The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership

The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership

The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership
Автор: Powell Walt
Дата выхода: 2026
Издательство: CRC Press is an imprint of Taylor & Francis Group, LLC
Количество страниц: 764
Размер файла: 4.1 MB
Тип файла: PDF
Добавил: codelibs
 Проверить на вирусы

Cover....2

Half Title....3

Series....5

Title....7

Copyright....8

Dedication....10

Contents....11

Foreword....27

Acknowledgments....29

Author....31

Chapter 1 Introduction....33

1.1 Purpose....33

1.1.1 Target Audience....33

1.1.2 Scope of the Book....34

1.2 Why Write This Book Now?....36

1.3 Motivation and Relevance....37

1.4 Book Structure and Organization....39

1.5 Author’s Background and Perspective....41

1.6 Self-Assessment: Are You Ready for CISO 3.0?....42

Part 1 The Changing Role of the Security Leader....45

Chapter 2 What Is a CISO 3.0?....46

2.1 Introduction....46

2.2 Brief History of CISOs....47

2.3 CISO 1.0....48

2.3.1 Role Tasks of the CISO 1.0....49

2.3.2 Challenges and Limitations of CISO 1.0....49

2.3.3 The Legacy of CISO 1.0....50

2.4 CISO 2.0....51

2.4.1 Role Tasks for CISO 2.0....51

2.4.2 Challenges and Limitations of CISO 2.0....52

2.5 Road to the CISO Role....56

2.6 CISO 3.0....59

2.6.1 Why CISO 3.0?....59

2.6.2 So, What Is a CISO 3.0?....61

2.6.3 How to Become a CISO 3.0....63

2.7 Conclusion....65

2.7.1 Key Takeaways....66

2.7.2 Reflection and Exploration Questions....68

Chapter 3 The Evolving Regulatory Landscape....70

3.1 Introduction....70

3.2 Caremark Lawsuits....71

3.2.1 Defining the Reasonable Standard and Mission Critical Risks....72

3.3 Navigating the SEC’s Cybersecurity Rule....74

3.3.1 Materiality: The Heart of the Matter....76

3.4 Navigating the FTC Safeguards Rule....77

3.4.1 Requirements of the FTC Safeguards Rule....78

3.5 Navigating the NYDFS Cybersecurity Rule....80

3.5.1 Requirements of the NYDFS Cybersecurity Rule....81

3.6 Enforcement Actions and Lessons Learned....83

3.6.1 SEC Enforcement Actions....84

3.6.2 FTC Enforcement Actions....85

3.6.3 NYDFS Enforcement Actions....85

3.6.4 Risk Quantification and Materiality: Cornerstones of Reasonableness....86

3.7 Implications for CISOs: Increased Accountability....87

3.7.1 The Fallout of SolarWinds and Uber....87

3.8 Conclusion....89

3.8.1 Key Takeaways....90

3.8.2 Reflection and Exploration Questions....92

Part 2 Business and Risk Alignment....95

Chapter 4 The Language of Business....96

4.1 Introduction to the Language of Business....96

4.1.1 The Language of Business....97

4.2 The Language of Accounting....98

4.2.1 Three Core Financial Statements....98

4.2.2 Financial Statement Trends to Watch for CISOs....100

4.3 The Language of Finance....102

4.4 The Language of Economics....103

4.5 The Language of Risk....106

4.6 Determining Value and Resource Allocation....107

4.6.1 Common Financial Metrics....108

4.7 OPEX versus CAPEX and Budgeting....110

4.7.1 Lease versus Buy Scenario....111

4.7.2 SG&A and COGS for CISOs....112

4.8 Aligning Cybersecurity with Financial Business Goals....115

4.9 Conclusion....117

4.9.1 Key Takeaways....118

4.9.2 Reflection and Exploration Questions....120

Chapter 5 Ownership and Boards of Directors....122

5.1 Introduction....122

5.2 Corporate Valuations....124

5.2.1 Methods for Determining Value....125

5.2.2 Specific Valuation Methods....126

5.3 Common Ownership Structures....130

