Understanding Cybersecurity at the Corporate level
April 17th, 2018
Cyber Security is evolving to be priority for any organization and the corporate establishment are feeling the heat. Let’s understand who does what in cyber security services at the corporate level.
Chief Information Security Officer (CISO)
The CISO is responsible for all security programs and policies. More CISOs report to the CEO but its most common for them to report to the CIO. Usually the CISO leads a team that implements and monitors security systems that safeguards the company’s critical data from unauthorized access and data leaks. With all the high-profile data breaches in the recent past more companies are aligning the CISO position with the IT department.
Chief Risk Officer (CRO)
Usually this position is filled by an attorney and he/she cover more than just cyber risk. CRO and his/her team assesses how much cyber insurance the company should purchase and also assesses the company’s regulatory risk. From an IT security perspective, the CRO plays an advisory role in which they explain to the board what risks malware, exploits, and other hacking incidents present to the company and what the risk/reward scenarios are.
Chief Technology Officer (CTO)
CTOs can be of two types, one that focuses on IT procurements which the company require such as firewalls/routers, data loss prevention, anti-virus software etc.
The other type are usually found in tech companies. They focus on the technology that is embedded on to their products and security is an important component of product development. The CTO assesses whether the company can securely deploy the products they bring to market without any vulnerabilities to the company’s and user’s data.
Chief Information Officer (CIO)
CIO is responsible for the overall IT operations in the organization. He/she typically oversees the budget for the IT operations, so all spending on security systems and personnel must first get approval through the CIO’s desk. CIO reports to the CEO and often have a chair on the executive board.
Chief Privacy Officer (CPO) / Chief Data Officer (CDO)
Data privacy is of prime importance to any company. CPO focuses on the company’s data privacy policies surrounding information security. They assess what data the company needs to keep and set retention policies for data. They decide on where the data resides, how it will be stored, and the policies around maintaining that data.
Chief Financial Officer (CFO)
The CFO overlooks all financial decisions and accounting in an organization. CFO works along with CRO to decide how much cyber insurance the company needs. Both the CISO and the CIO may report to the CFO at some companies.
- Digitalization without Cyber Security
- The story of university data attacks
- What is Soar?
- When Protection Fails, Forensics can still win the game
- Drones are capable to capture your communications!
- 2019 The Year of Cyber Crime
- Email Security Gateways
- Introduction to SIEM
- Insider Threat
- A beginner’s guide to Blockchain
- NoSQL – High-performance, non relational database ...
- Leveraging Cloud for Disaster Recovery
- Application Performance Monitoring
- Cognitive Security AI Driven Cyber Security
- Introduction to Container Services
- Insider Threat Detection
- Build Secure and Governed Microservices with Kafka Streams
- Add and Manage photos in Outlook messages and contacts ...
- Security on a Budget
- About CodeTwo Email Signatures for Office 365
- Googles presence in China
- Check Point Software acquires Dome9 to beef up multi-cl ...
- Exploring the benefits and challenges of hyper converge ...
- Next Generation cloud backup and data protection for Of ...
- Backup for Office 365 with Code Two
- Email Security
- Cisco Issues Security Patch
- British Airways Hacked
- AutoML Vision
- Day 2 Keynote: Bringing the Cloud to You
- CI/CD in a Serverless World
- Keynote Google
- Google Cloud Next 2018 in Under 12 Minutes
- UAE Crowned as the most Digital Friendly Country
- Ransomware continues to prey on the UAE
- Chrome for all
- Machine Learning for a Future-Facing ZTS Revolution
- The Dawn of the Cloud
- Will Cryptocurrency Replace Conventional Currency
- Internet of Thing Under Attack
- Cloud Native Computing Transforming IT Infrastructure
- Cyber Security with Artificial Intelligence
- Understanding Cybersecurity at the Corporate level
- Cryptojacking on the rise
- Google discontinues Google Search Appliance (GSA)
- Secure cloud entry points with Google Chrome Enterprise
- Cloud Infrastructure to drive UAE Cloud Computing Market
- AI to contribute $320 billion USD to Middle East GDP by 2030
- Well begun for well being
- A Spin around the Space
- Oracle opens first innovation hub with a focus on AI
- AI to bring a world of opportunities to Dubai
- The BitCoin Revolution
- Annihilating to a Green Thought
- The Intelligent Move
- Looking Right at the Face of Facebook and Google