NEW: Unlock the Future of Finance with CRYPTO ENDEVR - Explore, Invest, and Prosper in Crypto!
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
No Result
View All Result

CISOs are taking on ever more responsibilities and functional roles – has it gone too far?

CISOs are taking on ever more responsibilities and functional roles – has it gone too far?
Share on FacebookShare on Twitter

Rewrite the

Others speak to this point, too, saying that how, when and where the CISO role adds extra duties is dependent on the factors facing an organization.

“The CISO’s evolving role and responsibilities seem to vary based on the size, industry, and culture of an organization, and where they are in the ‘maturity arc’ of their core responsibilities,” says Ryan Hammer, adjunct professor with Carnegie Mellon University’s CISO Executive Education as well as vice president and CISO at software and systems company Ciena.

He adds, “Once they have built a team and strong operating culture, defined strategic objectives and success measurements, and consistently demonstrated execution, many CISOs (or their executive leadership teams) identify adjacent areas that could benefit from a similar approach.”

When to accept role creep – and when to say no

But the consensus among security leaders who have experienced that kind of slow expansion of duties or “role creep” is that CISOs and their executive colleagues must be mindful of when it will work and when it won’t.

John Paul (JP) Cunningham, CISO of software company Silverfort, says the position in general has grown over the past few decades from a technical job into an enterprise risk executive role. And while he says many CISOs are well prepared to take on more responsibility, he believes some functions should not fall to the position.

For example, he says the data protection officer “should be a standalone officer,” explaining that the CISO and CDO roles deserve someone who has experience in both areas. “I wouldn’t say no one can do the job, but the pool of people who can is very small,” he says. “And for those who aren’t qualified, you are setting them up to fail or to burn out.”

Cunningham says he once was asked if the chief data officer role should fall to him as CISO. “I made a pretty impassioned defense that it shouldn’t be me,” he says. On the other hand, Cunningham has taken on a security evangelism role, working with external stakeholders and industry peers.

Carl Froggett, who is both CIO and CISO at tech company Deep Instinct, shares similar insights.

He sees the trend of consolidating some functions under the CISO as positive in the way it helps ensure risk and security are consistent throughout the organization. But, like others, Froggett says what and how much extra should go to the CISO depends on the individual’s experiences and skills as well as the organization’s needs in the moment.

Hiring becomes more difficult when the role is too broad

Furthermore, he cautions that expanding the role too much will make hiring harder, noting that already “there aren’t enough qualified people with the experience needed to do the CISO job.”

He also believes there are some tasks the CISO should not take on. “There are some roles CISO shouldn’t do — like audit. Audit should have its independence to question your decision as a CISO,” he says as an example.

Still, Froggett, Cunningham, and others expect the CISO job will continue to expand in scope and require a broader set of skills, experience, and expertise from those filling the roles.

“Organizations are seeing the value in the level of diligence, transparency, and consistency CISOs are bringing to their security programs these days. CISOs are also making connections between their responsibilities and adjacent areas of risk that have the potential to impact the companies they serve, such as supply chain, continuity of operations, and product security,” Hammer says.

“This is pushing us to get more involved and bring perspective and experience to manage risk in these areas. I think it is a positive development in the evolution of the role. Where it makes sense, it can help a CISO inculcate risk-minded decision-making and practices into other areas of the business.”

in well organized HTML format with all tags properly closed. Create appropriate headings and subheadings to organize the content. Ensure the rewritten content is approximately 1500 words. Do not include the title and images. please do not add any introductory text in start and any Note in the end explaining about what you have done or how you done it .i am directly publishing the output as article so please only give me rewritten content. At the end of the content, include a “Conclusion” section and a well-formatted “FAQs” section.

cryptoendevr

cryptoendevr

Related Stories

“Ransomware, was ist das?”

“Ransomware, was ist das?”

July 10, 2025
0

Rewrite the width="5175" height="2910" sizes="(max-width: 5175px) 100vw, 5175px">Gefahr nicht erkannt, Gefahr nicht gebannt.Leremy – shutterstock.com KI-Anbieter Cohesity hat 1.000 Mitarbeitende...

BTR: AI, Compliance, and the Future of Mainframe Modernization

BTR: AI, Compliance, and the Future of Mainframe Modernization

July 10, 2025
0

Rewrite the As artificial intelligence (AI) reshapes the enterprise technology landscape, industry leaders are rethinking modernization strategies to balance agility,...

Warning to ServiceNow admins: Fix your access control lists now

Warning to ServiceNow admins: Fix your access control lists now

July 9, 2025
0

Rewrite the “This vulnerability was relatively simple to exploit, and required only minimal table access, such as a weak user...

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

July 9, 2025
0

Rewrite the Palantir Technologies Inc., a leading provider of enterprise operating systems, and Tomorrow.io, a leading weather intelligence and resilience...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

December 3, 2025
ETH briefly touches K but traders remain skeptical: Here’s why

ETH briefly touches $3K but traders remain skeptical: Here’s why

December 3, 2025
Ether Treasury Stocks Lead Crypto Recovery Gains

Ether Treasury Stocks Lead Crypto Recovery Gains

December 3, 2025
Haven – Blockchain With Biometric Authentication

Haven – Blockchain With Biometric Authentication

December 3, 2025
Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

December 2, 2025

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

CRYPTO ENDEVR

About Us

Crypto Endevr aims to simplify the vast world of cryptocurrencies and blockchain technology for our readers by curating the most relevant and insightful articles from around the web. Whether you’re a seasoned investor or new to the crypto scene, our mission is to deliver a streamlined feed of news and analysis that keeps you informed and ahead of the curve.

Links

Home
Privacy Policy
Terms and Services

Resources

Glossary

Other

About Us
Contact Us

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

© Copyright 2024. All Right Reserved By Crypto Endevr.

No Result
View All Result
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms

Copyright © 2024. All Right Reserved By Crypto Endevr