Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk
Posted: Friday, Jan 31

i 3 Table of Contents

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

In todayโ€™s digital age, CISOs face increasing pressure to protect their organisations from a barrage of cyber threats. In fact, the latest statistics from the Office of the Australian Information Commissioner (OAIC) show the number of data breaches notified to the regulator in the first half of 2024 was at its highest in three and a half years.ย ย 

Yet, despite these mounting challenges, many CISOs remain fixated on vulnerabilities โ€“ compiling long lists of flaws that need fixing, often without communicating their relevance or potential business impact effectively. This approach leads to frustration and a devaluation of the security team’s worth in the eyes of business leaders, who fund security more out of a vague sense of moral obligation than financial necessity.ย ย 

To earn trust and secure critical funding, CISOs must shift their focus from technical issues to understanding securityโ€™s role as it impacts business risk.ย 

The disconnect between CISOs and business needsย 

Vulnerabilities, on their own, arenโ€™t inherently a risk; they become a risk when they can disrupt operations or compromise sensitive data. Without connecting vulnerabilities to real business impact, the message falls flat.ย 

For CISOs, the key is aligning security priorities with business goals. Business leaders care about one thing: ensuring the organisation’s ability to operate and generate revenue. Vulnerabilities only matter if they threaten that ability. CISOs should communicate how potential security failures could result in revenue loss, reputational damage, or regulatory fines. If CISOs donโ€™t frame risks in terms of business loss, they risk becoming irrelevant.ย 

By framing discussions in terms of business risk and financial impact, CISOs can secure investment in security measures such as personnel, technology, or cyber insurance.ย ย 

These skills are key. CISOs often operate with limited resources. To maximise security investments, they must focus on protecting the most critical business assets rather than attempting to secure everything. The goal is to safeguard the organisationโ€™s โ€œcrown jewelsโ€โ€”those systems and data that are vital to business operations.ย 

Learning from other industries: The value of measurementย 

In effect, the business of security is a measurement game. It is in this that it falls down.ย 

While the industry is maturing and catching up, cybersecurity lags behind other industries like finance and healthcare in risk measurement โ€“ and it remains relatively insular. These fields regularly make high-stakes decisions based on incomplete information, guided by data and probability. CISOs should adopt similar methodologies, moving beyond simple vulnerability counts and embracing metrics that quantify risk in terms of financial loss or operational disruption. This shift from vulnerability management to risk-based security ensures that security investments are both capitally and operationally efficient.ย 

At its core, cybersecurity is about protecting the business, not just the technology. CISOs must build security programs that are measurable, aligned with business objectives and communicated in terms the board understands. This means quantifying risks in dollars and probabilities, not vague terms like โ€œhighโ€ or โ€œmediumโ€ risk.ย 

CISOs who can present risk in financial terms gain the trust of the C-suite and are better positioned to secure resources. This shift in approach is essential as businesses continue to evolve through digital transformation and AI.ย 

Thatโ€™s why Qualys recently launched the Risk Operations Centre (ROC). Because a unified platform that consolidates risk factors, normalizes that data across the enterprise, applies business-driven prioritization, and orchestrates automated risk remediation is essential to shifting from the reactive firefighting of yesteryear to proactive risk management.ย 

Collaborating with business leaders: the key to trustย 

The challenge of defining risk has often been seen as too hard. Part of the challenge is that often CISOs try to go it alone. Rather, they need to collaborate closely with other business leaders โ€“ CFOs, Chief Privacy Officers and General Counsels to align security with business goals. Through cross-functional collaboration, CISOs can better understand business priorities and quantify the potential impact of security risks.ย 

Take the example of a cloud-native company undergoing rapid digital transformation. It was only by engaging with stakeholders across various departments that it became clear that the company was managing over two billion records of personally identifiable information (PII) in its cloud environment โ€“ data that could trigger significant regulatory penalties if compromised โ€“ and that the insurance limit was nowhere near adequate. This wasnโ€™t just about technical knowledgeโ€”it was about understanding business risk and speaking the right language.ย ย 

Conclusion: Elevating the role of the CISOย 

The role of the CISO has evolved. To remain relevant, CISOs must transition from vulnerability managers to business enablers. This requires close collaboration with other business leaders and a strong understanding of the businessโ€™s objectives. By speaking the language of risk and aligning security with business priorities, CISOs can ensure their organisations thrive in an increasingly complex threat landscape.ย 

Security teams can no longer afford to be isolated from the business. As companies continue to innovate, the CISOโ€™s role in protecting what matters mostโ€”business operations and value generationโ€”has never been more critical.ย 

Richard Seiersen
I'm focused on cybersecurity risk management โ€“ as a modern enterprise practice and leadership skill. My books, speaking, and work support security leaders who need to align security practice with business goals. That alignment is at the heart of cybersecurity risk management. As the Chief Risk Technology Officer at Qualys I help customers and the broader security community measure, communicate, and eliminate risk. With over 10 years of experience as a CISO, I have led and supported security strategy, operations, and governance across various industries and orgs, including Twilio, GE, and LendingClub. I am also a published author and a faculty member at IANS, where I share my insights and knowledge on security metrics and risk management. My books, "How To Measure Anything In Cybersecurity Risk" and "The Metrics Manifesto: Confronting Security With Data", provide practical and innovative approaches to quantifying and reducing security risk.
Share This