Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO Must Ask Each Other

نویسنده

  • Todd Fitzgerald
چکیده

The chief executive officer (CEO), chief information officer (CIO), and chief information security officer (CISO) walk into a bar. The CEO orders a light beer. The CIO normally orders his full-bodied stout beer but being politically savvy and noticing the CEO’s order, also orders a light beer. The CEO’s order has raised the curiosity of the CIO, and he just can’t help but ask the CEO, “Why not have a real beer, one with all the flavor and the way beers are supposed to be made?” The CEO explains that there is just as much flavor for her needs, but with a much lower personal cost to the waistline. A few seconds later, the CISO comes in and orders a double shot of whisky and downs it in one gulp. The CEO turns to the CISO and says, “Did you have a bad day, is there something I should be concerned about?” The CISO replies, “No, I just saw that you ordered a light beer and figured we would be doing some belt-tightening, the business was losing money, you would cut my budget, and we are probably going out of business. Was the CIO trying to be in touch with the needs of the CEO? Was the CISO overreacting? We have all heard many different versions of bar jokes; however, each reminds us there are simple lessons to be learned. Let’s examine the roles of the CEO, CIO, and CISO further to understand their real roles within the organization necessary to move the business forward with respect to information security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Strategic Management of IS/IT Functions: The Role of the CIO

Chief information officers (CIOs) have the difficult job of running a function that uses a lot of resources but offers little measurable evidence of its value. Line managers are increasingly assuming responsibility for planning, building, and running information systems that affect their operations. To respond to business and technological changes, CIOs now must build relationships with line ma...

متن کامل

CIO Reporting Structure, Strategic Positioning, and Firm Performance

Almost 30 years after the introduction of the CIO position, the ideal CIO reporting structure (whether the CIO should report to the CEO or the CFO) is yet to be prescribed. There is an intuitive assumption among some proponents of IT that the CIO should always report to the CEO to emphasize the importance of IT in the firm and the clout of the CIO, while some adversaries of IT call for a CIO-CF...

متن کامل

Assessment for Enterprise Security Decision Making

Assessment is an integral part of a chief information security officer’s (CISO) daily work. Continuously, the CISO must make security policy decisions, either introducing new policies or technologies in the organisation, or modifying existing policies. Assessment in this environment must inherently go beyond assessment of the policy’s security properties alone. It must include considerations ab...

متن کامل

Understanding the CEO/CIO Relationship

The need for top management involvement in the exploitation of IT is a recurring theme of information management Previous research has suggested that this involvement is linked with a two way relationship between CEO and CIO. This paper reports on an exploratory research study which set out to identify the determinants of a successful two way relationship. CEOs and CIOs were interviewed in-dept...

متن کامل

CIO and CEO Heterogeneity, IT Support, and IT Competitiveness in Stable and Unstable Environments: An Empirical Study

While top management support is critical to the success of information technologies (IT), little is known about how differences and similarities between the CEO and the CIO influence such support. Accordingly, this research examines the heterogeneity between CEO and CIO as antecedents of organizational support and its impact on competitive position in regards to IT in stable and unstable enviro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Systems Security

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2007