{"id":2225,"date":"2021-02-09T18:41:42","date_gmt":"2021-02-09T18:41:42","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=2225"},"modified":"2021-04-12T05:18:26","modified_gmt":"2021-04-12T05:18:26","slug":"smb-cybersecurity-guide-the-role-of-a-ciso","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/","title":{"rendered":"SMB&#8217;s Cybersecurity Guide: The Role of a CISO"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>The types of cybersecurity challenges confronting small- and medium-size businesses (SMBs) are on the rise. In a report shared on Business Wire, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20200729005208\/en\/Tanium-Report-Reveals-90-Percent-of-Organizations-Experienced-an-Increase-in-Cyberattacks-due-to-COVID-19\" target=\"_blank\" rel=\"noopener noreferrer\">Tanium<\/a> found that 98% of Chief Experience Officers (CXOs) had experienced security challenges within the first two months of their employers having shifted to remote work as a result of the pandemic. Approximately the same percentage (93%) of respondents subsequently decided to delay key security projects as they navigated this transition. Their decision came at a time when nine in 10 IT leaders were already seeing an increase in attacks associated with Coronavirus 2019 (COVID-19), thereby jeopardizing their organizations\u2019 digital security even more.<\/p>\n<p>These and other security challenges highlight the need for organizations to have the right leadership going into the months and years ahead. That\u2019s where the role of a Chief Information Security Officer (CISO) comes in. This blog post will explore the role of the CISO and explain why it\u2019s important for SMEs (Small and Medium-sized Enterprises). After discussing the challenges of SMEs gaining access to the expertise of a CISO, it will conclude by discussing how organizations can turn to virtual CISO (vCISO) services offered by a managed services provider.<\/p>\n<h2 class=\"navy\">What Is the Role of a CISO?<\/h2>\n<p>An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.<\/p>\n<h3>1.\u00a0\u00a0\u00a0 Aligning Security Initiatives with Business Objectives<\/h3>\n<p>First and foremost, CISOs need to make sure that their organization\u2019s security projects are aligned with its business objectives. This will help to ensure that digital security doesn\u2019t exist in a vacuum. Indeed, it will give CISOs the ability to use security in an effort to help the organization grow and expand.<\/p>\n<p>This alignment of security to business objectives is especially important given the fact that many Board members have limited technical expertise. A 2019 report from the <a href=\"https:\/\/www.acscenter.org\/blog\/why-the-ciso\/ciso-perspective-should-matter-to-corporate-boards\/\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Cyber Security Center<\/a> (ACSC) found that 38% of respondents felt their Board members viewed cyber risks as only \u201csomewhat significant.\u201d In response, CISOs can work to provide additional education and training to their Boards.<\/p>\n<p>As <a href=\"https:\/\/securityintelligence.com\/how-can-cisos-improve-board-governance-around-cyber-risk-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a> explains in a blog post:<\/p>\n<p>CISOs should take stock of the current level of knowledge of the full board and work to improve the board\u2019s cybersecurity expertise. Board members should receive consistent training and enhance their cybersecurity expertise, whether that is delivered by the CISO, by engaging external cyber risk advisers or through third-party assessments.<\/p>\n<p>CISOs can complement this ongoing security training with a their continued efforts to frame security investments in terms of the organization\u2019s business objectives. With reference to the Board in particular, they might consider linking their organization\u2019s investments to specific risks confronting them and their economic sector as well as to measurable outcomes. This will help CISOs to demonstrate ROI to the Board.<\/p>\n<h3>2.\u00a0\u00a0\u00a0 Facilitating Strategic Governance<\/h3>\n<p>As part of their efforts to align security with the business, CISOs need to take stock of organization\u2019s current environment. That includes understanding the current strategic governance plan that\u2019s in effect.<\/p>\n<p><a href=\"https:\/\/deltarisk.com\/blog\/information-security-governance-5-tips-for-new-cisos-cheat-sheet\/\" target=\"_blank\" rel=\"noopener noreferrer\">Delta Risk<\/a> defines strategic governance as \u201call of the people, processes, and technology we mentioned above that you need if you want to be sure your organization\u2019s security needs are covered.\u201d The managed security services provider notes that CISOs can facilitate strategic governance by first choosing a framework that they can use to get their organization\u2019s information security program up and running. (<a href=\"https:\/\/www.itgovernance.co.uk\/iso27000-family\" target=\"_blank\" rel=\"noopener noreferrer\">ISO<\/a>, <a href=\"http:\/\/www.isaca.org\/Knowledge-Center\/COBIT\/Pages\/Overview.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">COBIT<\/a> and <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener noreferrer\">NIST<\/a> are some common choices.) Many of these frameworks emphasize the need for CISOs to create an overarching security policy that applies to the entire organization. As such, organizations need to create an information security program governance committee for reviewing and approving all security policies. This committee should consist of HR, Legal and members of the C-suite who can examine all security policies from a different perspective.<\/p>\n<p>From there, CISOs can work with the C-level to obtain executive buy-in for their efforts. They should proceed by first performing a security risk assessment to identify gaps between their security policy and the organization\u2019s current security state. Such an evaluation will yield valuable knowledge that CISOs can then use to campaign for creating new processes, investing in security awareness training and procuring new security tools.<\/p>\n<h3>3.\u00a0\u00a0\u00a0 Managing Audits<\/h3>\n<p>Last but not least, CISOs need to manage audits for their organization. They can do this in part by developing policies, procedures and programs that secure data in a way that ensures compliance with the framework that applies to them.<\/p>\n<p>CISOs can\u2019t stop there, however. Referencing a job description template provided by <a href=\"https:\/\/www.educause.edu\/focus-areas-and-initiatives\/policy-and-security\/cybersecurity-program\/resources\/information-security-guide\/career-and-workforce-development\/ciso-job-description-template\" target=\"_blank\" rel=\"noopener noreferrer\">EDUCAUSE<\/a>, CISOs also need to work with internal auditors, outside consultants and other entities with carrying out required security assessments and audits. This task requires that CISOs provide leadership in tracking all security-related audits including their scope, the departments\/systems that are involved, the timelines over which they\u2019ll occur, the agencies with which they\u2019ll work and the changes that they might make as a result of those audits\u2019 outcomes. Along the way, they might also need to formulate a strategy for addressing numerous audits, compliance checks and external assessments at once.<\/p>\n<h2 class=\"navy\">Difficulties for SMEs<\/h2>\n<p>SMEs could very well benefit from enlisting the security expertise of a CISO. But it\u2019s not always practical for them to do so in a traditional sense. Indeed, SMEs\u2019 security programs are usually smaller in scale than those at large enterprises. Such organizations might not need a full-time CISO, as a result. This could make the <a href=\"https:\/\/www.salary.com\/research\/salary\/benchmark\/chief-information-security-officer-salary\" target=\"_blank\" rel=\"noopener noreferrer\">average salary of a CISO<\/a> impossible to absorb.<\/p>\n<p>Even if they want to have a traditional CISO, SMEs might run into additional struggles with finding one. The <a href=\"https:\/\/www.wsj.com\/articles\/talent-shortage-makes-cisos-a-hot-commodity-11560331805\" target=\"_blank\" rel=\"noopener noreferrer\">Wall Street Journal<\/a> notes that \u201cchief information security officer is a relatively new title near the top of a company, with a comparatively shallow pool of candidates\u201d in a field that\u2019s already suffering from a skills gap. The talent pool is still evolving to find qualified candidates to fill this leadership role, in other words.<\/p>\n<p>Even if SMEs find a CISO, that doesn\u2019t mean the candidate will be in their job for long or even excel in their position. Indeed, a report from <a href=\"https:\/\/media.nominet.uk\/wp-content\/uploads\/2019\/02\/12130924\/Nominet-Cyber_CISO-report_FINAL-130219.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Nominet Cyber Security<\/a> found that less than a third of all CISOs spend more than three years in their jobs. Simultaneously, <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-09-17-gartner-survey-reveals-only-12-percent-of-cisos-are-considered-highly-effective\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a> found in a 2020 report that just 12% of CISOs excelled in all four categories of its CISO Effectiveness Index.<\/p>\n<h2 class=\"navy\">vCISO as an Alternative<\/h2>\n<p>Acknowledging these difficulties, organizations might want to consider going with a vCISO instead. A vCISO is usually a security expert who uses their experience to help other organizations set up their information security programs and architect their security strategies. Oftentimes, <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">managed service providers<\/a> offer vCISO services to help smaller organizations like SMEs pursue their security goals.<\/p>\n<p>Organizations interested in enlisting the help of a vCISO should first make an effort to understand their cybersecurity risk baseline. Towards that end, ITEGRITI released its Cybersecurity Risk Assessment to help organizations evaluate their cybersecurity preparedness and maturity. Those who take it will receive a copy of the risk baseline report along with a cybersecurity maturity score based solely on this attestation, along with control implications in areas where cybersecurity controls may need improvement.<\/p>\n<p>Learn more about Itegriti\u2019s Assessment <a href=\"https:\/\/www.research.net\/r\/cyberriskbaseline\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p>This SMB Guide is part of a series to assist small and medium-sized businesses with their cybersecurity needs. You can read others in the series here:<\/p>\n<ul>\n<li><a href=\"\/2021\/blog\/smb-cybersecurity-guide-the-role-of-a-ciso\/\">Cybersecurity Guide: The Role of a CISO<\/a><\/li>\n<li><a href=\"\/2021\/blog\/smb-cybersecurity-guide-security-awareness-training\/\">Cybersecurity Guide: Security Awareness &amp; Training<\/a><\/li>\n<li><a href=\"\/2021\/blog\/smb-cybersecurity-guide-to-asset-inventory\/\">Cybersecurity Guide: Asset Inventory<\/a><\/li>\n<li><a href=\"\/2021\/blog\/smbs-cybersecurity-guide-asset-baselines-hardening-change-management\/\">Cybersecurity Guide: Asset Baselines, Hardening and Change Management<\/a><\/li>\n<li><a href=\"\/2021\/managed-services\/smbs-cybersecurity-guide-vulnerability-management\/\">Cybersecurity Guide: Vulnerability Management<\/a><\/li>\n<li><a href=\"\/2021\/managed-services\/smb-guide-to-access-account-management\/\">Cybersecurity Guide: Access &amp; Account Management<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-guide-to-supply-chain-management-third-party-vendors\/\">Cybersecurity Guide: Supply Chain Management\/Third Party Vendors<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-guide-to-incident-management-review\/\">Cybersecurity Guide: Incident Management &amp; Review<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smbs-cybersecurity-guide-information-management-protection\/\">Cybersecurity Guide: Information Management &amp; Protection<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-guide-to-boundary-defense-electronic-physical-security\/\">Cybersecurity Guide: Boundary Defense, Electronic &amp; Physical Security<\/a><\/li>\n<\/ul>\n<\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance. <\/p>\n","protected":false},"author":12,"featured_media":2352,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SMB&#039;s Cybersecurity Guide: The Role of a CISO - kw022024<\/title>\n<meta name=\"description\" content=\"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SMB&#039;s Cybersecurity Guide: The Role of a CISO\" \/>\n<meta property=\"og:description\" content=\"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-09T18:41:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T05:18:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Bisson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.\" \/>\n<meta name=\"twitter:creator\" content=\"@DMBisson\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Bisson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/\"},\"author\":{\"name\":\"David Bisson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\"},\"headline\":\"SMB&#8217;s Cybersecurity Guide: The Role of a CISO\",\"datePublished\":\"2021-02-09T18:41:42+00:00\",\"dateModified\":\"2021-04-12T05:18:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/\"},\"wordCount\":1502,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/\",\"name\":\"SMB's Cybersecurity Guide: The Role of a CISO - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg\",\"datePublished\":\"2021-02-09T18:41:42+00:00\",\"dateModified\":\"2021-04-12T05:18:26+00:00\",\"description\":\"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SMB&#8217;s Cybersecurity Guide: The Role of a CISO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\",\"name\":\"David Bisson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"caption\":\"David Bisson\"},\"description\":\"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/\",\"https:\/\/x.com\/DMBisson\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SMB's Cybersecurity Guide: The Role of a CISO - kw022024","description":"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/","og_locale":"en_US","og_type":"article","og_title":"SMB's Cybersecurity Guide: The Role of a CISO","og_description":"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-02-09T18:41:42+00:00","article_modified_time":"2021-04-12T05:18:26+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg","type":"image\/jpeg"}],"author":"David Bisson","twitter_card":"summary_large_image","twitter_description":"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.","twitter_creator":"@DMBisson","twitter_site":"@itegriti","twitter_misc":{"Written by":"David Bisson","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/"},"author":{"name":"David Bisson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807"},"headline":"SMB&#8217;s Cybersecurity Guide: The Role of a CISO","datePublished":"2021-02-09T18:41:42+00:00","dateModified":"2021-04-12T05:18:26+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/"},"wordCount":1502,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg","articleSection":["Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/","name":"SMB's Cybersecurity Guide: The Role of a CISO - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg","datePublished":"2021-02-09T18:41:42+00:00","dateModified":"2021-04-12T05:18:26+00:00","description":"An effective CISO must uphold three key tasks. These are aligning security initiatives with business objectives, facilitating strategic governance and monitoring for compliance.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_role_of_CISO.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-the-role-of-a-ciso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"SMB&#8217;s Cybersecurity Guide: The Role of a CISO"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807","name":"David Bisson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","caption":"David Bisson"},"description":"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.","sameAs":["https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/","https:\/\/x.com\/DMBisson"],"url":"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2225"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=2225"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2225\/revisions"}],"predecessor-version":[{"id":2670,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2225\/revisions\/2670"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/2352"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=2225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=2225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=2225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}