Explainers & Guides

Why CISOs Shouldn't Be the Sole Risk Owners

Learn why CISO should't be the sole risk owners in cyber security and third-party risk management, and why responsibility should be shared across the organisation.

Why CISOs Shouldn't Be the Sole Risk OwnersWhy CISOs Shouldn't Be the Sole Risk Owners

Chief Information Security Officers (CISOs) play a crucial role in today's fast-paced digital landscape. Traditionally, organisations have viewed CISOs as the guardians of cyber security, often burdening them with the entire responsibility for risk management. This approach extends to Third-Party Risk Management (TPRM) programmes and broader cyber security initiatives.

However, we must embrace a paradigm shift as cyber threats grow more sophisticated and intertwine with business operations. The notion that CISOs should solely own all cyber security and third-party risks needs to be reevaluated, as it actively harms an organisation's overall security posture.

This article explores why CISOs must transition from being sole risk owners to becoming facilitators of risk management across the entire organisation. This shift doesn't diminish the importance of the CISO; rather, it enhances the effectiveness of risk management by involving all parts of the business, and increasing overall accountability for a shared problem.

The Case Against Sole Risk Ownership

Traditional view of CISOs as primary risk owners

For years, many organisations have placed the full weight of cyber security risk ownership on their CISOs' shoulders. This traditional view positions the CISO as the ultimate guardian against cyber threats, tasking them with identifying, assessing, and mitigating all risks related to information security.

While this approach seems logical at first glance - after all, CISOs are the cyber security experts - it brings several significant drawbacks that hinder effective and company-wide cyber risk management.

Transitioning CISOs role from technical to a strategic business leadership role

One major issue with CISOs as sole risk owners is the increasing need to fully understand the wider business context. CISOs are increasingly tasked to go beyond just technical expertise and develop a deep understanding of their organisation's business, strategy, and objectives. This allows them to align security initiatives with business goals and translate security into business impact. Effective CISOs can communicate security risks and needs in business terms that resonate with executives and board members. This includes explaining how security investments are supporting wider business objectives.

CISOs are also expected to build strong relationships across the organisation, including with business unit leaders, to understand their needs and gain buy-in for security initiatives. As a result, CISOs effectively have to contribute to business strategy discussions and position security as an enabler of business growth, not just a cost centre. Moreover, in-depth industry knowledge is key for CISOs to understand their company's competitive landscape and regulatory environment, to tailor security strategies appropriately. In essence, a CISOs role has increasingly transitioned from having a primarily technical focus to also encompassing a strategic business leadership element. 

While this has been a necessary development overall, it also places an unfair burden on the shoulders of CISOs, that is next to impossible to fulfil, having led to a situation where the average tenure of a CISO at one company is approximately only 1.5 to 4 years at best.

The "Security Silo" effect

Sole risk ownership by CISOs can also create a "security silo", especially if buy-in and strong relationships and mutual understanding can’t be secured across the organisation, and especially with business unit leaders. In this case, cyber security becomes isolated from the rest of the organisation, operating independently rather than as an integrated part of the business and making it next to impossible for CISOs and their teams to integrate security considerations deeply into the wider organisation, rendering security solutions purely technical and less effective overall. 

With other teams viewing security as a roadblock rather than an enabler, this can lead to resistance against security measures or, worse, attempts to bypass them, especially when business unit leaders do not have to face the music if something goes wrong.

Effective cyber security and TPRM demand a company-wide effort

The most compelling argument against sole risk ownership by CISOs is that effective cyber security and TPRM require a company-wide effort. Cyber risks don't exist in isolation and are not purely technical - they intertwine with every aspect of your business operations.

Consider shadow IT, where employees use unauthorised software or services in different teams without communicating this to their security teams. This significant security risk isn't manageable by the CISO alone. Team leaders must take responsibility for their teams' training, risk awareness, and behaviour. They also need to manage their use of external vendors and tools and communicate effectively with TPRM teams to prevent shadow IT from proliferating.

The same is true more generally with instilling a culture of security and best practice across the wider organisation, which occasional security training sessions imposed by security teams on other business units won’t resolve.

