Table of Contents
CISO Job Functions
A chief information security officer (CISO) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. [Wikipedia].
CISO is a key position in an organization and reports directly to either CIO or CEO. What are the primary job responsibilities of a CISO? Below mind map gives a holistic view of the different job responsibilities CISO role should cover.
Selling Information Security Internally
- Value creation
- Aligning with organization strategy
- Management Involvement
Finance
- Business Case
- ROI Analysis
- Budgeting
Architecture
- Network architecture/segmentation
- Application architecture
- Remote access/VPN
- Encryption
- Authentication
- Mobility
- Public/Private/Hybrid Cloud
- Backup
Governance
- Roles and responsibilities assignment
- Resource management
- Key performance Indicators(KPIs)
- Effective reporting
Security Operations-Focusing on the triad of people, process and technology.
Detection
- SIEM/log management
- IDS
- Endpoint Protection/Antivirus
- DLP
- Netflow
- Honeypots
- Threat Intelligence/Analysis
- Network behavior analysis
- Vulnerability lifecycle management
- Penetration Test
Prevention
- Firewall
- IPS
- WAF
- Identity Management
- Anti-Spam
- Sandboxing
- Anti-Malware
- Content Filtering
- Software Updates/Patches
- DDoS Protection
- Hardening
- Encryption
- PKI
Incident Management
- Incident Identification
- Containment
- Remediation & recovery
- Forensic Analysis
- Identity Management
Accounts management
- Single sign-on/ Two-factor authentication
- Active Directory/LDAP management
- Role-based access
- BYOD
- E-commerce sites
- Mobile applications
Risk Management
- Risk assessment methodology
- Risk identification
- Risk analysis
- Risk evaluation
- Risk mitigation/treatment
- Risk monitoring
Human Resources Management
Compliance
- PCI
- SOX
- HIPAA
- Follow industry specific compliance needs
Project Delivery
- Requirement analysis
- Planning
- Implementation
- Testing/Monitoring
- Certifications & Accreditation
Above pointers can be used by CIO’s/IS Managers for planning & tracking overall security needs of an organization.