
{"id":18135,"date":"2025-09-08T10:58:24","date_gmt":"2025-09-08T08:58:24","guid":{"rendered":"https:\/\/www.dp-institute.eu\/?p=18135"},"modified":"2025-09-08T10:58:24","modified_gmt":"2025-09-08T08:58:24","slug":"your-first-100-days-as-a-ciso-a-practical-approach","status":"publish","type":"post","link":"https:\/\/www.dp-institute.eu\/en\/your-first-100-days-as-a-ciso-a-practical-approach\/","title":{"rendered":"Your First 100 days as a CISO. A practical approach."},"content":{"rendered":"<p>You\u2019ve been looking forward to today: your first day as the new <strong>Chief Information Security Officer<\/strong> (CISO)! You\u2019re ready to save the world, and by \u201cthe world,&#8221; I mean your company\u2019s most critical assets. You\u2019ve ironed your fancy cybersecurity hero cape and are all set to talk strategy and business alignment. But how do you get started?<\/p>\n<p>In this article, we&#8217;ll outline the key focus points for <strong>your first 100 days<\/strong> to help you <a href=\"https:\/\/www.dp-institute.eu\/en\/navigating-the-ciso-role-essential-tips-and-strategies-for-success\/\">establish yourself as a security leader<\/a>, putting all the necessary pieces in place to make security and <a href=\"https:\/\/www.dp-institute.eu\/en\/importance-cybersecurity\/\">risk management<\/a> drivers for success.<\/p>\n<p>Ready? Set! Let&#8217;s make security strategy support business goals.<\/p>\n<h2><span lang=\"EN-US\">Building Strong relationships<\/span><\/h2>\n<p>In your first weeks in this new role, focus on <strong>building relationships<\/strong> and <strong>understanding the organization<\/strong>, its <strong>culture<\/strong>, and its <strong>business objectives<\/strong>. Your influence across the organization is directly connected to the strength of your relationships and, perhaps more importantly, the level of trust people have in you. Take the initiative to free up time in your schedule for both formal and informal touchpoints to align with your peers from every department. Instead of reacting to isolated incidents, look for patterns that could inform your risk assessment. Understand the compliance environment you\u2019ll be working within. Analyze situations carefully before taking action. Identify metrics that support business leaders. Complement this with sharing your knowledge and expertise when appropriate, especially if you can make quick wins, as it will help solidify your relationships and provide a platform for change. Remember, while doing all this, your top priority is to be your authentic self. It enhances trust and acts as a force multiplier.<\/p>\n<h2>First Priority: Authentication<\/h2>\n<p>There\u2019s a lot of debate about the balance between IT and Security when it comes to owning tools and functions in the infrastructure. Most breaches occur through compromised credentials. There should be no debate about <strong>Security being heavily involved in everything related to authentication<\/strong> (AuthN) and authorization (AuthZ). Collaborate with your IT Operations and DevOps teams to gain a basic understanding of the toolchain used across the organization. After understanding the tools and their fundamental functions, conduct an initial audit of who has access to what and map out the AuthN\/AuthZ landscape. Key focus points in this process are as follows:<\/p>\n<ul>\n<li>Verify Multi-Factor Authentication (MFA) coverage.<\/li>\n<li>Verify Single Sign-On coverage.<\/li>\n<li>Review access lifecycle management processes (onboarding, offboarding, mutation).<\/li>\n<li>Inventory secrets and their management processes.<\/li>\n<\/ul>\n<p>This should give you a clear understanding of what and how regarding AuthN\/AuthZ, along with the associated risks. Focus your roadmap on this topic by reducing risk and enabling collaboration.<\/p>\n<h2>Must have: Vulnerability Management and Patching<\/h2>\n<p>Aside from credential misuse, many cyber breaches still involve exploiting known vulnerabilities. While \u201czero-day vulnerabilities\u201d often capture headlines, organizations worldwide continue to face the more prevalent \u201ceveryday vulnerabilities.\u201d These are older, well-known weak points that make out the majority of your attack surface and directly impact your current security posture. In your <a href=\"https:\/\/www.dp-institute.eu\/en\/ciso-new-kid-on-the-block\/\">CISO role<\/a>, you need a <strong>solid understanding of the real security risks<\/strong>. This task is much more complex than simply scanning everything and distributing PDF reports throughout the organization.<\/p>\n<p>If there are no tools available, start with simple scanning that you can do both on infrastructure and application levels. Again, focus on patterns instead of individual findings. The data you collect will provide many insights if you look beyond the surface.<\/p>\n<ul>\n<li>What is the status of your organization&#8217;s patching processes?<\/li>\n<li>What is the condition of your external-facing infrastructure components?<\/li>\n<li>Which parts of your organization are exposed?<\/li>\n<li>Is there evidence of persistence or reoccurrence?<\/li>\n<li>What are the top 10, 25, or 50 items that, if resolved, would greatly reduce exposure?<\/li>\n<\/ul>\n<p>With that data in hand, you can engage in productive conversations with stakeholders across your organization. Remember, your role here is that of a curator rather than a reporter. Everyone probably knows that vulnerabilities exist. Your job is to <strong>curate the most critical vulnerabilities<\/strong> that reduce exposure and provide context, helping those responsible for mitigation do their work as effectively as possible.<\/p>\n<h2><span lang=\"EN-US\">Understanding Data across the organization<\/span><\/h2>\n<p>Every organization today revolves around data, making it a priority for you as well. As you build your social network within your new company, <strong>make sure that data remains a recurring topic<\/strong> with your stakeholders.<\/p>\n<ul>\n<li>Do you have specific data compliance requirements?<\/li>\n<li>How is data stored, processed, and transferred?<\/li>\n<li>Where is the data, and who or what has access to it?<\/li>\n<li>Is the data lifecycle management process straightforward?<\/li>\n<\/ul>\n<p>This is also likely where you&#8217;ll review backup and restore activities and conduct your initial Data (Protection) Impact Assessments.<\/p>\n<h2>Building your Strategic Security Roadmap<\/h2>\n<p>As you gain a deeper understanding of the reality you&#8217;re working in, it&#8217;s time to <strong>develop your roadmap to move forward<\/strong>. I\u2019d recommend avoiding a \u201cbig plan\u201d approach. Instead, start with smaller iterative changes and improvements that clearly focus on <strong>reducing identified risks<\/strong> and making it easier to work within your company. The latter is often overlooked, but the cumulative effect of making \u201cdoing things securely\u201d easier is significant. <strong>Small wins<\/strong> across security operations, incident response, and risk reduction <strong>will solidify your approach<\/strong>. You\u2019re becoming an ally instead of building a security team that makes progress hard.<\/p>\n<h2>Conclusion<\/h2>\n<p>Firstly, I did not address compliance separately, and this is intentional. As a new CISO in your first days on the job, you depend on others within your organization to provide information on ever-changing requirements. This makes this topic a priority in your discussions with various stakeholders and contributors during your first 100 days. It\u2019s clear that compliance, both legal and regulatory, is a major part of any security program these days but remember that compliance is not the same as security. In the long run, compliance should become a natural result of a focused and business-aligned security program.<\/p>\n<p>Finally, I need to note that there is <strong>no single checklist for becoming a successful CISO<\/strong>, especially within a limited timeframe of 100 days. Remember that it is not a \u201cbig effect\u201d effort. There will be big wins along the way, but your success depends on small, iterative changes that measurably improve things. Don\u2019t feel discouraged if progress seems slow! Instead, celebrate the small wins with your colleagues and other teams involved.<\/p>\n<h2>Be better prepared to take on your role as CISO<\/h2>\n<p>Our full\u00a0<strong>Certified CISO training programme<\/strong> provides you with an intense overview of the aspects it takes to get a helicopter view of the cybersecurity issues in your organisation in the function of Chief Information Security Officer.<\/p>\n<h3>Be at the top of your game and book the Certified CISO full track in one go!<\/h3>\n<p class=\"section-title\"><a href=\"https:\/\/www.dp-institute.eu\/en\/courses\/certified-ciso-full-track-module-1-7\/\">Security Leader: Full CISO Certification Track 7 Modules<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ve been looking forward to today: your first day as the new Chief Information Security Officer (CISO)! You\u2019re ready to save the world, and by \u201cthe world,&#8221; I mean your company\u2019s most critical assets. You\u2019ve ironed your fancy cybersecurity hero cape and are all set to talk strategy and business alignment. But how do you [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":18137,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[619],"tags":[],"class_list":["post-18135","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciso"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/posts\/18135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/comments?post=18135"}],"version-history":[{"count":6,"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/posts\/18135\/revisions"}],"predecessor-version":[{"id":18148,"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/posts\/18135\/revisions\/18148"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/media\/18137"}],"wp:attachment":[{"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/media?parent=18135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/categories?post=18135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dp-institute.eu\/en\/wp-json\/wp\/v2\/tags?post=18135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}