"Cyber security is a dark art": The CISO as Soothsayer

被引:4
|
作者
Da Silva J. [1 ]
Jensen R.B. [1 ]
机构
[1] Royal Holloway University of London, Egham Hil, Egham
关键词
CISO; cyber security; identity; ontological security; organisations;
D O I
10.1145/3555090
中图分类号
学科分类号
摘要
Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises, making their cyber-security function critically important. Many organisations employ a Chief Information Security Officer (CISO) to lead such a function. We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders, between October 2019 and July 2020, as part of a wider exploration into the purpose of CISOs and cyber-security functions. In this paper, we employ broader security scholarship related to ontological security and sociological notions of identity work to provide an interpretative analysis of the CISO role in organisations. Research findings reveal that cyber security is an expert system that positions the CISO as an interpreter of something that is mystical, unknown and fearful to the uninitiated. They show how the fearful nature of cyber security contributes to it being considered an ontological threat by the organisation, while responding to that threat contributes to the organisation's overall identity. We further show how cyber security is analogous to a belief system and how one of the roles of the CISO is akin to that of a modern-day soothsayer for senior management; that this role is precarious and, at the same time, superior, leading to alienation within the organisation. Our study also highlights that the CISO identity of protector-from-threat, linked to the precarious position, motivates self-serving actions that we term 'cyber sophistry'. We conclude by outlining a series of implications for both organisations and CISOs. © 2022 ACM.
引用
收藏
相关论文
共 50 条
  • [31] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):
  • [32] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [33] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [34] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [35] The World "Wild" Web: Cyber-Security Intelligence Gathering Opportunities from the "Dark" Side
    French, Tim
    Epiphaniou, Gregory
    LISS 2013, 2015, : 1265 - 1270
  • [36] Standards for Cyber Security
    Purser, Steve
    BEST PRACTICES IN COMPUTER NETWORK DEFENSE: INCIDENT DETECTION AND RESPONSE, 2014, 35 : 97 - 106
  • [37] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [38] Is there a cyber security dilemma?
    Beckerman, Carly E.
    JOURNAL OF CYBERSECURITY, 2022, 8 (01):
  • [39] EU AND CYBER SECURITY
    Onescu, Dragos Ionut
    ELEARNING VISION 2020!, VOL I, 2016, : 436 - 441
  • [40] The Economics Of Cyber Security
    Mills, Peter
    FORBES, 2013, 192 (09): : 137 - +