such talented CISOs as Bob Wynn, Gail Griffith and Bill Spernow have plumbed the depths of a persistent lack of institutional seriousness about information security On our cover this month we show a trio of highly competent, yet disillusioned security executives who have stubbed their heads against not the glass ceiling, exactly, but more like the pro forma ceiling or the hypocrite ceiling. Or the just-plain-ignorant ceiling. For a variety of reasons, into which Scott Berinato’s story (Locked Out) delves, such talented CISOs as Bob Wynn, Gail Griffith and Bill Spernow have plumbed the depths of a persistent lack of institutional seriousness about information security.As of press time, they’re out of work.Well, maybe not altogether out of work. What they’re out of are the kinds of jobs they’re best suited to perform, that engage their passion and commitment and expert understanding of risk. Griffith is selling real estate, where the dominant risk is dry rot in the footers and sills or a bad location, location, location. But like Wynn and Spernow, she keeps on looking and hoping for something that, in Spernow’s words, will amount to more than being a “paper tiger.” (In the most extreme examples of this phenomenon, it appears the CISO position has been created so that someone can check off a box on an audit statement.)This is not an encouraging picture. And yet there is reasonand useful precedentto suggest that it may be a simple case of growing pains. In the early days of the CIO profession, the title was often bestowed months or years in advance of the role’s ultimate maturation within organizations. So you had situations where the CEO read an article in the Harvard Business Review or Newsweek that touted the importance of information technology and the need for its high-level governance. And so a bunch of newly minted CXOs sailed forth into what were essentially lose-lose positions created in the midst of skeptical Other O’swho looked like nothing so much as circling sharks. Many CIOs complained that they were functioning as glorified directors of the data-processing department and that they enjoyed zero institutional (or collegial) support. In that light, consider the case of ex-CISO Terry Williams, in Berinato’s story, as he seeks a new job (now that his old one has been “dissolved”): “Mostly, they’re looking for router and firewall jockeys.”So, where is the way out of this undermining dilemma? As I have insisted before in this space, the main political priority for anyone whose work is so grossly misunderstood is to manage the expectations of the Big Dogs. What must you do once you figure out that the BDs think the job of their CISO is to (a) keep bad things from ever happening; (b) scratch some board of directors’ itch about security-related liabilities; (c) never interfere with another executive’s untrammeled right to do whatever he or she wants without regard to security implications; (d) spend no more than a pittance; and (e) do all of this without any real authority or BD-level support? You must either change the boss’s mind or get the heck out of Dodge. My advice would be to work on those internal marketing skills first and your résumé second. But sometimes, inevitably, reality is what it is. The environment simply isn’t ready for enlightened security leadership. In which case, real estate starts to look better and better.-Lew McCreary mccreary@cxo.comP.S.: It isn’t only in a profession’s early epoch that it suffers ignominious slings and arrows. For evidence of this, see columnist Jerry Gregoire’s fascinating essay, “The Vanishing IT Department,” in the June 1, 2004, issue of our sister publication, CIO magazine: www.cio.com/archive/060104/peer.html. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe