CISO'S First 100 Days
CISO'S First 100 Days
CISO'S First 100 Days
Take action
Nothing would be worse than developing a plan and failing to provide tangible results.
In order to create an effective plan, you should start by measuring your current
software security program and comparing it with industry peers. You can use this
reference as a justification for budgeting and resource needs. You should select
feasible and manageable projects that you can accomplish within your first 100 days.
Beyond the first 100 days, you should also have goals in place for your first year;
showing measurable and tangible results is the surest way to prove your impact and
success to your organization.
| synopsys.com | 2
Common pitfalls: Things to avoid
Getting caught up in expectation vs. reality. Often, when a new CISO takes on the role, the reality of the organization’s innerworkings
may be disappointing or vary greatly from the details communicated in the interview process. It’s important not to get caught up in
rationalizing these differences. Focus on the reality of what is, not what you thought it would be. Time spent lamenting or discussing
unmet expectations detracts from the time you can spend on meaningful work.
Playing the blame game. It’s easy to come into a new role and blame shortcomings or challenges you’re facing on your predecessor. By
blaming past actions and decisions, you set a negative tone for the organization, and inevitably foster feelings of resentment or distrust
among those who played key roles in the very practices you’re ridiculing. It’s great to analyze older ways of doing things and provide
structured direction and action for improvement, but refrain from placing blame. Focus on the future, not the past.
Trying to do too much, too soon. Perhaps one of the easiest pitfalls is trying to do too much. In your first 100 days, you should focus on
identifying and accomplishing feasible tasks. It’s far better to accomplish smaller tasks successfully than attempt and fail to accomplish
tasks that are too involved or too complex for your first 100 days. Small successes are always favorable to large failures.
Five-phase overview
1. Research. The more background information and details you have about your position and the organization as a whole, the better off
you’ll be when formulating your plan. You should start this research even before you begin the role. The more insight you have, the
more proactive you can be.
2. Process and understand. Collect an inventory of your organization’s security practices, its systems, and its overall security footprint.
Are there gaps in security? Areas that need immediate attention? Ensure that you have a full understanding of the current state of
your organization, so you can begin your planning with the maximum level of intelligence. This phase should involve and in-depth
measurement and analysis of your existing software security program. Comparisons and market analysis and research can be
particularly helpful toward this end.
3. Prioritize. You should begin formulating a draft of your plan, including all the data and information you gathered. Any actions needed
to support this plan should be undertaken early—for example, hire additional resources or team members prior to starting your plan.
4. Get to work. Now that you’re armed with an informed plan and all the resources you need, it’s time to get to work. As noted earlier,
nothing is more important than your ability to deliver visible and tangible results as soon as possible.
5. Report. It’s critical that you clearly communicate your successes and progress to key stakeholders. Don’t assume they know what you
accomplished. Regular reporting with evidence and data is key. This is an opportunity to underline challenges you’re facing and wins
you delivered.
| synopsys.com | 3
Five-phase details
Phase Key activities
Research • Analyze relevant reports, shared spaces, support systems, tools, solutions
Days 0–15 • Schedule key stakeholder meetings
• Perform team outreach and introductions
Process and • Collect information and data regarding the maturity and state of the security
Understand program
Days 0–45 • Develop a working knowledge of which activities and practices are working,
and which are not
• Understand immediate needs and long-term requirements
• Identify business needs and priorities
Prioritize • Identify your goals for the first 100 days, and the first year
Days 15–60 • Calculate budgets and resource needs
• Prioritize several quick wins you can tackle easily
Conclusion
The first 100 days of your role as CISO can make or break you. Alignment, communication, and action are
all vital to your success. While you cannot possibly tackle all organizational challenges and issues in your
first 100 days, you should be well on your way to providing meaningful change and progress. We hope that
our suggestions will help get you on your way to developing your own plan. Choosing to take meaningful and
measured action will set you up for success as you take on this challenging new role. If you want to learn
more, check out our recent webinar or visit our BSIMM webpage to help you succeed on your 100-day journey.
| synopsys.com | 4
The Synopsys difference
Synopsys helps development teams build secure, high-quality software, minimizing risks while
maximizing speed and productivity. Synopsys, a recognized leader in application security,
provides static analysis, software composition analysis, and dynamic analysis solutions that
enable teams to quickly find and fix vulnerabilities and defects in proprietary code, open source
components, and application behavior. With a combination of industry-leading tools, services,
and expertise, only Synopsys helps organizations optimize security and quality in DevSecOps
and throughout the software development life cycle.
Synopsys, Inc.
690 E Middlefield Road
Mountain View, CA 94043 USA
Contact us:
U.S. Sales: 800.873.8193
International Sales: +1 415.321.5237
Email: [email protected]
©2021 Synopsys, Inc. All rights reserved. Synopsys is a trademark of Synopsys, Inc. in the United States and other countries. A list of Synopsys trademarks is available at www.
synopsys.com/copyright.html . All other names mentioned herein are trademarks or registered trademarks of their respective owners. April 2021
| synopsys.com | 5