01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

As well as adding to the CISO’s job description, the rise of cyber crime has also put the role under<br />

increasing scrutiny. It’s easy to see why, as research shows that most CISOs and the entire C-Suite<br />

believe the CISO is ultimately responsible for responding to a data breach on behalf of the organization.<br />

With numerous day-to-day responsibilities, many organizations have decided to add another role into the<br />

mix to give the CISO a helping hand. This is where the Chief <strong>Cyber</strong>crime Officer (CCO) comes in.<br />

Say hello to the CCO<br />

The CCO’s role involves ensuring the organization is cyber-ready. They bear the responsibility of<br />

mitigating breaches, taking the lead if a breach does occur and providing the necessary link between the<br />

Board and the rest of the company to reduce risk and work cohesively to resolve problems<br />

instantaneously. This role should ease the load on the CISO and ensure the organization can get one<br />

step ahead of hackers in the cyber crime race. However, organizations must take into account the need<br />

for both the CISO and CCO to work in tandem, which involves ensuring each role is clearly defined and<br />

has full support from the Board.<br />

CISO and CCO working together<br />

The CISO and CCO share a common goal of keeping the company’s data safe from cyber threats. Yet,<br />

the definition of what each role entails might be different for each organization. While the CCO will be<br />

focused on the system architecture, the CISO will be focused on the security of the information within the<br />

organization. With this defined, there should be no reason that both roles can’t work collaboratively<br />

towards keeping the organization and its data safe.<br />

With both roles working in harmony, the next step that organizations need to take is ensuring the CISO<br />

and the CCO have enough influence with the Board to make critical decisions and resolve issues<br />

immediately. To do this, the Board should have full visibility of the entire cyber security strategy, which<br />

should be regularly reviewed and updated in line with new threats and intelligence. From this, the CCO<br />

and CISO can be given the responsibility to report and respond to incidents and make rapid decisions on<br />

behalf of the business. This is essential as, in the event of a data breach, removing unnecessary<br />

authorization steps ensures that the organization can respond quickly and put remediating measures in<br />

place to minimize potentially catastrophic repercussions.<br />

<strong>Cyber</strong> security threats are increasing day by day and these threats can’t be ignored. Organizations must<br />

consider what the most effective structure is that will enable decisions to be made quickly and that will<br />

leave space for both the CISO and CCO to work in tandem.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!