C-Suite Shuffle: The CISO’s Evolving Role and Reporting Structure

In 1994, Steve Katz became the world’s first chief information security officer (CISO) after Citicorp endured a string of cyberbreaches at the hands of Russian hackers. Katz is an undisputed legend in the CISO profession that he’s credited with launching. His origin story remains relevant today for CISOs adapting to new reporting structures and relationships with their C-suite colleagues.

Prior to joining Citigroup’s predecessor organization, Katz helmed JPMorgan’s information security unit. The offer of a C-level title and a blank check to “build the best information security department anywhere on the globe” was too much to pass up, Katz told Cybercrime Magazine last year.

Cyberattacks continue to drive CISO hiring and information security investments today, more than a quarter-century after the position first emerged. How the role has evolved since then sheds light on the current reporting structure trend of CISOs reporting directly to the CEO or other C-suite officer, with a dotted-line relationship to the CIO – because at the onset of the CISO role, this wasn’t the reporting structure.

A quick CISO history lesson

The CISOs who followed in Katz’s footsteps in the mid-1990s through the late-2000s typically had come up in the IT function. They had networking and infrastructure experience, maybe some IT audit expertise, and even a little bit of risk management in their backgrounds. The role was technical in nature, and it attracted rising leaders who previously may have aspired to become a CIO. (Prior to the CISO position, the role was often called a security manager.) During the position’s first decade of existence, most CISOs reported directly to their CIO; there wasn’t much, if any, consideration of a different reporting structure, and CISOs did not have board-reporting responsibilities.

The role began evolving in the mid-2000s as cyberattacks intensified and industry regulators and standards-setters began to respond to those incidents with new rules and guidelines. The continual adoption of more sophisticated systems and technologies, accompanied by data-driven approaches, continues to shape the CISO role to this day.

Some of these shifts raised questions about competing interests between the CISO and the CIO. CIOs, then as now, were charged with propelling the business forward – by transforming its inner workings from manual processes to automated processes via enabling technology – as quickly and cost-effectively as possible. That mandate and approach can sometimes come into conflict with the CISO’s mission to protect the organization from cybersecurity risks. New technology often introduces new risks and mitigating those takes time and costs money. CISOs were understandably conflicted about impeding the efforts of the person signing their checks. These issues started triggering more questions about whether the CISO position should be separated from the CIO and the IT function.

Later, regulations in the financial services industry – which has long served as something of a cybersecurity beacon for other sectors – raised additional questions about the CISO reporting structure. The Office of the Comptroller of the Currency (OCC), in its September 2014 Final Rule, OCC Guidelines Establishing Heightened Standards for Certain Large Insured National Banks, Insured Federal Savings Associations, and Insured Federal Branches; Integration of Regulations, distinguished the risk management responsibilities among an organization’s first (business units), second (risk management) and third (internal audit) lines of defense, which fundamentally changed how banks organized their reporting structures, including CISOs, whose independence from the CIO was established by having the position report instead to the chief risk officer (CRO), chief audit executive, CFO or even the CEO.

New stakeholders and benefits to consider

State, federal and national information security and data privacy regulations have proliferated in the past few years, and many of these new rules require companies to have a CISO position. For example, the Bermuda Monetary Authority’s Insurance Sector Operational Cyber Risk Management Code of Conduct and the New York Department of Financial Services cybersecurity regulation call for organizations to have a CISO in place.

In just the past few months, the U.S. federal government has issued a number of security memoranda and directives – among them President Joe Biden’s executive order to strengthen the nation’s cybersecurity – that underscore the need to have a CISO in place. In addition, the American Institute of Certified Public Accountants (AICPA) has a mock audit that is being proposed as an attachment to financial audits. It communicates the need for every public company to have a board member with security expertise.

Most companies have embraced digital strategies and operations, which require a security mindset, compliance with all relevant cybersecurity rules, and an expanding information security capability that encompasses preventative, detective and responsive capabilities in addition to strong governance and data privacy controls. The increased regulatory data privacy and security landscape, along with the growing prevalence and pervasiveness of ransomware and malware attacks, further underscores the importance of the CISO role.

