CISOs share their top 7 strategies for gaining C-Suite buy-in 

In a recent webinar hosted by Wiz, three esteemed CISOs shared their strategies for getting C-suite executives on board with plans for a comprehensive security program.

2 분 읽기

Wiz recently had the privilege of hosting three insightful CISOs for the most recent episode of our monthly CISO webinar series: Adam Fletcher, Chief Security Officer at Blackstone; Carla Sweeney, Security Team Lead at Red Ventures, and Jeff Farinich, the SVP of IT and CISO at New American Funding. They shared insights on aligning priorities with the board and how the dynamics of collaboration changes the game. We share some of the key takeaways below.  

  1. Speak the C-Suite language. A CISO's role has always been to balance business needs with security needs. Panelists stressed the need for CISOs to align their own priorities with those of C-suite executives. Both Fletcher and Sweeney emphasized the need to articulate risk in business terms that outline potential financial and regulatory impacts, they agreed that it’s best practice to trade technical jargon for language that C-suite executives understand. 

  2. Focus on governance versus control. Carla Sweeney shares that at Red Ventures they organize security efforts among a wider group of stakeholders. Jeff Farinich of New American Funding added that his security team also works closely with developers, which creates “flexibility for enablement, but also governance.” Among all the panelists, having the right relationships in place across teams was a high priority to effectively execute their programs. 

  3. Don’t assume legal liability. Make a clear distinction between security professionals owning risks versus identifying and surfacing risks. “It’s very important that we work closely with the board leadership to understand that we’re not the only ones who are at risk. It’s also them; it is a partnership. But as of now the CISO are kind of the fall guys, and we’ve gotta change that,” Jeff Farinich explained. 

  4. Establish strong relationships with stakeholders. Sweeney explained the delicate balance of keeping stakeholders informed while also securing sensitive information in case of a potential breach. She recommended having strong relationships across security, privacy, legal, and communications teams to do this successfully. 

  5. Understand the regulatory environment. When disclosing information on a potential breach, Farinich highlighted the need to accurately communicate with an organization’s board about technical risks and real-world implications, alongside keeping abreast with the ever-evolving regulatory terrain commanded by the SEC. 

  6. Throw out benchmarks and set your own goals. Achieving objectives should take precedence over relying on benchmarks or expense metrics. Fletcher cited Phil Venables' thoughts on the potential pitfalls of benchmarking, emphasizing the importance of setting individual security goals. He succinctly concluded: "run your own security program." 

  7. Be a team player. The CISO's role is no longer confined to the realms of the IT department. Rather, CISO have emerged as strategic teammates who work with C-suite executives. To garner C-suite buy-in for prioritizing cloud security, CISOs must provide a clear understanding of the organization’s cloud environments and identify critical assets at risk. 

Driving C-suite buy-in requires a combination of thought leadership, awareness building, effective communication, and setting common objectives. Our panelists put the focus on the importance of setting up good governance, assessing risk tolerance, and building robust relationships across all organization levels. They also emphasized the need to streamline processes so your teams can address vulnerabilities quickly and continuously monitor controls for quick interventions. 

Watch the webinar for more valuable insights! 

 

 

태그
#Security

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자