What Being a CISO Taught Me About Security Leadership
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章,理解它的主要内容和结构。 文章是关于CISO(首席信息安全官)如何成功领导安全项目的四个框架。作者分享了自己在高增长公司担任CISO六年的经验。四个要点分别是:理解技术和业务、减少攻击面、支持同事建立信任、以及长期留任以使投资见效。 接下来,我需要将这些要点浓缩成简洁的句子。首先,CISO需要了解技术环境和业务优先级,这有助于构建可持续的安全架构。其次,减少攻击面可以通过淘汰不必要的资产和优化系统设计来实现。第三,通过与各部门合作,帮助他们成功,从而建立信任。最后,长期留任可以让安全措施积累效果,提升整体安全性。 现在,把这些要点整合成一个连贯的段落,并确保不超过100字。同时要避免使用“文章内容总结”这样的开头词。 可能的结构是:CISO应聚焦于可持续优势,通过理解技术与业务、减少攻击面、支持团队建立信任,并长期留任以实现安全目标。 检查字数是否符合要求,并确保信息准确传达。 </think> 文章提出首席信息安全官(CISO)应聚焦于可持续优势以成功领导安全项目。通过理解技术与业务环境、减少攻击面、支持团队建立信任,并长期留任以实现安全目标。 2026-2-26 00:0:0 Author: zeltser.com(查看原文) 阅读量:1 收藏

A four-point framework to succeeding as a CISO, based on my experiences of building and leading a security program at a high-growth company. It shows how to focus on the defender's advantage and escape the unending cycle of reacting to vulnerabilities, investigating incidents, and responding to attackers' advances.

What Being a CISO Taught Me About Security Leadership - illustration

Six years as CISO at a high-growth company taught me that the best programs are built by focusing on sustainable advantages that attackers can’t easily overcome. As security leaders, we have a way of escaping the cycle of reacting to vulnerabilities, investigating incidents, and responding to attackers’ advances.

Here’s a four-point approach to achieving this, based on my experiences of leading a security program from early stage to enterprise scale. We should:

  • Understand our technology and business;
  • Reduce the attack surface;
  • Support colleagues to build trust; and
  • Stay long enough for those investments to compound.

This way, we can develop a program that allows just the right amount of insecurity into the organization and turns us into enablers of business velocity.

Understand Our Technology and Business

Instead of being preoccupied with attackers’ tactics, we can use our inherent advantages as defenders. Our strength, the defender’s advantage, is our ability to develop a security architecture based on a solid understanding of our environment. This begins with maintaining an up-to-date inventory of all assets, including devices, applications, SaaS platforms, cloud workloads, AI services, and user accounts.

Understanding the tech environment allows us to create bottlenecks for attackers and focus areas for defenders. Zero trust access principles and Single Sign-On are examples of this approach. For example, SSO funnels authentication through a single point where we can enforce MFA and detect anomalies.

Tech alone is insufficient, though. At a tactical level, we also need to understand the role that IT resources play in the organization. Strategically, we must know the business priorities to align security projects with the company’s objectives. If we do this, we can better justify security budgets and lower security expenses while reducing risk. This requires asking good questions and listening to the answers.

Exploring, asking, and listening is important when we’re new to the role. But as the company’s business changes from year to year and sometimes quarter to quarter, we must adjust our understanding of the organization’s goals and expectations. Maintaining situational awareness is a continuous effort.

Reduce the Attack Surface

Our attention is constantly pulled toward urgent work: the latest vulnerability, the compliance deadline, the security investigation. But if we spend all our time on immediate concerns without investing in longer-term attack surface reduction, the urgent work will never decrease.

Reducing the attack surface includes decommissioning unnecessary SaaS products, deactivating unneeded user accounts, turning off unused systems, and otherwise reducing the IT components that require security oversight. Such efforts not only narrow the window of opportunity attackers can exploit, but also lower the costs of security and IT operations. This creates a virtuous cycle: Reduced operational overhead frees up budget and attention for strategic improvements, which further reduce both risk and cost.

Attack surface reduction also means adjusting how systems are designed and deployed. A security issue on an internet-exposed system demands a faster response than the same vulnerability on an isolated one. Network isolation and access restrictions decrease exposure and reduce the urgency of patching. This approach offers a way to escape the vulnerability management hamster wheel.

This isn’t a one-time cleanup. As the organization adopts new tools and services, the attack surface expands and requires ongoing oversight.

Support Colleagues to Build Trust

Helping colleagues succeed is a powerful way to influence security practices and mature the program. People route around burdens they find unreasonable, and gravitate toward teams and individuals that make projects happen. Security sits at the intersection of multiple disciplines, positioning us as such enablers.

We can build trust with other teams by collaborating on projects with shared interests. These early wins lay the foundation for the more challenging conversations that will inevitably come. For example:

  • We can work with engineering to define expectations that let teams ship on time while assigning realistic risk rankings to vulnerabilities. Knowing when to require urgency and when to pull back builds trust.

  • Legal and Privacy teams face shared challenges around security monitoring and data retention that create natural collaboration points. When an incident occurs, security leads the investigation while the Legal team determines notification obligations. General Counsel can also help when security policies need legal backing or the CISO needs independent authority to push back.

  • We can support efforts to embrace infrastructure-as-code practices, so infrastructure teams can move more swiftly while ensuring the configuration is secure and verifiable. Preapproved modules with built-in security requirements give engineers flexibility while maintaining guardrails.

These collaborations succeed because they start from the other team’s objectives, not ours. Those relationships allow us to shift from merely saying that “security is everyone’s responsibility” to embedding security into key processes throughout the company.

Stay Long Enough for Investments to Compound

Research shows the average CISO tenure runs for 3 years. Many change jobs before experiencing more than one phase of the builder, fixer, and scale operator arc: Building from scratch, then fixing what breaks, then optimizing at scale. Staying through multiple phases compounds the impact in ways that switching jobs cannot.

With several years in the role, we accumulate influence and trust that are unavailable at a new organization.

Some foundational changes simply take time. Attack surface reduction, identity architecture, and product security are multi-year investments. A CISO who leaves after two years may plant the seed but not see the harvest. Tenure also lets us assemble a team we trust, develop its members, and earn their trust in return. A team that can operate independently compounds the leader’s impact in ways no new hire replicates in year one.

The defender’s advantage pays its highest dividend here. Tenure deepens our understanding of the environment in ways no onboarding replicates. That accumulated terrain knowledge is exactly the edge that makes the defender’s position stronger than the attacker’s. After several years, we know which systems are truly critical, which vendors operate as true partners, and which risks the organization has consciously accepted.

But tenure without direction succumbs to the gentle pull of mediocrity. Staying demands intentional goals and action.

Act, Not Just Advise

Organizations expect CISOs to deliver outcomes aligned with business objectives, not risk-oriented opinions. Yet, we often operate as chief opinion officers rather than action takers: we track metrics, assess gaps, express concerns, and rely on others to act. All this activity suggests progress; but if we merely advise, we don’t change anything.

Action takers drive change by having uncomfortable conversations, negotiating with stakeholders, and accepting that the first version will have gaps. A consultant can deliver recommendations and leave. A security leader who stays has the responsibility to see changes through. That means applying a minimum viable product mentality, iterating rather than waiting, and calibrating acceptable insecurity rather than chasing the perfect state.

The defender’s advantage belongs to those who act on what they know.


文章来源: https://zeltser.com/ciso-leadership-lessons
如有侵权请联系:admin#unsafe.sh