Lepide Blog: A Guide to IT Security, Compliance and IT Operations

The CIO Security Checklist: Questions to Answer

The CIO Security Checklist

Some larger companies will employ both a Chief Information Officer (CIO) and a Chief Information Security Officer (CISO). They are both responsible for protecting and managing sensitive data, although the role of the CIO is much broader.

The role of the CISO is to ensure that proper controls are in place to protect the company’s digital assets, while the role of the CIO is to ensure that the CISO has the necessary tools and resources to be able to do their job properly.

This includes developing security policies, procedures, training programs, budgeting, and ensuring that the company is using the most up-to-date security solutions available. Below is a brief description of the CIO’s core responsibilities, as well as some simple questions which need to be answered in order to meet them.

1. Develop an Incident Response Plan

Security incidents that are not identified, contained and eradicated in a timely manner will likely lead to even greater problems down the line. Establishing formal policies for dealing with security incidents will help to prevent down-time, minimize losses and reputational damage, and ensure that any mistakes that were made are well documented to help mitigate future incidents.

The CIO is responsible for developing an Incident Response Plan (IRP), and should be able to answer the following questions:

2. Assess the Risks of Your Cloud Strategy

There are many reasons why CIO’s are keen to adopt cloud computing. Firstly, cloud services often have a relatively simple pricing system, there are usually no upfront costs, they are typically more scalable than on-premise solutions, and a trusted service provider will already be compliant with the most relevant data protection regulations.

These benefits can take pressure off the CIO, allowing them to focus on more productive tasks. However, cloud-based solutions come with their own risks, and so the CIO will still need to carry out a thorough risk assessment before using them to store confidential data.

They should start by answering the following questions:

3. Ensure You Can Satisfy Regulatory Compliance

Data protection regulations are becoming increasing more stringent, and the fines for non-compliance are putting additional pressure on CIO’s. The EU’s General Data Protection Regulation (GDPR), which came into effect on the 25 May 2018, has introduced fines of up to €20 million, as well as elevated rights for data subjects relating to the way their data is used.

It has never been so important for CIO’s to streamline the protocols for collecting, storing and accessing personal data. Below are some questions CIO’s need to answer to ensure that they can satisfy the relevant compliance requirements:

4. Understand the Tools & Technologies Available to You

According to a survey carried out by ESG, 53% of respondents reported a “problematic shortage” of cybersecurity skills at their organization, and the shortage is set to get worse. To compensate for the lack of cyber security professionals, CIO’s must focus their attention on automation, which requires a deep understanding of the different tools and technologies available.

As a starting point, CIO’s should be able to answer the following questions:

5. Ensure Physical Security Measures Are in Place and Working

Naturally, having strong physical security measures in place is very important. A failure to adequately control access to your premises could allow a criminal to break in and steal drives, devices, or even paper documents containing sensitive data.

Alternatively, they could use their smartphone to take photos of unattended computer monitors displaying sensitive data, or even rummage through your skip in search of redundant equipment.

At the very least, CIO’s should be able to answer the following questions:

6. Undertake a Third-Party Risk Assessment

According to the Data Risk in the Third-Party Ecosystem study, and carried out by the Ponemon Institute, 59% of companies have experienced a data breach caused by a third-party, and only 16% say that are able to effectively mitigate third-party risks.

Companies are becoming increasingly more dependent on third parties, with companies sharing confidential data with an average of 583 third parties.

Questions CIO’s need to answer include:

7. Assess the Risks of BYOD (Bring Your Own Device)

BYOD is a growing trend that allows employees to use their personal devices in the workplace. There are many advantages of enabling BYOD. For example, when asked, employees say that they’re more productive when using their own device. They say that using their own device gives them a better work-life balance.

Adopting BYOD also saves the company money as they are not required to purchase or maintain devices for their employees. However, BYOD will also present several additional security risks, which the CIO must factor in.

As a starting point, the CIO must be able to answer the following questions:

8. Deploy Real Time Security Auditing

Keeping track of changes to your critical data is not just necessary for regulatory compliance, but it is crucial if you want to keep your sensitive data out of the wrong hands. According to the Verizon 2019 Data Breach Investigations Report, 34% of all breaches in 2018 were caused by insiders.

One of the core responsibilities of CIO’s is to ensure that CISO’s have the visibility and control they need to be able to detect and respond to anomalous changes made by insiders.

There are several questions the CIO must answer in order to do this.

To summarize…

If this sounds like a daunting task, or you need help getting the visibility you require over your sensitive data (including where it is, who has access to it and what users are doing with it), come and speak to one of our engineers or schedule a demo to find out how the Lepide Data Security Platform can help you get started.