Analyzing The CIO's Roles & Responsibilities Regarding Cybersecurity

Melissa Stevens | November 17, 2016 | tag: Cybersecurity

The chief information officer (CIO) has traditionally owned IT security — and in recent years, cybersecurity has become a larger part of the modern CIO’s responsibility. Cybersecurity is a company-wide issue — and it’s everyone’s responsibility to manage it appropriately — but today, the CIO must act as a steward for the data and ensure that the right controls and processes are in place for data security.

In this article, we’ll walk through the CIO’s roles and responsibilities as they pertain to cybersecurity, and examine several ways the CIO role has more recently evolved.

The CIO's Roles & Responsibilities Regarding Cybersecurity

  • The CIO must be aware of the regulations that govern their industry or their business. With this information, they must be able to communicate their cybersecurity posture and any risk to the necessary parties both internally and externally.
  • The CIO must focus on both the training and overall awareness of cybersecurity. For example, the CIO may need to facilitate the cybersecurity awareness of end users or for those managing applications or analytics.
  • The CIO must ensure that the right controls are in place and the right tools to mitigate cybersecurity risk are in use.
  • The CIO must be able to appropriately benchmark cybersecurity and leverage frameworks like NIST or ISO 27002/1.
  • The CIO must enforce and manage cybersecurity controls for vendors and monitor them continuously as the business relationship continues. In the precontractual state with the vendor, the CIO must ensure that the vendors are vetted thoroughly via the necessary methods. This may include audits, questionnaires, on-site visits, penetration tests, or analysis of a vendors' security rating.

Related: There are thousands of questions you could ask your vendor about security. Can you determine which of them are the most important?

An Analysis Of The Evolving CIO Role

There are a few important changes that have happened over the years — and responsibilities that are still evolving — within the role of chief information officer.

  1. The CIO is now often given a seat at the enterprise risk management committee table. And they are many times joined by representatives from other departments — for example, a member each from the audit team, the compliance team, the legal team, the finance team, and others. In fact, the chief information security officer (CISO) typically joins this Board as well, signaling a shift in the criticality of cybersecurity today.
  2. The CIO is more heavily involved in the interoperation of systems across the organization. The Internet of Things (IoT) has played a major role in this, as greater connectivity allows for a wider digital ecosystem. For example, companies are connecting machines to machines and applications to analytics. The CIO needs to ensure that these processes are secure through and through.
  3. The CIO today isn’t siloed with legacy IT; rather, they partner with other departments regularly to ensure cybersecurity is embedded in all critical business functions. Whereas the CIO used to focus more on keeping servers up and applications running, the modern CIO partners regularly with the chief operating officer (COO) and the chief marketing officer (CMO) to ensure all business functions are running smoothly and with as little cybersecurity risk as possible.
  4. Depending on the industry, the CIO may not have as large of a stake in cybersecurity as another business function. For example, in heavily regulated industries, there’s a paradigm of who owns information security and cybersecurity. In certain cases, it may be that someone outside of IT (say, in compliance) may have a more heavily weighted role than the CIO. The CIO is still involved — but perhaps not to to the degree that he would be otherwise.

In Conclusion

Because the role of today’s CIO has evolved so much, it’s critical to automate as many processes as possible. BitSight Security Ratings give you the ability to examine third party vendors or potential mergers before you sign a contract and during the length of the contract. CIOs today know that cybersecurity must be considered on a constant basis — and BitSight facilitates this process.New call-to-action

Suggested Posts

Do You Have What it Takes to Achieve Digital Resilience?

The term “digital resilience” has gained momentum over the past few years as cybersecurity threats have grown, but what does it really mean? And how can a company become digitally resilient?

READ MORE »

What’s Most Notable in Biden’s Cybersecurity Executive Order?

In light of recent significant attacks targeting the U.S. government, the Biden administration issued an Executive Order (EO) on cybersecurity on May 8, 2021.

Overall, the EO starts to fill in some critical gaps in US government...

READ MORE »

BitSight Observations Into Hafnium Part Four: Who Is Still Vulnerable?

The unfolding Hafnium attack is the latest event in the trend of cyber events. CISO’s are starting to recognize that enterprise cyber security is being redefined to mean me and all my suppliers, or  the combination of first and third...

READ MORE »

Subscribe to get security news and updates in your inbox.