previous arrow
next arrow
Slider

Passing The Cybersecurity Baton To A vCISO

 Published: October 1, 2019  Created: June 17, 2019

By Michelle Drolet

Businesses continue to face modern cyber attacks such as ransomware threats and data breach incidents. In the wake of a non-stop onslaught from advanced hackers, it seems that no matter what defensive measures organizations put in place, cyber adversaries and malware authors are able to circumvent them.

Cybercriminals are not only motivated to target high-profile enterprises; in fact, they tend to look at smaller and emerging businesses more because they are vulnerable targets. Most small and mid-sized companies come to face a double-whammy when it comes to protecting corporate networks and having the foresight for tackling increasingly difficult mandates in governance, risk management and compliance (GRC) for long-term success.

First, they struggle to commit larger budgets to finance evolved security fixes. Secondly, even if they are prepared to invest in modern defenses, they either suffer from a lack of in-house expertise or find it extremely difficult to source the right talent, such as a chief information security officer (CISO), from the market. This is because there’s a serious dearth of skilled and experienced security professionals.

Findings from Verizon’s latest Data Breach Investigation Report corroborate this fact as the research states that 43% of all breaches occur at small businesses. The same report also highlights that as high as 56% of data breaches take months or longer to become known, as this is largely due to the absence of the right kind of expertise.

Turning To A vCISO Is A Pragmatic Call To Action

At a time when regulatory guidelines are becoming more stringent than ever, with some recommending appointing a CISO, organizations must find a way to respond to modern cyber threats that are growing in scope and cost. In doing this, the first daunting challenge lies in being able to manage and control all the potential weak points in the corporate IT network and end-user devices.

Next, and this is where the real difficulty lies, is being able to do it with limited financial resources and in-house expertise — or even with the hired guns, for they are difficult to find. There is a pressing need to up the ante in cybersecurity to proactively combat a dangerous combination of mounting malware threats of increasing sophistication and a widening gap in the skills required to identify and combat them. The time to consider useful alternatives such a hiring a virtual CISO is now, for it not only helps restore the confidence in an organization’s IT security while correcting its risk posture, but it also would provide immense help to CIOs or IT managers in delivering a more streamlined and secure rollout of IT policies.

Companies with either stretched financial resources or inadequate security expertise can discover a very meaningful use case in appointing a virtual chief information security officer (vCISO).

Among many of its obvious benefits include being able to move swiftly in the right direction to become compliant with emerging regulatory guidelines and plugging leaking holes to prevent data loss. What’s more, contracting a vCISO isn’t cost prohibitive like recruiting a full-time security expert. A vCISO comes with all the advantages that a full-time, seasoned CISO offers with their breadth of knowledge and security expertise. A vCISO can help you conduct a quick assessment of existing IT programs and policies, ensuring your organization is able to make all the required changes to strengthen the security posture as demanded by the evolving cyberthreat landscape and regulatory climate.

Appointing A vCISO Goes Way Beyond A Makeshift Arrangement

For small to mid-size companies looking to bring on a vCISO in a consulting capacity, here are some noteworthy traits you should consider before hiring:

    • A vCISO should be able to articulate the inherent risks, educate management and explain available options in layman’s terms that are jargon-free.
    • Taking a page from former Intel CEO Andrew Grove’s bestselling book, “Only the Paranoid Survive,” the vCISO can never rest or rest assured. They should never be complacent but remain diligent and even slightly paranoid.
    • A vCISO should know the basics of IT security, ensuring daily tasks like server security and coding skills are executed properly.
    • A vCISO should strive to have good working relations with local law enforcement due to the inevitability of needing to report breach incidents (vCISOs need to respond urgently).
    • A vCISO should have the talent to introduce creative approaches, especially at smaller organizations pinched by limited budgets. Focusing on employee training and ensuring two-factor authentication should be top of mind.
    • A vCISO should possess good communication and collaboration skills to help win upper management buy-in to ensure that security remains a priority. Applying security protocols to existing products may boost sales while offering a competitive advantage.

Companies that aim to seize emerging opportunities in digital transformation such as cloud, mobility, blockchain, the internet of things (IoT) and more — but fear legacy IT or poorly configured IT security environments as major bottlenecks — can think of vCISOs as strategists who are adaptive to their clients’ needs and capable to help customers learn quickly to embrace disruptive technology with confidence and a well-planned road map.


https://www.forbes.com/sites/forbestechcouncil/2019/06/17/passing-the-cybersecurity-baton-to-a-vciso/#522837903875


No Thoughts on Passing The Cybersecurity Baton To A vCISO

Leave A Comment