Blog

RSA 2022: You're the New CISO. Want to Fix the Problem? Start by Simply Listening!

Joe Ariganello
June 8, 2022
Table of contents
<h3>The new security boss needs to listen if they hope to win over a myriad of new constituencies in their first 90 days</h3> <p>You just took over as the CISO, ready to dig in and make the most of this fantastic opportunity. With so much needing to be fixed, where do you start first?</p> <p>This topic received attention during the RSA 2022 security conference this week at a session that featured CISOs from Reddit, Amplitude and Robinhood. The CISOs recounted their <a href="https://www.rsaconference.com/USA/agenda/session/First%2090%20Days%20In%20the%20CISO%20Chair%20A%20Practitioners%20Perspective" target="_blank">first three months on the job</a>, sharing the particular challenges they faced while building out their organizations’ strategies, policies and procedures.</p> <p>Any new CISO will need access to the best and most actionable intelligence possible about the shifting threats to their organizations. They’re walking into new situations where they’ll immediately be under the gun to translate all the data that they’re keeping tabs on into real business impact.</p> <p>All the while, they’ll be expected to report to their bosses in the C-suite both on the organization’s risks and security exposure as well as what they’re doing to stay ahead of the bad guys. Clearly, enterprises are going to need an updated approach to put them in a stronger position when it comes to threat detection and response.</p> <p>That doesn’t happen nearly enough, according to panelist Olivia Rose, the CISO of Amplitude. She noted that many new CISOs don’t listen carefully enough when they take over and risk ostracizing the people actually doing the work. Instead, she said the CISO’s first 30 days should be akin to a listening tour.</p> <p>The immediate goal is to build allies for any rethink of the organization's security posture. The longer-term goal is to implement the necessary tools and processes that will make it easier for the enterprise to stay on top of security threats.</p> <p>For example, one of the first things that another panelist, Caleb Sima, the CISO of Robinhood, did when he took over was to conduct an internal survey to measure the relationship between security and the rest of the organization. That was the jumping-off point for follow-up conversations with other departments about what they needed and how to improve the security relationship. After consulting with the engineering leadership and other stakeholders, he then built out planning decks with progress goals for his first year in preparation for a presentation of his findings to the executive team.</p> <p>It’s worth noting that this degree of sharing doesn’t need to be limited to the walls of an organization. Building on the advice outlined by Sima, new methods and tools are emerging to enable sharing within intelligence communities and among organizations that historically would have avoided sharing information for fear of spilling trade secrets. The Anomali platform, for example, makes <a href="https://www.anomali.com/threat-intel-sharing">threat intelligence sharing</a> possible between ISACs, ISAOs, industry groups and other communities looking to share intelligence in a secure and trusted way.</p> <h2>Winning Over the Board</h2> <p>Perhaps no relationship – particularly during those first 90 days – is as critical as the one between the new CISO and the company’s board of directors.</p> <p>In the past, truth be told, the relationship left much to be desired. But in more recent years, more boards have recognized the strategic value of security and the monetary and reputational risks of data breaches. For new CISOs, it’s more important to articulate the nature of the gathering threats, real and potential, and the company’s defense capabilities – in plain English. That means keeping insights and implications very clear, with an emphasis on impact.</p> <p>Going even further, the CISO at some point early in their tenure will need to report progress to the board and demonstrate the positive impact they’re having on the business. This is the hard part.</p> <p>This also underscores the urgency of moving beyond reactive threat detection to proactive adversary detection. A CISO can’t afford to miss any looming threats. As they build out the organization’s strategies, policies, and procedures, they have to move fast without breaking anything, all the while maintaining visibility into the threat landscape. This requires transforming threat analysis and investigations into effective defenses–an approach that incorporates established industry frameworks, such as <a href="{page_5775}">the MITRE ATT&amp;CK framework</a>. This can help break down the complexity of an attack and inject relevant threat intelligence for quick analysis that can inform an effective defense against adversaries.</p> <h2>The Bottom Line</h2> <p>A CISO’s job is obviously very hard, and each environment is going to be different. It’s important for you to set the tone early and outline the strategies that will ensure success for your organization. That will make it easier to evolve beyond reactive incident response to improve the organization’s security posture before any attack.</p> <ul> <li>During your conversations, it’s key to find out:</li> <li>What tools are in place currently? And which are working?</li> <li>Why are things done the way they are?</li> <li>What is the problem(s) they are trying to solve with each process?</li> <li>How can I improve processes and make my analysts job easier?</li> </ul> <p>The C-suite is going to want to know whether you can align data with the profile of a potential victim <em>before</em> an attack unfolds to determine what an attacker is likely planning to do. The answer to that question hinges on your degree of visibility into attacker behavior, intent, and motivation, extending to organizational and technology targets.</p> <p>This is where having a partner like Anomali can help smooth that process with a security platform that streamlines all of the enterprise’s security intelligence without needing to rip and replace anything. Instead, it will bolster what’s already in place. And that’s also going to demonstrate ROI and make the task of any CISO that much easier to manage.</p> <h3>For additional information, check out the following resources:</h3> <ul> <li><a href="{page_5906}">Webinar: The Power of Cyber Threat Intelligence Together with MITRE ATT&amp;CK</a></li> <li><a href="{page_5237}">White Paper: SANS Measuring and Improving Cyber Defense Using the MITRE ATT&amp;CK Framework</a></li> <li><a href="{page_6034}">Blog Post: The Need to Use MITRE ATT&amp;CK and Other Frameworks for Cyber Defense</a></li> </ul>
Joe Ariganello

Joe Ariganello is the former VP of Product Marketing at Anomali.

