In the world of cybersecurity, not all chief information security officers (CISOs) are the same. Each CISO possesses their own unique areas of expertise and interests, which can greatly impact how they respond to requests or ideas. It is crucial for individuals seeking to communicate with their company’s CISO to understand which type of CISO they are dealing with in order to effectively convey their message.
Traditionally, CISOs tended to have backgrounds in information technology (IT) when cybersecurity was primarily seen as a technology issue. However, as businesses continue to digitize and the legal and business implications of security breaches become more significant, the role of the CISO has evolved. Now, CISOs must consider the effects of security decisions, purchases, and breaches on the entire organization.
There are three major types of CISOs that individuals may encounter when trying to communicate with them. The first type is the Business CISO, who is focused on the overall impact of security on the business. These CISOs prioritize factors such as revenue, cost savings, reputation, and efficiency. They are more likely to collaborate with other C-suite members and seek their input when considering requests.
To effectively communicate with a Business CISO, it is essential to align the proposed project with business objectives. Presenting the project as a business enabler that can enhance efficiency, profitability, and security may be more persuasive. It is also important to gain support from other C-suite executives and managers in different functions within the organization, such as finance, marketing, and human resources.
The second type of CISO is the Compliance CISO, who places a strong emphasis on legal matters and compliance with laws, regulations, requirements, and standards. When approaching a Compliance CISO, it is advisable to consult with legal, audit, and risk management teams beforehand. This type of CISO may inquire about the project’s impact on compliance, data privacy, and adherence to relevant laws and regulations in different countries.
The third type of CISO is the Technical CISO, who has a background in technology and possesses in-depth knowledge of the company’s security infrastructure and architectures. This type of CISO may be more challenging to address, particularly for individuals who are not technologically inclined. They will be interested in understanding the technical details and implications of the proposed project, including requirements, needed resources, and maintenance costs.
Regardless of the type of CISO, all CISOs prioritize improving cybersecurity. Therefore, it is crucial to highlight how the proposed project contributes to enhancing cybersecurity measures. For example, if proposing threat intelligence, all CISOs will want to know how it works, its effectiveness, associated costs, and potential benefits.
Considering that CISOs are often occupied with various responsibilities, securing a meeting with them may be challenging. During the waiting period, individuals can make productive use of their time by preparing a list of anticipated questions that the CISO may ask. It is also valuable to identify key individuals that the CISO is likely to consult with before making a decision and engage with them to gain their support. According to the website Rebels at Work, achieving agreement from only 10% of the rest of the enterprise is necessary to initiate change within a company.
In conclusion, understanding the different types of CISOs and adapting communication strategies accordingly is essential for effectively conveying ideas or requests related to cybersecurity. By speaking their language and aligning proposals with their priorities, individuals can increase their chances of success in engaging with CISOs and promoting cybersecurity initiatives within their organizations.

