The CISO's Guide To Your First 100 Days: Key Findings
The CISO's Guide To Your First 100 Days: Key Findings
The CISO's Guide To Your First 100 Days: Key Findings
Your first 100 days in the chief information security officer (or
equivalent) role determine your success as a security and risk
management leader. Gartner provides guidance and support to
help new CISOs maximize their success during this pivotal
transition phase.
Overview
Key Findings
■ Successful chief information security officers (CISOs) are primarily leaders,
managers and communicators — not technologists.
■ New CISOs struggle when they fail to understand leadership expectations or fail to
effectively communicate how security supports business outcomes.
Recommendations
For security and risk management leaders in their first 100 days in the CISO role:
■ Strengthen the cybersecurity program’s relationship with the business by linking your
leadership priorities to business outcomes and objectives.
■ Define a strategy for security before diving into technical details and technology
decisions.
■ Maximize your chances of success by identifying two to five priorities you can
accomplish in the first 100 days.
■ Budget extra time for unpredictable security incidents before they inevitably occur to
avoid delaying strategic initiatives.
Introduction
Your first 100 days in the CISO role represent an opportunity to define your role and
professional relationships. This short “honeymoon” period typically provides the leeway to
develop a strategy, make C-suite connections, secure leadership support, establish trust
with your new team and signal your leadership style. This opportunity is especially
valuable if the enterprise needs a major overhaul to cyber risk governance or significantly
better security program maturity.
This research examines how leading CISOs make full use of their first 100 days. We break
this period into six phases: prepare, assess, plan, act, measure and communicate (Figure
1).
Phases and Goals of a CISO’s First 100 Days: Click links to jump to sections
■ Establish your credibility as a CISO and elevate the security enterprise’s internal
brand and image.
■ Establish the current maturity of the security program (see IT Score for Security and
Risk Management).
■ Bridge the gap between security operational excellence and business value (e.g., C-
suite priorities).
The remainder of this research note provides actionable guidance to achieve these
objectives.
■ A common understanding of your role and the expectations of your staff, senior
stakeholders and leadership team.
This phase focuses on listening and learning — not decision making. Avoid making
sweeping announcements or decisions in your first few weeks in the CISO role.
Assess the type of CISO that your enterprise requires: Enterprises have different
requirements based on culture, industry, political challenges and other factors. Some will
require an operationally-driven CISO, while others will require a more business-focused
one. Gartner recommends that security and risk management leaders view the CISO
Effectiveness Index and work on developing profiles based on their enterprise’s needs.
Identify key stakeholders: Create a list of leadership stakeholders with whom you’ll be
working. This list may include (but is not limited to) the CEO, CFO, CIO, general counsel,
head of HR, chief privacy officer (CPO) and chief risk officer (CRO).
Establish new connections: Engage leadership stakeholders and security staff, ideally
before your first day in the role. Engagement tactics include thank-you notes after
interviews and LinkedIn connections (with personalized notes).
Focus on the following before Day 1 and in your initial weeks in the role:
Understand your C-suite’s priorities: Effective CISOs understand that they are corporate
executives — not just operational managers or technical subject matter experts. Achieving
your full potential as a CISO requires understanding your enterprise’s business and the
priorities that are top of mind for the C-suite and board. Consider the following sources of
information before your first day:
■ Learn your company’s mission statement from the “About us” webpage.
■ Read and watch recent leadership communications and interviews (and consider
following leadership social media accounts).
■ Identify any competing priorities within the C-suite, and prepare to navigate security
through these leadership complexities.
Introduce yourself: Create a short bio that covers your personal background, your career
path and your initial thoughts on joining the enterprise. Use this bio in presentations and
meet-and-greets so that everyone understands who you are and where you come from.
Avoid announcing bold, disruptive decisions in these initial introductions. Rather, your
primary goal is to be welcomed by your peers and team.
Create discussion guides: Prepare questions and talking points before your initial round
of meet-and-greet meetings. For example, consider the following:
■ Staff discussions: Prepare questions that diagnose (1) the current state of security
governance and operations, and (2) staff perceptions of the team and work
environment. Questions to ask include:
The Roadmap to CISO Effectiveness — Tailor your leadership approach based on proven
best practices sourced from leading CISOs.
Develop the Skills of the Contemporary CISO — Identify and build skills to develop into a
well-rounded and capable CISO.
CISO Effectiveness: A Report on the Behaviors and Mindsets That Impact CISO
Effectiveness — Identify the behaviors and mindsets that most strongly correlate with
CISO effectiveness.
■ An executive mentor that provides insight into the culture of the enterprise.
■ A prioritized list of three to five strategic priorities that address security gaps and
align to business outcomes.
Establish security’s roles and responsibilities: Your first priority in the CISO role is to
clarify and define security’s roles and responsibilities. Have a discussion with your
manager to fully scope the security function and your role. Consider clarifying ownership
in areas such as:
■ Physical security
■ Privacy
■ Compliance
■ IT risk
■ Risk governance
■ Security operations
For areas outside security’s remit, ensure you develop working relationships with peer
managers and leaders (e.g., head of ERM, chief privacy officer, general counsel).
Inventory your information sources: Quickly take inventory of information sources you’ll
need to manage the security function. For example, locate any existing policies, org
charts, strategic plans, current projects, technology roadmaps and metrics. Use these
information sources to inform your understanding of security’s current state and
immediate plans.
