CISOs Add Value to the Business By Doing This

Chicago cybersecurity leaders
Share this post

If cutting costs is a business imperative, it’s a mystery why CISOs get any budget at all. Yes, the CISO role has long been synonymous with cost. Some might even say CISOs and cybersecurity budgets are necessary evils. So, if an organization’s cybersecurity investments don’t provide a return on investment, how does a CISO demonstrate value? If a CISO does the bare minimum, the organization and its crown jewels stay safe. If, however, a CISO takes a holistic approach to the role, she’ll strive to protect the organization without slowing employees down. She’ll also know there is inherent value in a strong cybersecurity program because customers want to do business with secure organizations. While these investments may not drive revenue growth, they positively impact the bottom line and that makes shareholders happy.

I recently moderated a panel in Chicago and asked CISOs about their perspectives on the CISO role, including challenges and opportunities. In this video, Alan shares his insightful perspective on how a CISO adds strategic value when they absorb, rather than generate, revenues.

CISO Perspectives is a complimentary resource for cybersecurity professionals featuring insightful viewpoints, best practices, and sage career advice from a cross section of CISOs. These videos and blogs are proudly offered by Accellion, the leader in secure email and secure file sharing for mitigating third party cyber risk.


Share this post

Keep Reading about CISO Perspectives

Alan Levine, CISO for Alcoa (retired)

Want to Be a CISO? Know This First.

by Joel York
Share this postFrom the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots of responsibility, however,...
Jay Gonzales, CISO, Samsung Semiconductor

CISOs: Focus On These Fundamentals For Long-Term Success

by Laureen Smith
Share this postCISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or share sensitive information...