"Cyber security is a dark art": The CISO as Soothsayer

被引:4
|
作者
Da Silva J. [1 ]
Jensen R.B. [1 ]
机构
[1] Royal Holloway University of London, Egham Hil, Egham
关键词
CISO; cyber security; identity; ontological security; organisations;
D O I
10.1145/3555090
中图分类号
学科分类号
摘要
Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises, making their cyber-security function critically important. Many organisations employ a Chief Information Security Officer (CISO) to lead such a function. We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders, between October 2019 and July 2020, as part of a wider exploration into the purpose of CISOs and cyber-security functions. In this paper, we employ broader security scholarship related to ontological security and sociological notions of identity work to provide an interpretative analysis of the CISO role in organisations. Research findings reveal that cyber security is an expert system that positions the CISO as an interpreter of something that is mystical, unknown and fearful to the uninitiated. They show how the fearful nature of cyber security contributes to it being considered an ontological threat by the organisation, while responding to that threat contributes to the organisation's overall identity. We further show how cyber security is analogous to a belief system and how one of the roles of the CISO is akin to that of a modern-day soothsayer for senior management; that this role is precarious and, at the same time, superior, leading to alienation within the organisation. Our study also highlights that the CISO identity of protector-from-threat, linked to the precarious position, motivates self-serving actions that we term 'cyber sophistry'. We conclude by outlining a series of implications for both organisations and CISOs. © 2022 ACM.
引用
收藏
相关论文
共 50 条
  • [1] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [2] The role of the CISO and the digital security landscape
    Putrus, Robert
    ISACA Journal, 2019, 2 : 22 - 29
  • [3] BlackWidow: Monitoring the Dark Web for Cyber Security Information
    Schaefer, Matthias
    Fuchs, Markus
    Strohmeier, Martin
    Engel, Markus
    Liechti, Marc
    Lenders, Vincent
    2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, : 499 - 519
  • [4] The modern CISO: where marketing meets security
    Short A.
    Carandang R.
    Computer Fraud and Security, 2022, 2022 (02):
  • [5] Keep the dark web close and your cyber security tighter
    Mador Z.
    Computer Fraud and Security, 2021, 2021 (01): : 6 - 8
  • [6] Cyber security of a power grid: State-of-the-art
    Sun, Chih-Che
    Hahn, Adam
    Liu, Chen-Ching
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2018, 99 : 45 - 56
  • [7] State-of-The-Art of Cloud Computing Cyber-Security
    Bennasar, Hanane
    Essaaidi, Mohammad
    Bendahmane, Ahmed
    Ben-othman, Jalel
    PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [8] Moving from blocker to enabler: cloud security and the modern CISO
    Subramanian O.
    Computer Fraud and Security, 2020, 2020 (10): : 6 - 8
  • [9] Security Obstacles and Motivations for Small Businesses from a CISO's Perspective
    Wolf, Flynn
    Aviv, Adam J.
    Kuber, Ravi
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1199 - 1216
  • [10] An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
    Bennasar, H.
    Bendahmane, A.
    Essaaidi, M.
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 56 - 67