Women In Security Magazine Issue 12

Page 126

SAI HONIG

BISO – NO THAT IS NOT A TYPO by Sai Honig, Engagement Security Consultant at Amazon Web Services You have probably heard the title CISO or chief

technology? How do we prepare entire organisations

information security officer. Many companies have

when new technologies are rolled out? This is where

someone in this role. In some industries, such as

a business information security officer (BISO) may

finance or banking, the role is mandatory. According

be useful.

to ZDNet, a CISO is responsible for establishing security strategy and ensuring data assets are

A BISO is generally a senior cybersecurity leader

protected. CISOs traditionally work alongside the chief

whose duty it is to bridge the gap between security

information officer (CIO) to achieve these aims.

and the interests of the business. A BISO typically acts as the CISO’s deputy to oversee strategy at a

The CISO works with the CIO and technology teams

granular level. In large organisations there may be

to design, build, test, deploy, maintain and upgrade

multiple BISOs embedded in major business units or

technology systems. The CISO is responsible for

regional teams. For large scale technology rollouts

implementing and maintaining the security of

there may be a BISO who acts as the focal point for

these systems.

business teams.

The fact is, our world is exponentially increasing its

If security is to function as a strategic business

use of technology. With that comes an expectation

enabler there needs to be alignment between

that everyone—including all our non-technical

business priorities and information security priorities.

teams—knows how to use these technologies in a

If security and business teams are not collaborating,

safe and secure manner. Within many organisations

security incidents become more likely as technology

there are a large number of non-technical staff:

use increases. Even with the best monitoring and

finance, accounting, marketing, supply chain, human

the strongest security teams, incidents may still go

resources, education, healthcare, legal, machinists

unnoticed and unresolved.

and so on. A good BISO needs to be:

BRIDGING THE TECH/NON-TECH GAP So, how do we bridge the gap between those in non-technical teams and those in technology teams? How do we communicate safe and secure use of

126

W O M E N I N S E C U R I T Y M A G A Z I N E

• A good listener, to learn about the challenges from both the technical teams and business functions. • A good translator, to translate technology

J A N U A RY • F E B R U A RY 2023


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Saman Fatima

4min
pages 154-155

Roshni Bedi

6min
pages 148-150

Tshering Wangmo

6min
pages 152-153

Savannah Dockerty

3min
pages 146-147

Sheida Sabeti

2min
page 151

BISO – no that is not a typo

9min
pages 126-130

Different perspectives

10min
pages 136-140

Identity proofing, identity verification and fraud prevention

5min
pages 131-133

Incident response competition

6min
pages 141-145

managing risk and resilience

8min
pages 116-119

a rewarding profession

3min
pages 134-135

Taking a proactive approach to cybersecurity

3min
pages 114-115

or nothing

3min
pages 108-109

Engagement with an impersonator

8min
pages 100-103

changing career through recruitment

6min
pages 76-78

Balancing risk and productivity in a hybrid world

4min
pages 106-107

experience and professional fulfillment

3min
pages 104-105

Don’t get poor fast

3min
pages 90-91

material risk grows

3min
pages 92-93

after 12 years in finance

2min
pages 74-75

Why I became a cybersecurity expert

2min
pages 72-73

operator in the Australian Army Reserves

3min
pages 64-65

early careers

10min
pages 66-71

Cyber is not your get-rich-quick option

3min
pages 62-63

Reshmi Hariharan

4min
pages 50-51

Farah Chamseddine

4min
pages 48-49

Martina Saldi

4min
pages 46-47

Holly Wright

5min
pages 44-45

Dr Fauzia Idrees Abro

1min
page 43

Johanna Williamson

6min
pages 40-42

Get-rich-quick crypto scams

2min
pages 14-15

Lisa Ventura

3min
pages 30-31

Catherine Dawson

3min
pages 38-39

Rachael Greaves

6min
pages 35-37

Belinda Stewart

3min
pages 20-21

Kao Hansell

3min
pages 16-17

Jenna Salvesen

6min
pages 32-34

Melanie Truscott

4min
pages 18-19
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.