These developments have increased the modern-day CISO’s responsibilities while raising important questions about the role and where it sits in the organization:

  • Should we spin out a separate data privacy function under the CISO, a chief privacy officer (CPO) or a data protection officer (DPO)?
  • What is the real role of the CISO – governance, risk management (second line), operational security (first line)?
  • How can an independent information security program maintain a collaborative partnership with the IT function given the crucial need to address security in development operations? Isn’t there an inherent conflict in the role?

Within organizations that have mature information security programs, the CISO commands a growing team of domain experts while focusing on governance activities – this includes reporting to the board. In companies with less advanced information security capabilities, the CISO is often a “boil-all” security risk-mitigating position.

Regardless of the state of their cybersecurity capability, most organizations need to carefully consider, or reconsider, the CISO’s reporting relationship(s). A recent survey on CISOs, conducted by Hitch Partners, found that the percentage of CISOs in private companies who report to the CEO (27%) has more than doubled since 2019 (11%). The survey also shows a shift away from CISOs reporting to the CIO in publicly traded companies.

Ultimately, there are pros and cons to having the CISO report to another C-suite executive – such as the CEO or CRO versus the CIO. The benefits of reporting to the CEO or other C-suite officer include:

  • Aligning to the CISO’s corporate oversight objective;
  • Insulating the cybersecurity budget from IT;
  • Increasing the CISO’s authority and influence outside of IT, which empowers the CISO to interact regularly with business units, elevates the CISO’s proximity to the broader business and IT threat landscape, and improves overall communication about information security;
  • Reducing the perception that cybersecurity is solely an IT problem;
  • Ensuring the CISO team’s projects and workload are organized and managed independently from the IT department;
  • Enhancing the group’s ability to manage shadow IT security risks; and
  • Strengthening the CISO’s hand when the CIO accepts too much risk.

On the other hand, there also are benefits to consider in maintaining a CISO-CIO reporting structure, such as:

  • Elevating the CISO’s influence and authority within IT;
  • Reducing the workload of the CISO’s team to coordinate with IT versus if the team operated separately (i.e., as part of the CEO or CRO organization);
  • Increasing the CISO’s proximity to the first-line infrastructure, development teams, changing technology environment and daily threat landscape; and
  • Emphasizing the importance of information security in first-line business functions, versus as an issue for risk management (second line) or internal audit (third line) to address.

CISOs and their C-suite colleagues have a lot to weigh when evaluating which reporting structure serves the best interest of the organization. Given the challenging mandates CISOs have to protect their increasingly data-driven organizations amid a rapidly growing threat landscape, those considerations are well worth conducting.

To learn more about our CISO Next initiative, contact us.

Nick Puetz

Managing Director
Security and Privacy

Farid Abdelkader

Managing Director
IT Audit

Subscribe to Topics

In the latest #Technology Insights blog post, read how Protiviti works with clients who have concerns about #IoT device #security by asking five questions about their device security ecosystem: http://ow.ly/igKy50H5pbV

In this #podcast episode, Protiviti's Jim McDonald and Jeff Steadman talk with Armin Ebrahimi, Head of Distributed Identity at Ping Identity, about the role #identityproofing plays in the #identity space. Listen now: http://ow.ly/8jCz50H5mte

We invite you to visit the @Xillio #TOPGOLF VIP Cabana for a few hours of networking, happy hour food & drinks, and golf ⛳️ to unwind yourself during the #Microsoft365 Collaboration Conference in Las Vegas. Reserve your ticket at https://hubs.li/Q0106-7R0 and have fun🥳!

The #quantumcomputing industry believed #MonteCarlo simulations would be one of the best use cases to show #quantumadvantage; @QCWare proved the feasibility. @KonstantHacker and QC Ware's Yianni Gamvros chat how to access reusable #quantum #code. http://ow.ly/cRmK50H4wQh

Protiviti's Scott Laliberte shares with Venture Beat four mistakes that can lead to a failed AI implementation and what to do to avoid or resolve these issues for a successful AI rollout. http://ow.ly/wU8C50H4pBY

#ProtivitiTech #AI #machinelearning #technology

Load More...