Unfortunately this scenario is not uncommon. Often small or midsize companies that are initially establishing information security departments or adding a CISO are doing so as a direct result of an audit finding. They are required to put a security officer in place but are sometimes not willing to make the commitment to staff or budget that will allow the security officer to be effective in implementing a program. It is extremely important for anyone going on an interview to understand the companys motivation behind the creation of the position. If it is a replacement, then you want to know the circumstances that caused the predecessor to leave. One of the most telling signs of a lack of authority is the reporting structure of the position. If the CISO is buried deep within the organization, it is likely that he will encounter much difficulty in implementing his programs. Due diligence as a job seeker means making sure that you fully understand what you are getting into when you accept a new position. Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe