The Chief Insecurity Officer
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解它的主要观点。 文章讨论的是CISO的角色转变,传统上CISO被认为是负责最大化安全的人,但作者提出应该重新定义为平衡适当的不安全状态。这样CISO不再是阻碍业务发展的障碍,而是推动业务增长的助力。 接下来,文章提到了几个关键点:理解业务节奏、定义可接受的不安全程度、衡量现状与目标之间的差距,并以AI为例说明如何应用这个框架。最后强调了这种思维转变对CISO角色的重要性。 现在,我需要将这些要点浓缩成100字以内的总结。要确保涵盖重新定义角色、平衡不安全与安全、推动业务增长以及实际应用这几个方面。 可能的结构是:开头说明重新定义CISO的角色,接着提到平衡不安全与安全,然后指出推动业务增长的方法,最后提到实际应用的例子。 检查字数是否符合要求,并确保语言简洁明了。 </think> 文章重新定义了首席信息安全官(CISO)的角色,认为其职责不应是最大化安全性,而是平衡适当的不安全状态以推动业务发展。通过理解业务节奏、定义可接受的不安全程度以及衡量现状与目标差距,CISO可以成为企业增长的助力而非障碍。 2026-1-28 00:0:0 Author: zeltser.com(查看原文) 阅读量:2 收藏

What if the CISO's job isn't to maximize security but to calibrate the right amount of insecurity? Reframing the role this way turns security leaders from obstacles into enablers of business velocity.

The Chief Insecurity Officer - illustration

“The job of a CISO is to let just the right amount of insecurity in,” said my friend Gal Bitensky, a security pragmatist. He was channeling Ian Amit’s perspective that security leaders exist to advance the business while managing risks.

Historically, we’ve framed the CISO role as securing the organization. But the business requires some level of insecurity to function. For work to happen, information must flow. Apps must be used. Links must be clicked. Sales needs to share proposals over channels you don’t fully control.

If we frame our role around security, stakeholders hesitate to get us involved out of fear that we’ll get in the way. Frame it around acceptable insecurity, and we’re calibrating how fast the business can move. We become essential to that velocity.

To let in just the right amount of insecurity, find the balance between careless exposure and controls that strangle velocity. Here’s how.

Understand the Business Pace

Start by learning how fast the company wants to move toward its objectives. This requires curiosity, asking the right questions, and participating in discussions about business goals. I think of that as achieving business alignment.

A diagnostic: Can you name your company’s product launches coming this quarter and identify which security decisions could delay them? If not, you need to dig deeper.

Define Acceptable Insecurity

Next, establish how much insecurity the organization can absorb without stumbling. Frameworks such as ISO 27005 and 31000 offer a starting point for defining risk appetite and tolerance, but they often produce policies that are disconnected from reality. We need to develop practical, repeatable workflows for distinguishing acceptable from overly insecure situations.

A diagnostic: Can you articulate why a specific security risk is acceptable in terms that your CFO would understand? Can you do the same for a risk you consider unacceptable? If not, you’re operating on instinct rather than calibrated criteria.

Measure the Gap

Next, measure the gap between the current state of insecurity and the acceptable state. This requires knowing how your controls actually perform, not just that they exist. Look not only for areas that are insufficiently secure, but also for controls that are too restrictive. The latter is just as important.

A diagnostic: A marketing team wants to use an AI writing tool. Your security review takes six weeks. By week two, half the team has signed up with personal emails. Can you detect this? Can you determine whether this workaround is acceptable and explain the logic to your peers? Can you tell when acceptable boundaries are being bypassed?

Apply This to AI

To see this approach in action, apply it to AI, where pressure is high and risk boundaries are still forming.

Walk through the framework:

  1. Understand the pace. How urgently does leadership want AI capabilities? What’s the cost of delay?
  2. Define acceptable insecurity. Which data can AI tools access? What oversight is required? For instance, a team wants to feed customer support tickets into an LLM to draft responses. The tickets include names and account numbers. Is that acceptable if these details are redacted? What if they aren’t?
  3. Measure the gap. What’s the current state? Are existing policies blocking experimentation that doesn’t introduce meaningful risks, or is sensitive data flowing to unapproved tools?

The Reframe Matters

How you frame your role shapes every conversation, even if it’s just in your mind. Security leaders who maximize security become obstacles. Those who calibrate insecurity become enablers.

Frame your role around insecurities rather than security, and you might earn the title of Chief Insecurity Officer. The acronym still works.


文章来源: https://zeltser.com/chief-insecurity-officer/
如有侵权请联系:admin#unsafe.sh