CISO job description: What does a CISO do?

A chief information security officer will deal with more than firewalls and antivirus

CISO

Data has become the most valuable currency in the digitally-focused world in which we now live and work.

This unprecedented rise in data use and consumption has led not only to innovative new services but also a growing threat of theft and fraud, and combating this has required a strategy designed and coordinated from the board level.

Data security is now no longer seen as simply an IT issue, nor is it one reserved for the boardroom issue. In fact, data security is now the responsibility of everyone in an organisation.

What is a CISO?

In order for that responsibility to be taken seriously, a strategy and someone to lead that vision from theory into reality is required. Enter the chief information security officer (CISO). First borne as a role that was exclusively the preserve of US companies, the job title has now made its way to British shores, too.

The CISO, who may also be referred to as a chief security architecture or information security manager, is an executive role that oversees the protection of company and customer data, as well as the protection of infrastructure and assets from malicious actors.

In an age of rampant data theft and aggressive but important legislation, such as GDPR, every IT facility in an organisation must be secure. That not only requires the implementation of security safeguards but also the training and educating of employees. With the majority of cyber security incidents being the result of employee error, it's important that a CISO is looking both internally and externally for potential threats.

As the threat landscape continues to evolve, the work of a CISO must also keep pace.

What responsibilities does a CISO have?

CISOs have a wide range of responsibilities that extend far beyond dealing with firewalls and antivirus software. They are responsible for hiring IT personnel, for providing necessary policy direction to protect the company from emerging threats., and for directly managing senior IT team leaders to ensure they are prioritising the right aspects of a strategy at any given time.

A CISO must also spearhead the company's IT security hardware strategy and make sure necessary activities are undertaken by the appropriate department, whether this is IT staff or other IT security personnel.

Innovation also plays a key role in any organisation's security posture. As such, the CISO will also be tasked with keeping corporate security policies, standards and procedures fresh and fit for purpose, and making sure staff across the board comply on a day-to-day basis without fail.

CISOs are expected to work with the entire organisation to ensure everyone is pulling in the same direction. After all, ensuring security is a continuous process rather than something that can be auctioned once and then left alone. It needs to evolve and change as the threat landscape does. Success here, then, will include conversing regularly with senior management and employees to make sure all IT security policies are deployed, revised, sustained and overseen effectively.

Emulating what might happen in the real world is one way of ensuring everyone is on the same page when it comes to the threat of breaches and data theft. By essentially phishing employees to see who clicks on what - in your own, controlled environment - you can be more sure of any awareness gaps and training needs. Showing employees the damage that could have been done, but thankfully wasn't, will also ensure security remains front of mind in future.

As part of this, existing IT infrastructure must be audited and assessed for any security risks and CISOs are responsible for using the data they have at hand to predict any risks and deal with them accordingly. They need to be continuously assessing vulnerabilities and finding fixes before an incident occurs.

A CISO also needs to develop policies around security incidents and create an Emergency Response Team to act as and when a security breach is looming or has happened. As well as this, they may be in charge of developing a disaster recovery plan to allow for business continuity post-cyber-attack.

Like many businesses and IT decision-makers, CISOs are constrained by budgets, so resources need to be prioritised and allocated efficiently and financial forecasts prepared to ensure appropriate cover for security assets. A CISO needs to show that investments can be used to protect an organisation's assets and safeguard its data and reputation if the worst should happen.

What skills are needed to be a CISO?

To be a competent CISO, several key skills are required, beyond common sense. These include:

  • Communication and presentation skills
  • Policy development and administration skills
  • Knowledge about government (e.g. relevant legislation both current and incoming)
  • Collaboration expertise
  • Financial, planning and strategic management skills
  • Supervisory and incident management skills
  • And, finally, knowledge of regulation and standards compliance.

However, the most valuable skill for a CISO is the ability to articulate IT security and technical issues in a non-threatening, clear and actionable manner to non-technical leadership.

Generally speaking, it is also expected that someone applying for a CISO role is very experienced, with many roles specifying at least 10-plus years in senior risk management and security roles.

How much does a CISO get paid?

A CISO in the UK can expect to be paid on average around £88,000 a year, and many companies also offer additional benefits and bonuses. The average annual bonus for a CISO is around £11,000 in the UK.

While the average UK salary is £88,000, some companies at the highest level are offering salaries of circa £132,000.

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Recommended

How to delete a Facebook business page
social media

How to delete a Facebook business page

15 Sep 2020
IT Pro Live: Trust through conversations in the 'suddenly virtual' enterprise
Business

IT Pro Live: Trust through conversations in the 'suddenly virtual' enterprise

1 Sep 2020
Amazon Contact Lens gives call center managers real-time call insight
Amazon Web Services (AWS)

Amazon Contact Lens gives call center managers real-time call insight

23 Jul 2020
What is Facebook Analytics?
analytics

What is Facebook Analytics?

10 Jul 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
The Xbox Series X shows how far the cloud still has to go
Cloud

The Xbox Series X shows how far the cloud still has to go

25 Sep 2020