Perform maturity assessments: Create a safe environment for security staff to candidly
assess security’s maturity. These assessments surface gaps that inform forward-looking
strategy setting — not backward-looking blame. As a new CISO, you should at least
perform the following core assessments, and consider adding additional ones if possible.
Additional assessments:
■ Audit findings
■ Vulnerability assessments
■ Threat assessments
■ Talent assessments
■ Regulatory findings
■ Penetration tests
■ Phishing tests
Identify your top strategic priorities: Conducting assessments will reveal gaps that exist
across the security program. Use these gaps to identify three to five strategic priorities to
address in your first 100 days. These priorities should address fundamental challenges
and make a positive impression on the security team and senior leadership.
■ Meet team leads: Hold one-on-one meetings with security team leads. Gauge their
opinions on the current state of the security program, and make clear that each
leader plays a pivotal role in setting an executive security’s strategy in the coming
weeks, months and years ahead.
■ Identify influencers: As you meet leaders across the enterprise, make note of senior
influencers who can advance security priorities, give you a personal mandate and
help you prepare for senior- and board-level communication.
IT Score for Security and Risk Management — Assess the maturity of your security
function’s processes and capabilities.
The plan phase synthesizes information from your assessments into a blueprint for
action. Your initial planning sets the roadmap for your first 100 days, and guides security’s
success over your first year in the role.
■ A documented strategic plan that prioritizes two to three security initiatives for your
first 100 days, and a loose roadmap for your first year.
Select a few top priorities: Examine your top priorities and select two to three to focus on
over the next three months. Use the following criteria to filter down to these top priorities:
■ Will you have the required executive support, resources and budget?
As you select priorities, help business leaders understand how security priorities support
business outcomes. Making this connection early maximizes the credit that you and the
security function receive for achieving strategic priorities.
Design or refine your security function: Structure the security function based on your
mandate, priorities and enterprise’s culture. Unfortunately, there’s no one-size-fits-all
approach to security org design; rather, you should design the function in such a way that
roles and responsibilities are clear, managers are empowered and accountable, and
connections to peers outside security (e.g., IT, privacy, legal) are clear.
Plan your operational budget: Your level of control over security’s budget will depend on
when you joined the enterprise (beginning, middle or end of fiscal year) and the current
budgeting process. While some aspects of budgeting may not be flexible during your first
100 days, you should ensure that your operational budget can support your strategic
priorities. You may consider reallocating resources to support priorities.
Create a security program vision: Information security programs require a clear, concise
vision statement. This statement lays out security’s high-level mandate and goals, and
should be shared with your team, management and relevant stakeholders.
Ignition Guide to Strategic Planning for Information Security — Create a strategic plan
using our step-by-step guidance.
Security Strategy Planning Best Practices — Develop an actionable strategic plan that
establishes
■ A security budget that ensures sufficient resources for your strategic priorities.
■ A list of tangible and measurable project results that demonstrate progress against
your strategic objectives.
Refine roles and responsibilities: First, ensure that all security managers have well-defined
roles and responsibilities. Make clear what each security manager is accountable for, and
how their performance will be assessed. Second, ensure that all line-level security staff
have clear job descriptions and responsibilities that clearly reflect the work each employee
actually does. Keep in mind that job descriptions and performance management metrics
often differ from the realities of how work actually gets done — a gap that should be
rectified under your new leadership.
Remember, security managers can help develop roles and responsibilities for themselves
and their teams. As CISO, you should oversee this work, but don’t feel you must complete
all management tasks yourself.
Assign project ownership: Each of your strategic priorities should have a formal project
owner. Establish a clear plan, expectations and outcomes for each project, and clarify
these with respective project owners. One way to minimize the risk of project failure is to
establish multiple project objectives and avoid projects that have binary outcomes
(success or failure).
Establish security governance processes and forums: Begin work to build effective
information risk governance across the enterprise. This entails risk decision-making rights,
risk accountability and the responsibilities of stakeholders across the enterprise for
information risk. One of your largest challenges as a new CISO will likely be instilling
proper risk ownership and decision making.
Schedule team and manager check-ins: People management is a major aspect of the
CISO role. As a first step in managing your team, create recurring meetings across the
security team. In particular, consider the following:
■ Conduct weekly one-on-one check-ins with each security manager. Use these
meetings to plan and track projects. Manager meetings are also a coaching
opportunity, especially with regard to instilling business awareness and context into
day-to-day security operations.
■ Establish monthly or quarterly “skip level” one-on-ones with security staff. You can
schedule these on a rolling basis so that you meet with multiple staff members every
week. These meetings are an opportunity to directly communicate with staff, gather
input and gauge morale.
Information Security Presentation Support Center — Use “download and go” templates to
strengthen your message to leadership and stakeholders across the enterprise.
The measure phase provides evidence of your impact on security and the enterprise.
Measurement and communication are hallmarks of a successful CISO, and you should
dedicate significant effort to this endeavor throughout your tenure.
Highlight early wins and challenges: Maintain momentum by communicating wins and
identifying solutions to address challenges as they emerge. Keep in mind that most
security initiatives have multiple objectives (some smaller, some larger) — and even if
some objectives are delayed or missed, others may be achieved.
Why You Should Develop a Balanced Scorecard for Security and Risk Management —
Implement a balanced scorecard to communicate business-relevant metrics to leadership.
Toolkit: Developing a Balanced Scorecard for Security — Use this download-and-go tool to
quickly create a security balanced scorecard.
Five Required Characteristics of Security Metrics — Design metrics that satisfy best
practices.
Toolkit: The New CISO's Crucial First 100 Days - 2 February 2007