"Cyber security is a dark art": The CISO as Soothsayer

被引:4
|
作者
Da Silva J. [1 ]
Jensen R.B. [1 ]
机构
[1] Royal Holloway University of London, Egham Hil, Egham
关键词
CISO; cyber security; identity; ontological security; organisations;
D O I
10.1145/3555090
中图分类号
学科分类号
摘要
Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises, making their cyber-security function critically important. Many organisations employ a Chief Information Security Officer (CISO) to lead such a function. We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders, between October 2019 and July 2020, as part of a wider exploration into the purpose of CISOs and cyber-security functions. In this paper, we employ broader security scholarship related to ontological security and sociological notions of identity work to provide an interpretative analysis of the CISO role in organisations. Research findings reveal that cyber security is an expert system that positions the CISO as an interpreter of something that is mystical, unknown and fearful to the uninitiated. They show how the fearful nature of cyber security contributes to it being considered an ontological threat by the organisation, while responding to that threat contributes to the organisation's overall identity. We further show how cyber security is analogous to a belief system and how one of the roles of the CISO is akin to that of a modern-day soothsayer for senior management; that this role is precarious and, at the same time, superior, leading to alienation within the organisation. Our study also highlights that the CISO identity of protector-from-threat, linked to the precarious position, motivates self-serving actions that we term 'cyber sophistry'. We conclude by outlining a series of implications for both organisations and CISOs. © 2022 ACM.
引用
收藏
相关论文
共 50 条
  • [41] NATO AND CYBER SECURITY
    Kazakovtsev, A. V.
    VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114
  • [42] Engineering Cyber Security
    Gopalratnam, Arjun
    CHEMICAL ENGINEERING PROGRESS, 2012, 108 (07) : 64 - 64
  • [43] Brexit and Cyber Security
    Stevens, Tim
    O'Brien, Kevin
    RUSI JOURNAL, 2019, 164 (03): : 22 - 30
  • [44] Cyber security and the brand
    Chikada A.
    Computer Fraud and Security, 2019, 2019 (09): : 6 - 9
  • [45] The future of cyber security
    Samociuk D.
    Computer Fraud and Security, 2022, 2022 (09):
  • [46] Cyber security leaks
    Weiss, J
    MECHANICAL ENGINEERING, 2002, 124 (05) : 8 - 8
  • [47] Cyber Security - IoT
    Naik, Swapnil
    Maral, Vikas
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 764 - 767
  • [48] Cyber security in the spotlight
    Knapp, Eric, 1600, Palladian Publications (22):
  • [49] Cyber security query
    Cochran, RB
    INTECH, 2005, 52 (04) : 8 - 8
  • [50] Partnering for cyber security
    不详
    CONTROL ENGINEERING, 2008, 55 (02) : 33 - 33