Info@NationalCyberSecurity
Info@NationalCyberSecurity

Beyond the table stakes: CISO Ian Schneller on cybersecurity’s evolving role | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


When Ian Schneller entered the workforce in the early 1990s, cybersecurity was just emerging as a function within companies. It was a dedicated function, and where it existed at all, it served principally in a technical capacity by thwarting attacks against the organization and, to some extent, against customers. “That was really the role,” recalls Schneller, “defending against that constant onslaught of attackers, protecting the organization’s systems, information, and services…still a very, very technical role that in many cases developed from somebody working inside of it, maybe a system administrator, maybe a developer, or someone with a very technical background.”

Since then, Schneller has risen through the ranks of security operations and now serves as CISO at Health Care Service Corporation (HCSC). In 2023, he became the first CISO to win an Orbie Award in the newly created CISO category from Dallas CIO. The achievement underscores Schneller’s success in creating an innovative work environment and maintaining the integrity of sensitive information and systems across the company. As he’s risen, he has watched his field evolve. By 2017, 70% of Fortune 500 companies had employed a CISO, and the number is climbing.

Countless CISOs oversee large and sophisticated organizations that manage allthe activities that make for a secure enterprise—activities that involve more than just the technical aspects of defense, the aspects that, while still vital, are “now table stakes…not the end stake. That’s the beginning, the anteing up to play the game.”

Data backs up Schneller’s view of how much the CISO role has changed. A recent Splunk survey, for example, observed that “86% of CISOs say their role has changed so much since they started, it’s almost a different job.”

Here are what Schneller believes are the five key tenets that CISOs need to embrace for the role as it exists today:

1. Recognize the scope of the CISO role

Recognizing how comprehensive the role is today, says Schneller, is the first tenet for becoming, or finding, a strong CISO. Early on, it was enough that CISOs protected their companies and customers, and mostly they could do so on their own. To defend the organization today, CISOs must coordinate with leaders across the enterprise and, in a sense, with every employee.

“It’s not a silo anymore,” says Schneller. “Protecting the enterprise is just one of the abilities they must have. They also have to be able to recruit talent, advocate for cybersecurity investments, assess acquisitions, protect the brand, and navigate compliance, which has expanded. In short, it’s about being a business leader.”

2. Grow responsibly

Schneller’s second tenet, “grow responsibly,” reflects the two attitudes that should guide modern CISOs. The attitude behind “responsibly” is the more traditional and obvious: Safeguard the organization. “Grow,” however, acknowledges the evolution of the CISO role, its responsibility to enable and propel the company’s growth.


“Your organization is under intense pressure to innovate as a means of growing,” says Schneller. “[That innovation] might be buying and integrating a new technology that will serve your customers. It might be building it yourself with your app developers. Whatever it is, they’re under pressure to develop it. The CISO needs to be right there at the table as the strategy is being formed, understanding why [the innovation] is there and knowing that the company is going to deploy it with or without your involvement. The worst case is that you get in the way. When a product is ready to go, it should also be secure.”

Having a seat at the table, says Schneller, is the minimum. Just as important is understanding how the company intends to grow and building the partnerships that align the CISO and other leaders in a way that eliminates silos and ensures that security does not become an assumed part of the process. Security becomes cultural as it is tactical. “When the company is ready to deploy that new capability, it’s ready to go and it’s secure because the teams were jointly aligned.”

3. Protect your reputation

Schneller’s third tenet is about striking a balance. On the one hand, protecting your reputation—or building it in the first place—requires transparency, especially around security. Security has become so important, he says, that it’s become a hurdle to many deals: “We hear this constantly in B-to-B, especially. CISOs will be asked to call the CISO or CIO of the customer so that we can kind of talk brass tacks about the security.”

Schneller emphasizes that this, too, is why modern CISOs must be able to navigate the entire enterprise and its business activities, not just the technical aspects of the job. “A big part of that is the executive presence perspective, being able to communicate the impact and have a practical means to help another stakeholder. And you must be able to work with the sales and legal teams adroitly enough such that you don’t over-promise.”