Propel your mission with amplified visibility, analytics, and AI.

Learn how Anomali can help you cost-effectively improve your security posture.

June 8, 2022
-
Joe Ariganello
,

RSA 2022: You're the New CISO. Want to Fix the Problem? Start by Simply Listening!

<h3>The new security boss needs to listen if they hope to win over a myriad of new constituencies in their first 90 days</h3> <p>You just took over as the CISO, ready to dig in and make the most of this fantastic opportunity. With so much needing to be fixed, where do you start first?</p> <p>This topic received attention during the RSA 2022 security conference this week at a session that featured CISOs from Reddit, Amplitude and Robinhood. The CISOs recounted their <a href="https://www.rsaconference.com/USA/agenda/session/First%2090%20Days%20In%20the%20CISO%20Chair%20A%20Practitioners%20Perspective" target="_blank">first three months on the job</a>, sharing the particular challenges they faced while building out their organizations’ strategies, policies and procedures.</p> <p>Any new CISO will need access to the best and most actionable intelligence possible about the shifting threats to their organizations. They’re walking into new situations where they’ll immediately be under the gun to translate all the data that they’re keeping tabs on into real business impact.</p> <p>All the while, they’ll be expected to report to their bosses in the C-suite both on the organization’s risks and security exposure as well as what they’re doing to stay ahead of the bad guys. Clearly, enterprises are going to need an updated approach to put them in a stronger position when it comes to threat detection and response.</p> <p>That doesn’t happen nearly enough, according to panelist Olivia Rose, the CISO of Amplitude. She noted that many new CISOs don’t listen carefully enough when they take over and risk ostracizing the people actually doing the work. Instead, she said the CISO’s first 30 days should be akin to a listening tour.</p> <p>The immediate goal is to build allies for any rethink of the organization's security posture. The longer-term goal is to implement the necessary tools and processes that will make it easier for the enterprise to stay on top of security threats.</p> <p>For example, one of the first things that another panelist, Caleb Sima, the CISO of Robinhood, did when he took over was to conduct an internal survey to measure the relationship between security and the rest of the organization. That was the jumping-off point for follow-up conversations with other departments about what they needed and how to improve the security relationship. After consulting with the engineering leadership and other stakeholders, he then built out planning decks with progress goals for his first year in preparation for a presentation of his findings to the executive team.</p> <p>It’s worth noting that this degree of sharing doesn’t need to be limited to the walls of an organization. Building on the advice outlined by Sima, new methods and tools are emerging to enable sharing within intelligence communities and among organizations that historically would have avoided sharing information for fear of spilling trade secrets. The Anomali platform, for example, makes <a href="https://www.anomali.com/threat-intel-sharing">threat intelligence sharing</a> possible between ISACs, ISAOs, industry groups and other communities looking to share intelligence in a secure and trusted way.</p> <h2>Winning Over the Board</h2> <p>Perhaps no relationship – particularly during those first 90 days – is as critical as the one between the new CISO and the company’s board of directors.</p> <p>In the past, truth be told, the relationship left much to be desired. But in more recent years, more boards have recognized the strategic value of security and the monetary and reputational risks of data breaches. For new CISOs, it’s more important to articulate the nature of the gathering threats, real and potential, and the company’s defense capabilities – in plain English. That means keeping insights and implications very clear, with an emphasis on impact.</p> <p>Going even further, the CISO at some point early in their tenure will need to report progress to the board and demonstrate the positive impact they’re having on the business. This is the hard part.</p> <p>This also underscores the urgency of moving beyond reactive threat detection to proactive adversary detection. A CISO can’t afford to miss any looming threats. As they build out the organization’s strategies, policies, and procedures, they have to move fast without breaking anything, all the while maintaining visibility into the threat landscape. This requires transforming threat analysis and investigations into effective defenses–an approach that incorporates established industry frameworks, such as <a href="{page_5775}">the MITRE ATT&amp;CK framework</a>. This can help break down the complexity of an attack and inject relevant threat intelligence for quick analysis that can inform an effective defense against adversaries.</p> <h2>The Bottom Line</h2> <p>A CISO’s job is obviously very hard, and each environment is going to be different. It’s important for you to set the tone early and outline the strategies that will ensure success for your organization. That will make it easier to evolve beyond reactive incident response to improve the organization’s security posture before any attack.</p> <ul> <li>During your conversations, it’s key to find out:</li> <li>What tools are in place currently? And which are working?</li> <li>Why are things done the way they are?</li> <li>What is the problem(s) they are trying to solve with each process?</li> <li>How can I improve processes and make my analysts job easier?</li> </ul> <p>The C-suite is going to want to know whether you can align data with the profile of a potential victim <em>before</em> an attack unfolds to determine what an attacker is likely planning to do. The answer to that question hinges on your degree of visibility into attacker behavior, intent, and motivation, extending to organizational and technology targets.</p> <p>This is where having a partner like Anomali can help smooth that process with a security platform that streamlines all of the enterprise’s security intelligence without needing to rip and replace anything. Instead, it will bolster what’s already in place. And that’s also going to demonstrate ROI and make the task of any CISO that much easier to manage.</p> <h3>For additional information, check out the following resources:</h3> <ul> <li><a href="{page_5906}">Webinar: The Power of Cyber Threat Intelligence Together with MITRE ATT&amp;CK</a></li> <li><a href="{page_5237}">White Paper: SANS Measuring and Improving Cyber Defense Using the MITRE ATT&amp;CK Framework</a></li> <li><a href="{page_6034}">Blog Post: The Need to Use MITRE ATT&amp;CK and Other Frameworks for Cyber Defense</a></li> </ul>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.