%0 Report %A Allen, Julia H %A Crabb, Gregory %A Curtis, Pamela D %A Fitzpatrick, Brendan %A Mehravari, Nader %A Tober, David %D 2015 %T Structuring the Chief Information Security Officer Organization %U https://kilthub.cmu.edu/articles/report/Structuring_the_Chief_Information_Security_Officer_Organization/6584423 %R 10.1184/R1/6584423.v1 %2 https://resources.sei.cmu.edu/asset_files/TechnicalNote/2015_004_001_446198.pdf %K Cyber Risk and Resilience Management %X

Chief Information Security Officers (CISOs) are increasingly finding that the tried-and-true, traditional information security strategies and functions are no longer adequate when dealing with today’s increasingly expanding and dynamic cyber risk environment. Many opinions and publications express a wide range of functions that a CISO organization should be responsible for governing, managing, and performing. How does a CISO make sense of these functions and select the ones that are most applicable for their business mission, vision, and objectives?

This report describes how the authors defined a CISO team structure and functions for a large, diverse U.S. national organization using input from CISOs, policies, frameworks, maturity models, standards, codes of practice, and lessons learned from major cybersecurity incidents.

%I Carnegie Mellon University