Rise of the CISO
Chief information security officers have more influence -- and greater challenges -- than ever before.
Computerworld - As the chief information security officer at General Motors Corp., Eric Litt is in charge of integrating security into every aspect of the company's vast $186 billion business.
It's a job that has given him a spot at the executive table, support from the board level down and a chance to implement far-reaching decisions related to information security at the company.
"I get plenty of attention, which is a very good thing," Litt says. When it comes to security at the automaker, "resources are not an issue," he says.
Litt is one among a small but growing number of executives who say that heightened concerns are driving a gradual evolution of the security function and investing it with more influence than ever before.
"Security folks have often been viewed as a necessary evil who always get in the way of your doing business," says Howard Schmidt, CISO at eBay Inc. in San Jose and former White House cybersecurity adviser. But regulatory compliance issues and the increasing losses related to worms, viruses and other hacker attacks are making security a part of the core business process, he says.
Kim Milford agrees. "Security is now viewed as a critical requirement in the purchase, design, development and deployment of applications and services," says Milford, information security manager at the University of Wisconsin-Madison. "There seems to be a shift from the emphasis on predominantly technical controls to risk assessment, policies and user education," she adds.
Eric Litt, chief information security officer at General Motors Corp.
Image Credit: Michelle Andonian
The group then architects a detailed security implementation requirement for each of the business units based on its specific risk profile. Each of the business units is responsible for implementing the needed technology and process measures and is periodically audited for compliance against its requirements. A color-coded security dashboard for senior management at GM rates the performance of each business unit, with green representing full compliance, yellow showing partial progress and red indicating a total lack of compliance.
It's an evolving holistic approach to security that includes "the people, the organization, governance, process and, lastly, technology," Litt says.
Strategy, Not Tactics
A similar focus on high-level concerns such as regulatory compliance, digital rights management, intellectual property protection and
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- 10 Things Your Next Firewall Must do Next-Generation Firewalls Defined
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts