are aspects of each of these three types. The value of these three is not in knowing what skills to which you naturally gravitate. Instead, it is knowing which archetype to invoke based on the situation you find yourself in: vision, education, technology. A successful CISO is not bound to one over the other, and sure you may gravitate towards one or two but being aware that a specific skillset comes naturally also illuminates what skills you need to develop or outsource through hiring.

*** This is a Security Bloggers Network syndicated blog from CyberSaint Blog authored by Ethan Bresnahan. Read the original post at: https://www.cybersaint.io/blog/the-tale-of-three-cisos-and-the-skills-they-bring

Recent Posts

Vulnerabilities for AI and ML Applications are Skyrocketing

In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code…

6 hours ago

Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web

While inexpensive and crudely built, the ransomware variants still post a threat to smaller companies and individuals, Sophos says.

6 hours ago

What Makes Containers Vulnerable?

Read this quick guide to the types of vulnerabilities that affect containers. The post What Makes Containers Vulnerable? appeared first…

8 hours ago

USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers

Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s…

8 hours ago

DevOps pioneers navigate organizational transformation

The latest webinar in Sonatype's DevOps Download series, presented in partnership with The New Stack, offered an in-depth exploration into…

9 hours ago

To Breach or Not to Breach

The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of the most…

10 hours ago