The Evolving Role of the CISO

To move away from the model of CISOs as sole risk owners, the CISO role must inevitably evolve. This shift doesn't diminish the importance of CISOs. It still elevates them to a more strategic position within the organisation, but the responsibility for security must be shared with the board and business unit leaders to be effective.

Transitioning from risk owner to facilitator and advisor

CISOs transition from owners of all cyber security risk to facilitators and advisors in this new paradigm. They take on a more collaborative role, working with different departments to help them understand and manage their cyber security risks, and working in tandem with them to identify the right mix between security and business efficiency, while also bringing this in line with wider enterprise business and risk strategies.

As facilitators, CISOs create a culture of security awareness across the organisation. They break down the security silo, ensuring that cyber security considerations weave into the fabric of every business decision.

For example, instead of dictating security policies from the top down, a CISO in this new role works with other teams to understand their needs and helps them develop security practices that protect proprietary and customer data without hindering their ability to engage with clients effectively.

Empowering business units to take ownership of their risks

A vital aspect of this evolving role involves empowering business units to take ownership of their risks. This doesn't mean leaving them to fend for themselves, but rather providing them with the tools, knowledge, and support they need to effectively manage their specific risk landscapes.

The CISO can collaborate with the HR department to develop security training programmes tailored to different company roles. They also collaborate with the procurement team to establish guidelines for assessing the security posture of potential vendors specific to different teams, and ensures that processes for onboarding new vendors are harmonised across the business and that security teams have a direct role in the process.

Since the success of your cyber security and TPRM programmes depends on support from top-level management and directors, and requires buy-in and collaboration from every department, a sensible way forward would be to establish a cross-organisational Cyber Security and TPRM Oversight Committee

Clear inter-departmental communication is crucial to ensure all aspects of the programme are aligned.

Providing expertise and guidance

While CISOs step back from sole risk ownership, their expertise remains as crucial as ever, as is the expert guidance they can provide to help other departments navigate complex cyber security landscapes.

This involves:

  • Offering insights on emerging threats relevant to specific business units
  • Advising on the security implications of new technologies or business practices
  • Helping departments develop their own risk assessment frameworks
  • Providing technical expertise to support security-related decision-making across the organisation

By sharing their knowledge and experience, CISOs elevate the overall security posture of the entire organisation, creating a more resilient and security-aware business environment.

Implementing a Distributed Risk Ownership Model

Now that we understand why CISOs shouldn't be the sole risk owners and how their role evolves, let's zone in on how to implement a distributed risk ownership model. This approach spreads the responsibility for managing cyber security risks across the organisation, creating a more effective risk management framework and culture.

Strategies for identifying stakeholders

The first step in implementing a distributed risk ownership model involves identifying the key stakeholders who should participate in managing cyber security risks as part of a cross-organisational Cyber Security and TPRM Oversight Committee. This extends beyond just the IT department and includes representatives from all business units:

  • Department heads from Finance, HR, Marketing, Operations, etc.
  • Project managers who oversee critical business initiatives
  • Legal and compliance teams
  • Customer-facing teams who handle sensitive data
  • Procurement teams involved in vendor selection
  • Board representatives, as appropriate

Establishing roles and responsibilities

After identifying your stakeholders, clearly define roles and responsibilities within the new risk management framework. This ensures everyone understands their part in maintaining the organisation's security posture.

Key roles include:

  • Risk Owners: Usually department heads or senior managers responsible for identifying and managing risks within their area of the business.
  • Risk Assessors: Team members tasked with evaluating and quantifying identified risks.
  • Control Implementers: Those responsible for putting risk mitigation measures into practice.
  • Risk Monitors: Individuals who track the effectiveness of risk management efforts and report on progress.

Creating a risk governance framework

A solid risk governance framework is essential for the success of a distributed risk ownership model. This framework, which should be developed by the CISO, but in consultation with the other members of the Oversight Committee, should outline:

  • How to identify and assess risks
  • The process for deciding on risk responses
  • How to monitor and report risk management efforts
  • Escalation procedures for significant risks
  • The frequency of risk assessments

Training and education needs

For a distributed risk ownership model to work, everyone involved needs a basic understanding of cyber security principles and risk management practices. This is where the CISO's role as an educator becomes especially crucial.

