Chief Information Security Officer


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
The Chief Information Security Officer's role is to provide vision and leadership for developing and supporting security initiatives. The Chief Information Security Officer directs the planning and implementation of enterprise IT system, business operation, and facility defenses against security breaches and vulnerability issues. This individual is also responsible for auditing existing systems, while directing the administration of security policies, activities, and standards.

6 Comments

  • Missing comment
    Michael Leachman | 12-16-2009

    Any information available for Chief Information Officer?

    • 9eb6a2810126f534ebf65557616f34d1 comment
      Info-Tech Research Group | 10-21-2011

      Yes. There is a Chief Information Officer job description here:
      http://www.infotech.com/research/chief-information-officer

  • Missing comment
    Curtis Simonson | 04-25-2014

    Is it possible to update this to more modern terms e.g. Chief Information Security Officer, or Information Security Officer.
    Thanks

    • 35cf646e37f9d3618eeca1a4ac6f70be comment
      Info-Tech Research Group | 05-08-2014

      A request has been submitted to update the “Chief Security Officer” job description on the website. In the meantime, Info-Tech members are welcome to download and modify the job description to suit their own purposes.

  • Missing comment
    Florent Secula | 01-27-2017

    Has this been updated ?

    • 432c05244a845caaca3b276adb15a11e comment
      Info-Tech Research Group | 01-30-2017

      Thank you for your question. This job description has not been updated recently. It can still be used as a template that you can customize for your organization. If you are looking for more information on the role of a CISO, we do have a blueprint, Hire or Develop a World-Class CISO, that can help you determine the specific competencies your organization requires for a CISO.

Related Content

GET HELP Contact Us
×
VL Methodology