On the other hand, transparency can work against you if not properly managed. “It’s really [about] understanding now that the rest of the world is aware of your security capabilities. For one, transparency can help bad actors discern something about your security posture. They might manage to do so, for example, by reviewing your company’s scorecard, if it has one and has made it publicly available. Or perhaps those actors know something about the protocols by which your industry typically operates.”

In any case, says Schneller, you need to know those reasons. You can’t defend what you’re not aware of. You should know the reasons bad actors might target your company in the first place. Did it just win a high-profile client? Did it just pass some major liquidity milestone? Don’t just check security boxes. Think like the bad guy.


4. Protect your ecosystem

Underlying all of this is an important truth: Your firm’s cybersecurity relies not only on your own defenses, but on those of everyone in your ecosystem, especially since many of those players will have at least some degree of access to you and your customers’ information. “If that ecosystem isn’t secure,” says Schneller, “a breach outside of your virtual or physical laws could affect your company or your customers directly.” There is perhaps no better example of this than the Cambridge Analytica debacle. By the time the dust had settled, Meta had paid nearly $6B. That says nothing of their non-monetary damages. To this day, the breach haunts their brand.

How do you influence a company that you don’t run? “Concepts of collective defense are very important here,” says Schneller. “How do you work within trades, utility sector organizations to jointly and collaboratively raise defenses across the sector?” Again, this harkens back to pillar one. It’s yet another reason that a CISO must be capable beyond the technical aspects of the job.

5. Cultivate your security talent

Schneller encourages his audience to consider the gap between the demand for cyber talent and the supply of it. “Read any kind of public press,” he says, “and though the numbers may differ a bit, they’re consistent in that there are many tens, if not hundreds of thousands of open cyber positions.” In February of last year, according to Statista, about 750,000 cyber positions were open in the US alone. According to the World Economic Forum, the global number is about 3.5 million, and according to Cybercrime magazine, the disparity is expected to persist through at least 2025. As Schneller points out, this means companies will struggle to attract cyber talent, and they will have to seek it in non-traditional places.

There are many tactics for attracting security talent—aligning pay to what matters, ensuring that you have clear paths for advancing careers—but all this sums to a broader point that Schneller emphasizes: branding. Your organization must convey that it takes cybersecurity seriously, that it will provide cybersecurity talent a culture in which they can solve challenging problems, advance their careers, and earn respect, contributing to the success of the business. Don’t assume that cyber talent knows that your company values these qualities. “If you’re in a big bank,” he says, “people may not think of you as a place to develop a cyber career, but in reality, they have large cybersecurity teams.”


Where to find talent in the first place? What are the non-traditional sources? Schneller favors two. The first is the military. “I’m a huge fan of veteran recruiting. Veterans have a large degree of training and experience in cybersecurity and can do great things for your organization.” Many business leaders have praised veterans as employees, and some companies like Sophos even run their own military veterans cybersecurity program. In 2023 alone, the military invested $11.2 billion in cybersecurity programs.

The second resource is high schools and community and associate colleges. These institutions mold plenty of graduates who have all the skills and ambition they need to excel in cybersecurity. What means much more, reminds Schneller, is the right certification or, more generally, the right education, which you can help to shape and thereby develop your talent before it ever arrives at your door. “I encourage CISOs to find your local colleges and sit on their advisory boards,” says Schneller. “Shape that curriculum. Help mentor the students.”

With every passing year, cybersecurity moves faster, and grows more complex and sophisticated. Bad actors find new vulnerabilities to exploit and use new tools to exploit them. The CISO’s organization, then, will become proportionally more sophisticated and complex, and thus the CISO will manage to steer the organization only by leaning heavily on the above tenets. “The CISO must be an enterprise leader,” says Schneller, “a c-suite executive who can navigate the entire breadth of the firm.”

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW