The position of Chief Information Security Officer (CISO) is critical, especially within Business Process Outsourcing (BPO) organisations that are continually challenged by a big range of cyber threats. Although there are multiple great articles and papers written on the topic of the first 100 days, I hope that the industry focus provides some additional value.
The specificity of the industry is that BPOs inherit almost the entire threat landscape of their clients. Hence, the CISO not only bears the responsibility for the protection of the organisation's information assets, maintaining operational resilience, and overseeing the reduction of cyber risks, but carries a heavy burden of ensuring that all clients’ data, and processes that often span multiple environments, are well protected.
The initial 100 days for a new CISO in such an environment are therefore exceptionally vital as they establish their approach to leadership and define the security stance of the organisation. The stance that often defines how the BPO itself will be perceived by the market and clients...
By failing to prepare, you are preparing to fail…
Although it is debatable if the above wisdom was really produced by Benjamin Franklin, the statement itself is undeniably and brutally correct. Once in the hot seat, a new CISO will be facing a multitude of challenges that, if not planned for in advance, can be overwhelming. Spending some time in advance, to plot the happy path, can yield significant benefits. Most authors on the topic agree about the big five themes that underpin a successful start. They might be called slightly differently but the gist is the same:
And, it would be relatively easy to craft a nice plan based on those themes, given that there is a nice and natural flow. The challenge, however, lies in the fact that a new CISO does not really have 100 days to set things up. Choosing across the spectrum, from threat actors with funny code names including animals on one side, and disgruntled insiders on the other, no one will allow for a 100-day honeymoon. The action is required “yesterday”. Therefore, some hints and quick wins can buy enough extra time to settle in.
Before officially stepping into the role, a new CISO should engage in thorough preparation. This includes:
Hint: this is a great starting point as by researching with a “grey box” mindset, it is easier to understand what information could be available to the potential attacker.
Once in, during the first few weeks, the CISO should focus on observing and establishing relationships, rather than making immediate changes. This includes:
In the first month, the CISO should conduct a thorough assessment of the organisation's security processes and technologies, with a focus on safeguarding the key client interfacing processes, applications, platforms, customer databases, and any intellectual property that are vital for the business’s profitability. This includes:
By the end of the first quarter, the CISO should have a clear vision for the organisation's security and a plan to achieve it. This includes:
Hint: To build relationships with clients, it is important to communicate security posture and initiatives in a way that builds trust and confidence. For example, establishing a structured way for sharing information about security certifications, compliance frameworks, and incident response plans is always received well (in many cases it is expected). Moreover, regular updates on security initiatives and metrics, such as the number of detected and resolved security incidents, that demonstrate ongoing commitment to security, can even lead to reduced load on external assessments and questionnaires.
Hint: It might not be obvious but, typically, the most important and valuable asset for a BPO company are its people. When they cannot work, the company does not make money. And it is rather easy to translate lost hours to $ value.
Hint: In the BPO world, MFA might not be as straightforward as in other places. Due to clients’ requirements, multiple solutions could be needed. For reasons such as fraud prevention, mobile devices are normally not allowed on the “production floors”. Hence, authenticator apps might not be a solution. Physical tokens often have a very high TCO. So choosing a viable solution can be challenging - make sure to consider a behaviour based one such as Twosense.
It is important to clearly link the goals and priorities to business outcomes.
Once the plans are in place, the CISO should act and execute on them. This includes:
After implementing security initiatives, the CISO should monitor their effectiveness and report on them. This includes:
In conclusion, the first 100 days of a CISO's tenure in a BPO setting are a critical period that requires a strategic and well-planned approach. The unique challenges of the BPO industry, including the inherited threat landscape of clients, make the role of a CISO even more vital to the success and reputation of the organisation. By focusing on researching and preparing, understanding and assessing, planning and prioritising, acting and executing, and monitoring and reporting, a new CISO can establish a strong security posture and build trust with clients.
It is essential to remember that a new CISO does not have the luxury of a 100-day honeymoon period. The need for action is immediate, and quick wins can buy enough extra time to settle in. Therefore, it is crucial to identify short-term goals that can improve security and build credibility, such as establishing and implementing a cyber risk quantification framework and validating and enforcing MFA.
Moreover, building relationships with clients is critical to the success of a CISO in a BPO setting. Communicating security posture and initiatives in a way that builds trust and confidence is essential. Regular updates on security initiatives and metrics, such as the number of detected and resolved security incidents, can demonstrate ongoing commitment to security and even lead to reduced load on external assessments and questionnaires.
In summary, a new CISO in a BPO setting must balance transparency, high standards, and a willingness to learn to lay the foundation for a successful tenure and a robust security posture for the organisation. By focusing on business value protection, cyber risk prioritisation, control framework assessment, and strategic security integration, a new CISO can contribute to the organisation's cybersecurity resilience and build and maintain the trust of their clients. The tangible short-term goals of establishing and implementing a cyber risk quantification framework and validating and enforcing MFA will provide immediate value and set the stage for long-term success.