Governance & Risk Management , IT Risk Management

CISO Job Mandate: Be a 'Jack or Jill' of All Trades

Chief Information Security Officers Must Marshal Experts, Says Paul Swarbrick
CISO Paul Swarbrick

As the people, process and technology challenges associated with keeping organizations secure continue to grow more complex, there's no way that a CISO can expect to be a master of every domain, says CISO Paul Swarbrick. Instead, it's up to CISOs to bring experts to bear on the strategic challenges they face.

See Also: From Data to Decisions: Maximizing Operational Efficiency Through IT-OT Integration

"So what you really end up being an expert in is people, and management and risk, because those are the things that you're actually juggling as a security practitioner in the 21st century," he says.

In a video interview at Information Security Media Group's recent Security Summit: London, Swarbrick discusses:

  • The mandate for CISOs to be a "Jack or Jill" of all trades;
  • The increasingly holistic nature of security, requiring people, management and risk management expertise;
  • The need to focus on protecting the business.

Swarbrick is a CISO, privacy and digital risk expert with more than 30 years of experience. He's served as CISO of such organizations as Boundless, Liverpool Victoria, Boolean Associates, Getronics, the U.K.'s National Air Traffic Services and Griffin Marine Travel.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.