5.3.1 Publicly Held Companies....130

5.3.2 Private Equity-Held Firms....134

5.3.3 Venture Capital-Held Firms....139

5.3.4 Limited Liability Companies....144

5.3.5 Family-Owned Companies....146

5.3.6 Sole Proprietorships....149

5.3.7 Public Organizations....152

5.4 Role of the Board of Directors....156

5.4.1 Understanding the Board’s Role....156

5.4.2 The Board’s Primary Responsibilities....158

5.4.3 Key Focus Areas for Boards....158

5.4.4 Board Governance Models....159

5.5 Fiduciary Duties....161

5.5.1 Duty of Loyalty....161

5.5.2 Duty of Obedience....162

5.5.3 Duty of Care....162

5.5.4 Duty of Prudence....162

5.6 Caremark and Legal Precedents....163

5.6.1 Caremark Case....164

5.6.2 Marchand (Blue Bell Ice Cream) Case....164

5.6.3 Boeing Co. Case....164

5.6.4 McDonald’s Corp. Case....165

5.6.5 Sorenson Case....165

5.7 The CISO’s Fiduciary Duty....166

5.8 The Dynamics of Governance: Board Directors versus Executives....167

5.8.1 The BOD: The Legislative Branch....168

5.8.2 Senior Management: The Executive Branch....168

5.8.3 Communicating with the BOD....170

5.8.4 Communicating with ELTs....171

5.9 Conclusion....172

5.9.1 Key Takeaways....173

5.9.2 Reflection and Exploration Questions....175

Chapter 6 Risk....177

6.1 Introduction....177

6.2 Risk Strategy....178

6.2.1 Risk Strategy versus Security Strategy....178

6.2.2 The CISO 3.0 Risk Strategy Framework....178

6.3 Risk overview and Definition....182

6.3.1 Likelihood versus Probability....183

6.4 Risk versus Threat....185

6.4.1 Common Misconceptions in Risk Registers....186

6.5 IT Risk versus Enterprise Risk....187

6.6 Qualitative Risk Analysis....191

6.6.1 Challenges of Traditional Qualitative Approaches....191

6.6.2 Risk Matrix: A Common Tool with Shortcomings....192

6.6.3 Moving to a More Quantitative Approach....194

6.7 Risk Quantification Basics....195

6.7.1 FAIR Framework....197

6.8 Risk Quantification in Practice....200

6.8.1 LECs: Visualizing Financial Risk....201

6.8.2 Inherent Risk on the LEC....202

6.8.3 Risk Appetite: Balancing Risk and Reward....202

6.8.4 Risk Appetite, Tolerance, and Limit on a Loss Curve....203

6.8.5 Determining Risk Appetite....204

6.8.6 Risk Appetite Statements....206

6.9 Risk Treatment Options....207

6.9.1 Risk Avoidance....207

6.9.2 Risk Transfer....208

6.9.3 Risk Mitigation....208

6.9.4 Risk Acceptance....209

6.10 Tail Risk and Black Swan Events....211

6.10.1 Black Swan Risks....211

6.10.2 Cyber Value at Risk....213

6.11 Residual Risk....215

6.11.1 Calculating Residual Risk....215

6.12 Loss Exceedance Example: Vandelay Industries....216

6.12.1 Scenario....216

6.12.2 Defining Materiality in Risk....219

6.13 The Risk Register 3.0....219

6.13.1 Risk and Control Self-Assessments....227

6.14 Integrating Cyber Risk with Enterprise Risk....229

6.14.1 COSO Alignment....232

6.14.2 Integrated Risk Management....233

6.15 DoCRA....235

6.15.1 DoCRA Principles and Practices....236

6.16 Risk for Global Enterprises....238

6.16.1 Challenges in Implementing Risk Quantification....238

6.16.2 Adapting Risk Quantification Strategies for Global Enterprises....239

6.17 Conclusion....241

6.17.1 Key Takeaways....243

6.17.2 Reflection and Exploration Questions....245

Part 3 Risk Treatment....247

Part 3A Transfer, Avoid, and Accept Risk....248

Chapter 7 Cyber Liability Insurance....249

7.1 Introduction....249

7.2 Cyber Risk Buy-Down Investment Mix....250

7.3 Commercial Cyber Insurance....252

7.4 The Changing Insurance Market....254

7.4.1 The Value Proposition of Cyber Insurance....255

7.5 A Framework for Procuring Cyber Insurance....256

7.6 Phase 1: Discovery and Self-Assessment....257

7.6.1 Determine and Understand Your Coverage Needs....259

7.7 Phase 2: Application and Prequalification....261

7.7.1 Cybersecurity Controls....262

7.8 Phase 3: Coverage Comparison and Purchase....264

7.8.1 Understanding Policy Language....265

7.8.2 Understanding Exclusions....268

7.8.3 Negotiate....270

7.9 Phase 4: Claim Readiness....271

7.9.1 Understanding Panel Providers....272

7.9.2 Put Retainers in Place....274

7.9.3 Coordinate with Legal....275

7.9.4 Ransom Brokers and Extortion Payments....275

7.10 Conclusion....277

7.10.1 Key Takeaways....278

7.10.2 Reflection and Exploration Questions....280

Chapter 8 Self-Insurance and Risk Financing....282

8.1 Introduction....282

8.2 Risk Acceptance....283

8.2.1 Business Line CBA for Cyber Risk....284

8.3 Capital Reallocation for Cybersecurity....287

8.3.1 Examples of Capital Reallocation....288

8.4 Self-Insurance for Cyber Risk....289

8.4.1 Pure Self-Insurance....291

8.4.2 Captives for Cyber Coverage....293

8.4.3 Funded Reserves....296

8.4.4 Cyber Risk Pools....297

8.4.5 Bonds as a Cyber Risk Mitigation Tool....299

8.4.6 Surety Bonds....301

8.4.7 Cyber Catastrophe Bonds....303

8.5 Risk Avoidance in Cybersecurity....304

8.6 Determining the Right Mix of Risk Treatment Methods....306

8.7 Conclusion....309

8.7.1 Key Takeaways....310

8.7.2 Reflection and Exploration Questions....312

Part 3B Risk Mitigation....314

Chapter 9 Developing a 3.0 Program Strategy....315

9.1 Introduction....315

9.2 The Role of Risk Mitigation in the Cyber Risk Investment Mix....316

9.3 Continuous Improvement....318

9.3.1 Key Pillars of Continuous Improvement in Cybersecurity....319

9.3.2 Benefits of Continuous Improvement....322

9.4 Program Assessments....323

9.4.1 Assessment versus Audit....324

9.4.2 Common Security Assessments: NIST CSF and CIS-18....325

9.4.3 The Assessment Process....327

9.4.4 Standards versus Frameworks....328

9.5 Layering Risk Quantification into Strategy....329

9.5.1 How to Leverage Risk Quantification for Strategic Planning....329

9.6 Creating a Quantified Roadmap....334

9.6.1 Security Program Strategy versus Security Program Roadmap....334

9.6.2 Leveraging Risk Quantification for Prioritization....334

9.6.3 Building the Roadmap....337

9.7 Earning Budget and Buy-in with the Quantified Roadmap....346

9.7.1 Changing the Discussion....346

9.7.2 Communicating the Quantified Roadmap to Executive Leadership....348

9.7.3 Combining Qualification and Quantification for a Powerful Narrative....350

9.8 Conclusion....351

9.8.1 Key Takeaways....352

9.8.2 Reflection and Exploration Questions....354

Chapter 10 Security Tactics and Capabilities....356

10.1 Introduction....356

10.2 Buying Capabilities, Not Tools....357

10.2.1 Why Buy Capabilities?....358

10.2.2 How to Buy Capabilities....359

10.3 Capability Assessments....360

10.3.1 Assessing Your Team’s Skills....361

10.3.2 Creating a Skills Gap Roadmap....361

10.3.3 Program and Individual Capabilities Assessments....362

10.3.4 Example Assessment Questions....362

10.4 Skills Matrix....365

10.4.1 Example....366

10.5 Capabilities Matrix....367

10.5.1 Understanding the Matrix....369

10.6 The Problem with RFPs....371

10.7 How to Shop for Capabilities Instead....373

10.7.1 Start with the Current State....374

10.7.2 Define the Desired Future State....374

10.7.3 Focus on Positive Business Outcomes....375

10.7.4 Establish Clear Requirements....375

10.7.5 Define Success Metrics....375

10.7.6 Address Current Capabilities and Deficiencies....375

10.8 Conclusion....379

10.8.1 Key Takeaways....380

10.8.2 Reflection and Exploration Questions....382

Chapter 11 Leading Effective Teams....384

11.1 Introduction....384

11.2 Understanding Security Roles....385

11.2.1 The NIST NICE Framework....388

11.3 Insourcing versus Outsourcing: A Strategic Choice....391

11.4 Insourcing....397

11.4.1 Hiring....398

11.4.2 Training....399

11.4.3 Retention....400

11.4.4 Career Pathing and Succession Planning....403

11.4.5 The CISO as a Talent Magnet....404

11.5 Leading through Change....408

11.5.1 Key Tenets of Change Leadership....409

11.5.2 Change Management Models....411

11.5.3 Behavioral Change Management....414

11.5.4 Influence and Persuasion....415

11.5.5 Gamification....415

11.5.6 Building a Positive Security Culture....419

11.6 The CISO 3.0 as a Leader....420

11.6.1 The CISO’s Self-Assessment....422

11.6.2 Assessments and the CISO Wheel....425

11.7 Conclusion....428

11.7.1 Key Takeaways....429

11.7.2 Reflection and Exploration Questions....431

Chapter 12 Security Tactics....433

12.1 Introduction....433

12.2 Identity Centricity....433

12.2.1 Insider Threats....436

12.3 Zero Trust....439

12.4 Continuous Monitoring....449

12.4.1 Continuous Threat Exposure Management....451

12.4.2 CTEM and AI....454

12.4.3 CTEM and the Development of Meaningful KPIs....455

12.5 Cloud-native Protection....457

12.5.1 Cloud Security Challenges....457

12.5.2 Cloud-Native Application Protection Platforms....458

12.5.3 Managing CNAPP....461

12.5.4 The CISO 3.0 and Cloud-Native Security....461

12.6 Data Governance....462

12.6.1 The Data Governance Lifecycle....462

12.6.2 Modern Data Platforms....464

12.6.3 Data Lakehouse....464

12.6.4 Data Security and Protection....465

12.6.5 Data Security Posture Management (DSPM) Platforms....468

12.6.6 The CISO 3.0 and Data Governance....470

12.6.7 Data Privacy....471

12.7 Bringing the Capabilities Together....477

12.7.1 Integrating Capabilities into the SOC: The Fusion Center Approach....479

12.7.2 Alternative to Fusion Centers: The Risk Exposure Center....482

12.7.3 Integrating Identity into SOC Operations....485

12.7.4 Integrating Data Privacy into SOC Operations....487

12.8 Conclusion....489

12.8.1 Key Takeaways....490

12.8.2 Reflection and Exploration Questions....492

Chapter 13 Modern Cyber Resilience....494

13.1 Introduction....494

13.2 Black Swan Risks....496

13.2.1 Antifragility....497

13.3 Cyber Resilience....498

13.3.1 Building Cyber Resilience....499

13.4 Quick Win Steps to Begin Your Cyber Resilience Journey....500

13.4.1 Step 1: Risk Appetite Assessment....500

13.4.2 Step 2: Define the Minimum Viable Company....501

13.4.3 Step 3: Analyze and Document Current Capabilities....502

13.4.4 Step 4: Identify Opportunities for Improvement....502

13.4.5 Step 5: Set Targets and Test Your Plan....502

13.5 Cyber recovery....503

13.5.1 Recovering from Immutable Backup....505

13.5.2 On-Demand versus Continuous Recovery....507

13.5.3 Building Cyber Recovery....510

13.5.4 Breach Simulation....514

13.6 Conclusion....517

13.6.1 Key Takeaways....518

13.6.2 Reflection and Exploration Questions....520

Chapter 14 AI and the Future of the CISO Role....522

14.1 Introduction....522

14.2 AI overview....524

