{"id":91549,"date":"2020-07-15T09:00:43","date_gmt":"2020-07-15T16:00:43","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91549"},"modified":"2023-05-26T14:17:32","modified_gmt":"2023-05-26T21:17:32","slug":"ciso-stressbusters-post-3-accountability-security-risk-management","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/15\/ciso-stressbusters-post-3-accountability-security-risk-management\/","title":{"rendered":"CISO Stressbusters: 3 ways to share accountability for security risk management"},"content":{"rendered":"
Jim Eckart, former Chief Information Security Officer (CISO) of The Coca-Cola Company and current Chief Security Advisor at Microsoft shares his advice for relieving stress in today\u2019s CISO Stressbuster post.<\/em><\/p>\n If you are a CISO, it can feel like the responsibility for keeping the company secure rests solely on your shoulders. This may be an attitude that\u2019s shared by your organization or a mindset based on your own sense of duty, but either way, it can cause a tremendous amount of stress\u2014and it may not make your organization more secure.<\/p>\n Although I currently work as a Chief Security Advisor at Microsoft, I\u2019ve spent the last decade of my career as a CISO in companies like Eli Lilly and Coca-Cola. I know first-hand how stressful this role can be. Distributing accountability can alleviate some of the pressure. It can also help you bring in new ideas and build a security culture. For the third blog in the CISO stressbusters series, here are three tips for sharing security accountability within and outside your organization.<\/p>\n After a series of well-published breaches at big brands, most boards and executive teams have acknowledged that a security incident isn\u2019t just a technology risk, it\u2019s a business risk. But often security is still treated as something that gets bolted on at the end. This can result in risky decisions that may be hard to fix later.<\/p>\n To effectively manage cyber risk, organizations need to evaluate the security risks of all major initiatives from the very beginning. For each project, people need to understand the risk tolerance of the company, the potential upsides of the project, and the risks in order to make smart decisions. This requires participation of business owners, security experts, and IT.<\/p>\n When I was hired at Coca-Cola, one of the first things I did was re-assemble the cyber risk management committee. This is a cross-functional stakeholder group responsible for making risk decisions on behalf of the entire enterprise. By including people from across the organization, we were able to align IT projects to business risk-based decisions. It took several meetings of this committee to get the business representation right and executives working effectively together, but it was worth the time. Now people across the organization have a stake in security.<\/p>\n One of the toughest jobs of the CISO is influencing a culture shift. Whether you\u2019re trying to get funding for your cybersecurity strategy or convince employees not to click on links in unknown emails, you need to persuade others to take security seriously. This can be a long process that requires regular communication, but a cybersecurity consulting company can help smooth the road.<\/p>\n An outside consultant can bring expertise and perspective that you and your team don\u2019t have. They also aren\u2019t restrained by the culture and internal politics in the same way that you might be. Most importantly, a third party can help you validate ideas and provide credibility. At Coca-Cola, I hired an external firm to do a top-to-bottom, independent security assessment, whose findings they ultimately presented to our Board. This drove proper strategic alignment and funding priorities for the implementation of my cybersecurity program.<\/p>\n To stay up to date, compare notes, or get advice, it can be really valuable to talk to CISOs at other companies with similar challenges. This can be tricky when much of our work is highly confidential. I joined two groups that are governed by confidentiality agreements. The Gartner Information Risk Management Research Board is a collection of 35-40 Fortune 500 CISOs. I was also a member of the CIO Strategy Exchange (CIOSE). With these groups, I developed long-standing and highly trusted relationships with peers in companies as large as mine.\u00a0<\/em><\/p>\n As a CISO you are under a lot of pressure. Even with a good support network, this is a stressful job. As you build and manage your security operation, look for ways to share accountability with others. It will help you sleep better at night, and it will strengthen your security culture. In the meantime, stay tuned for the next CISO Stressbuster post for more advice from others in the trenches.<\/p>\n Did you find these insights helpful? What would you tell your fellow CISOs about overcoming obstacles?\u00a0 What works for you? Please reach out to Diana Kelley on LinkedIn<\/a> if you\u2019re interested in being interviewed for one of our upcoming posts.<\/p>\n For more information about Microsoft security solutions visit our website.<\/a> Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" CISO Stressbusters: CISO guidance and support from around the world. <\/p>\n","protected":false},"author":96,"featured_media":91551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3675,3681],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1916],"class_list":["post-91549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-information-protection-and-governance","topic-risk-management","tag-microsoft-security-insights"],"yoast_head":"\n1. Establish a cyber risk management governance committee<\/h3>\n
2. Bring in third party expertise<\/h3>\n
3. <\/em>Join an external cybersecurity group<\/h3>\n
Looking ahead<\/h3>\n