Q

How can a CSO take ownership of a security program?

CSOs may be in charge of their security programs, but they don't work alone. In this SearchSecurity.com Q&A, security management expert Mike Rothman describes how protecting data and systems is a collaborative effort.

When it comes to information security, Department of Defense organizations have cut-and-dry requirements to meet. Most DoD organizations I have worked with, however, feel that information security is the IT department's responsibility. How does a new chief security officer (CSO) get an organization to take ownership of the security program?
Information security is everyone's responsibility. Every employee must do the right thing and protect the data and systems within his or her control. But it is the chief security officer (CSO) who is accountable for the results of the security program. Hopefully, the difference is clear.

It's also important to note that the CSO is a position of influence, as most of the resources needed to successfully run a security program reside in multiple groups. For instance, the network operations team tends to run the firewalls and IPS gear. The data center managers are responsible for patching the servers and securing the databases. Yet someone has to assume responsibility to make sure that everything works together, business...

systems remain available and data is appropriately protected.

What I'm alluding to here is that every CSO needs to manage the security PROGRAM, and they do this without directly controlling people or tools. Right, that's a tall order.

As I describe in the Pragmatic CSO, the job of the CSO is now more about persuading senior managers and IT colleagues to implement good security practices. This is a multi-stage process that is radically different than one that most security professionals have used in the past. But given the new reality of such a wide distribution of resources, most CSOs have no choice but to act more Pragmatically.

Those in the DoD need to express security within the context of the military business, just as those in commercial enterprises need to make security relevant to their business operations.

More information:

  • Should capable network managers stretch their duties into the security space, perhaps acting more like a CSO? Contributor Shon Harris explains.
  • Make sure your information security governance program is focused and effective.
  • This was first published in April 2007

    Dig deeper on Information Security Policies, Procedures and Guidelines

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close