Implement:

  • Regular cyber security awareness training for all employees
  • Specialised risk management training for those with specific responsibilities in the new framework
  • Workshops or seminars on emerging threats and best practices
  • Resources like internal wikis or knowledge bases for easy access to security information

Addressing resistance to change

Any significant change in organisational structure or processes faces resistance. It's important to anticipate and address this proactively.

Strategies to overcome resistance include:

  • Clearly communicating the reasons for the change and its benefits
  • Involving stakeholders in the planning process to gain buy-in
  • Addressing concerns and fears openly and honestly
  • Celebrating early wins to demonstrate the effectiveness of the new approach
  • Providing support and resources to help people adapt to their new responsibilities

Benefits of Distributed Risk Ownership

Shifting from a CISO-centric risk ownership model to a distributed approach offers numerous benefits. Let's explore how this change positively impacts your organisation's risk management effectiveness and overall business performance.

Improved risk awareness across the organisation

One of the most significant benefits of distributed risk ownership is improving risk awareness and enhanced personal responsibility throughout the organisation for keeping company, staff and client data as well as internal systems safe. When cyber security becomes everyone's responsibility, employees at all levels become more attuned to potential threats and vulnerabilities.

This heightened awareness leads to:

  • Faster identification of potential risks
  • Increased reporting of suspicious activities
  • More proactive approach to security across all departments

More informed decision-making

When risk ownership is distributed, decision-making around security issues becomes more informed and contextual. Instead of being made in isolation by the CISO and their teams, security decisions are now made with input from the people who understand each department's day-to-day operations.

This leads to:

  • Security measures that align better with business needs
  • More practical and implementable security policies
  • Reduced friction between security requirements and business operations

Enhanced overall risk management effectiveness

Distributing risk ownership improves awareness and decision-making and enhances the overall effectiveness of risk management efforts. By involving more people and perspectives in the risk management process, you create a more comprehensive approach to security.

Benefits include:

  • More thorough risk assessments that consider a wider range of factors
  • Faster response times to emerging threats or incidents
  • Better allocation of resources based on a more nuanced understanding of risks
  • Improved resilience through a multi-layered approach to security

For example, a distributed model helps you identify and address risks in your supply chain more effectively, as procurement teams work closely with security experts to vet and monitor vendors.

Fostering a culture of security

One of the most valuable long-term benefits of distributed risk ownership is creating a strong security culture within your organisation. When security becomes everyone's responsibility, it shifts from being seen as a necessary evil to an integral part of business operations.

This cultural shift leads to:

  • Increased employee engagement in security initiatives
  • More innovative approaches to solving security challenges
  • Better retention of security-conscious employees
  • A competitive advantage in industries where security is a key concern

Conclusion: Embracing Shared Responsibility for Better Risk Management

As we've explored throughout this article, the traditional model of CISOs as sole owners of cyber security risks fails to meet the needs of today's complex digital threat landscape. The shift towards a distributed risk ownership model offers a more effective and resilient approach to managing cyber security threats facing organisations.

In this new paradigm, the CISO's role becomes more strategic, evolving from being the sole guardians of security to becoming facilitators, advisors, and educators, helping to elevate the security capabilities of the entire organisation.

As cyber threats evolve and become more complex, organisations embracing this shared responsibility model will protect themselves, their customers, and their assets more effectively. 

The next step? If you're a CISO, initiate conversations with other department heads about how they can take a more active role in managing cyber security risks. If you're in another leadership role, reach out to your CISO about how you can become more involved in protecting your organisation.

The future of effective cyber security lies in shared responsibility. Take the first step today.

Explainers & Guides

Download for free

By submitting this form, you agree to Risk Ledger’s Terms of Service, Privacy Policy, and Risk Ledger contacting you.

Thank you!
Download
Oops! Something went wrong while submitting the form.
Explainers & Guides

Download for free

Download
Pattern Trapezoid Mesh

Join our growing community

Sign up to our monthly newsletter to receive exclusive research and analyses by our experts, the latest case studies from our clients as well as guides, explainers and more to turn your supply chain risk management programme into a resounding success story.