Leadership Solutions

CISO Softskills

CISO Softskills


As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives presents tools that empower security practitioners to identify the intangible negative influencers of security that plague most organizations, and provides techniques to identify, minimize, and overcome these pitfalls.

The book begins by explaining how using the wrong criteria to measure security can result in a claim of adequate security when objective assessment demonstrates this not to be the case. The authors instead recommend that organizations measure the success of their efforts using a practical approach that illustrates both the tangible and intangible requirements needed by a healthy security effort. The middle section discusses the root causes that negatively influence both a CISO and an organization’s ability to truly secure itself. These root causes include:

  • Employee apathy
  • Employee myopia or tunnel vision
  • Employee primacy, often exhibited as office politics
  • The infancy of the information security discipline
These chapters explain what a CISO can do about these security constraints, providing numerous practical and actionable exercises, tools, and techniques to identify, limit, and compensate for the influence of security constraints in any type of organization.

The final chapters discuss some proactive techniques that CISOs can utilize to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume provides practical ideas that can make a difference in the daily lives of security practitioners.

Table of Contents:
Chapter 1: What’s Not Right
Chapter 2: True Security Model
Chapter 3: Apathy
Chapter 4: Myopia
Chapter 5: Primacy
Chapter 6: Infancy
Chapter 7: Tying It All Together
Chapter 8: Closing Thoughts
Appendices Includes Exercises and R.E.A.P Templates

** Note: This resource is available at no cost or at a discount to the Council community and strategic alliance partners based upon their level of involvement. Please contact Rob West if you need assistance.

Add to Cart:

  • Model: TF002-CISO09
  • Manufactured by: Taylor & Francis, LLC

Please Choose:

Media Type

Copyright © 2020 The Security Executive Council.
The Security Executive Council