14.3 Security for AI....528

14.3.1 AI governance....528

14.3.2 Policy....530

14.3.3 Regulations....531

14.3.4 Enablement Risks and Technical Challenges....532

14.3.5 Enablement Risk Examples....534

14.3.6 Implementing Controls....538

14.3.7 Third-Party Risk....541

14.3.8 AI Development....544

14.3.9 GenAI in Software Development....546

14.3.10 AI Architecture....550

14.3.11 Securing AI Applications through Threat Modeling....554

14.4 Security with AI....560

14.4.1 Security use Cases for GenAI....561

14.4.2 AI versus Automation....562

14.4.3 Real-World AI Security Uses....563

14.4.4 SOAR and Hyperautomation....565

14.4.5 Leveraging GenAI to Augment SOC Analysts....565

14.4.6 Chatbots in Security Automation....568

14.4.7 Specialized AI Security Tools....569

14.4.8 AI and Automation for the CISO Role....570

14.5 Security from AI....573

14.5.1 Target Attacks....574

14.6 Conclusion....577

14.6.1 Key Takeaways....578

14.6.2 Reflection and Exploration Questions....580

Part 4 Bringing It All Together....582

Chapter 15 Developing Modern Metrics....583

15.1 Introduction....583

15.2 Key Performance Indicators....584

15.3 Key Risk Indicators....586

15.3.1 Leading and lagging indicators....587

15.4 KPIs versus KRIs....588

15.4.1 Real-world example: from KPIs to KRIs....591

15.5 Developing meaningful metrics....594

15.5.1 Developing Meaningful KPIs....594

15.5.2 Common Metric Data Sources....596

15.5.3 Developing Meaningful KRIs....600

15.5.4 KRI Roadmap....601

15.5.5 KRI Identification....602

15.5.6 Example Metrics....605

15.5.7 Project Execution KRIs....606

15.5.8 Security Program KRIs....607

15.5.9 Additional KRI Ideas....608

15.5.10 Metric development Frameworks: DIKW and GQIM....609

15.5.11 The DIKW Pyramid....610

15.5.12 Applying DIKW to Create KPIs and KRIs....610

15.5.13 The GQIM Framework....611

15.6 How to Communicate KRIs....612

15.6.1 Tailoring KRI Communication to Stakeholder Audiences....613

15.6.2 Principles of Effective KRI Communication....622

15.7 Conclusion....624

15.7.1 Key Takeaways....625

15.7.2 Reflection and Exploration Questions....627

Chapter 16 Board-Level Communication....629

16.1 Introduction....629

16.2 Communicating with the Board....630

16.2.1 The Goal of Board-Level Communication....631

16.2.2 Types of Board Meetings....634

16.2.3 Board Focus Areas....636

16.2.4 Targeting Your Message....639

16.2.5 Preparing for Questions....641

16.3 Creating Board-Level Presentations....643

16.3.1 Presentation Matters....644

16.3.2 Crafting a Cybersecurity Story Arch....645

16.3.3 Data Storytelling....647

16.3.4 Correlation and Causation....650

16.3.5 Data Visualization....650

16.3.6 Creating Compelling Data Visualizations....651

16.3.7 Understanding Attention....652

16.3.8 The Triune Brain Model and Beyond....653

16.3.9 Capturing and Maintaining Attention....654

16.4 Creating board-Level Deliverables....655

16.4.1 Board Decks....656

16.4.2 The BLUF Slide....656

16.4.3 The Importance of Editing....657

16.4.4 Deck Content....659

16.4.5 Revenue Generation....660

16.4.6 Cost Reduction....662

16.4.7 Understanding Different Types of Costs....663

16.4.8 Cost Reduction Strategies....666

16.4.9 Cost Reduction Strategy....667

16.4.10 Building a Strong Business Case....672

16.4.11 IT or Security-Specific Balance Sheet....674

16.4.12 Risk Reduction....676

16.4.13 Board Books....679

16.4.14 Crafting Board Books....682

16.4.15 Creating Board-Level Dashboards....683

16.4.16 Creating Executive-Level Dashboards....686

16.4.17 Balanced Scorecard....689

16.4.18 Balanced Scorecard Strategy Map....695

16.5 Conclusion....699

16.5.1 Key Takeaways....700

16.5.2 Reflection and Exploration Questions....702

Chapter 17 Materiality and Disclosures....704

17.1 Introduction....704

17.2 Defining Materiality in Risks and Incidents....705

17.3 Determining Material Risk and Incidents....707

17.3.1 Rate of Change Materiality....710

17.3.2 Forecast Accuracy Materiality....711

17.4 PRIMA: Pre-Evaluated Risk and Incident Materiality Assessment....711

17.4.1 PRIMA Methodology....712

17.4.2 Examples of Risk Scenarios and Vulnerabilities....713

17.4.3 Qualitative Factors and Materiality....713

17.4.4 Rubric for Assessing Risk Criticality and Sensitivity....714

17.5 Disclosures....715

17.5.1 Examples of 8-K Cyber Incident Disclosures....717

17.5.2 The Reporting Process....719

17.6 Conclusion....720

17.6.1 Key Takeaways....721

17.6.2 Reflection and Exploration Questions....723

Chapter 18 The CISO 3.0: The Future of Cybersecurity Leadership....726

18.1 The Future of the CISO Role....726

18.1.1 The Challenges Today....728

18.1.2 Vision of the Challenges Ahead....734

18.1.3 The future of the CISO Role: Leading the Charge....738

18.2 Conclusion....738

18.2.1 What it Means to be a CISO 3.0....739

18.2.2 The CISO Self-Assessment: Revisited....742

18.2.3 Key Takeaways....743

18.2.4 Reflection and Exploration Questions....746

Index....748

This isn’t just a book. It is a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, Chief Information Security Officers (CISOs) can no longer rely solely on technical expertise. They must evolve into strategic business leaders who can seamlessly integrate cybersecurity into the fabric of their organizations.

This book challenges the traditional perception of CISOs as technical leaders, advocating for a strategic shift toward business alignment, quantitative risk management, and the embrace of emerging technologies like artificial intelligence (AI) and machine learning. It empowers CISOs to transcend their technical expertise and evolve into business-savvy leaders who are fully equipped to meet the rising expectations from boards, executives, and regulators. This book directly addresses the increasing demands from boards and regulators in the wake of recent high-profile cyber events, providing CISOs with the necessary skills and knowledge to navigate this new landscape.

This book isn’t just about theory but also action. It delves into the practicalities of business-aligned cybersecurity through real-life stories and illustrative examples that showcase the triumphs and tribulations of CISOs in the field. This book offers unparalleled insights gleaned from the author’s extensive experience in advising hundreds of successful programs, including in-depth discussions on risk quantification, cyber insurance strategies, and defining materiality for risks and incidents. This book fills the gap left by other resources, providing clear guidance on translating business alignment concepts into practice.

If you’re a cybersecurity professional aspiring to a CISO role or an existing CISO seeking to enhance your strategic leadership skills and business acumen, this book is your roadmap. It is designed to bridge the gap between the technical and business worlds and empower you to become a strategic leader who drives value and protects your organization’s most critical assets.


Похожее:

Список отзывов:

Нет отзывов к книге.