How can a CSO take ownership of a security program?

Ask the Expert

How can a CSO take ownership of a security program?

When it comes to information security, Department of Defense organizations have cut-and-dry requirements to meet. Most DoD organizations I have worked with, however, feel that information security is the IT department's responsibility. How does a new chief security officer (CSO) get an organization to take ownership of the security program?

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor

Information security is everyone's responsibility. Every employee must do the right thing and protect the data and systems within his or her control. But it is the chief security officer (CSO) who is accountable for the results of the security program. Hopefully, the difference is clear.

It's also important to note that the CSO is a position of influence, as most of the resources needed to successfully run a security program reside in multiple groups. For instance, the network operations team tends to run the firewalls and IPS gear. The data center managers are responsible for patching the servers and securing the databases. Yet someone has to assume responsibility to make sure that everything works together, business systems remain available and data is appropriately protected.

What I'm alluding to here is that every CSO needs to manage the security PROGRAM, and they do this without directly controlling people or tools. Right, that's a tall order.

As I describe in the Pragmatic CSO, the job of the CSO is now more about persuading senior managers and IT colleagues to implement good security practices. This is a multi-stage process that is radically different than one that most security professionals have used in the past. But given the new reality of such a wide distribution of resources, most CSOs have no choice but to act more Pragmatically.

Those in the DoD need to express security within the context of the military business, just as those in commercial enterprises need to make security relevant to their business operations.

More information:

  • Should capable network managers stretch their duties into the security space, perhaps acting more like a CSO? Contributor Shon Harris explains.
  • Make sure your information security governance program is focused and effective.

This was first published in April 2007