A CISO shares his thoughts on what it takes to make a security project successful Our organization has been named a CSO50 Honoree this year. I am very proud of our team, both the immediate and extended groups of people that have worked on this project and helped make it successful. I have been reflecting on the roots of our project and how far we have brought it in a short time and I believe one thing in particular helped more than any other. To understand just what that is and why it worked we need to look back a couple of years ago when we were presented with a common challenge; Find a way to make sense of information security data in business context. Really provide useful information that enables decision making, not just for security projects but for the enterprise.I knew we couldn’t try and deliver operational security metrics and hope they made sense to our audience. They are great for the day to day operations of a team but do little to gather support and enable decision making. Over the past 15 years I have seen many efforts to deliver the best security metrics available fail. Believing “if they only saw the numbers they’d understand” can’t work because those numbers are anxiety drivers. We also had a very practical reason. We couldn’t fit them all in the provided reporting format, which was one line in a balanced scorecard and a few backgrounder slides.I have also seen many security programs try and adopt the “speak to them in business language” approach, using phrases like ‘Return on Security Investment’ and other jargon that mimics the people they are trying to reach. This is a step in the right direction, we do need common language to communicate but I don’t think it goes quite far enough. Just disguising security the same anxiety drivers in business words eventually leads to the same rejection. Both of those approaches would have left us trying to get the rest of the business to pay attention to our needs and listen to our problems. It became clear early on that if we wanted to be part of the business rather than always an outsider we had to shift perspectives. If we wanted to be a part of the business we had to make our program deliver like a business.To do that we adopted a customer centric mindset, against which to measure every opportunity and action we took. It helped us find out how to report information security risk to the business in a way they could use, but also with every relationship we have formed over the course of the project. I expect it will continue to bring us success into the future. Five little wordsBe First and Be Awesome – I am not exactly sure when it first got distilled to those five words. I know it was first delivered as a bit of humor at our weekly team meeting, and often joked about throughout the last couple of years. Eventually it became something that drove new ideas and helped us gauge how to proceed in pretty much every scenario we found ourselves.Being first held a couple meanings for us. When working with people – be first to understand what they needed and offer them help getting there. This is how we found out what to report on our scorecard line. We simply treated everyone we interacted with like our most valued customer. No matter where in the org chart, or when in the project cycle, we treated relationships like the success of our project depended on it, because it did. Second, when faced with a new idea – could we be the first to do something in our organization, could we lead it somewhere, improve something?To us ‘be awesome’ meant that whatever we undertook, we would just simply be the very best at delivering that expected outcome. Not just the best given the circumstances, but the best period. That meant we had to often find innovative ways to do things in offset the constraints common to a small team and budget.Dealing with reluctanceA CISO must navigate the cynics. No matter how well the above items are done there will always be people who don’t come on board for some time. These people come in different strengths of resistance and take various levels of proof to get them to believe. Don’t waste too much time with the cynics.Instead get busy being first and awesome and build a portfolio of successes. As the list of grows it will help erode resistance. Keep everyone up to date, let the word spread. Any particular success story can be the one to bring another cynic on board. . Related content opinion Clearing up the fog in implementing cloud security Joseph Davidson, Senior Network Security Engineer at Adobe, discusses providing holistic security across a range of legacy and acquired products through a file integrity monitoring and configuration monitoring system By CSO50 Blogger Mar 27, 2015 4 mins Cloud Security Data and Information Security IT Leadership opinion Phishing for clickers Dr. Christopher Pierson describes the Viewpost project that won a 2015 CSO50 award By CSO50 Blogger Feb 13, 2015 4 mins IT Leadership opinion Securing Colorado Jonathan Trull and Deborah Blyth describe their award-winning project. By CSO50 Blogger Jan 28, 2015 5 mins ROI and Metrics IT Leadership opinion Employee engagement secures the workplace By CSO50 Blogger May 02, 2014 3 mins IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe