{"id":125,"date":"2022-03-02T19:59:39","date_gmt":"2022-03-02T19:59:39","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=125"},"modified":"2022-12-08T04:11:58","modified_gmt":"2022-12-08T04:11:58","slug":"what-is-a-chief-information-security-officer","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/","title":{"rendered":"Chief Information Security Officer (CISO) Career Overview"},"content":{"rendered":"<p>Chief information security officers (CISOs) manage the cybersecurity needs of an organization, including the team, the technologies, and the initiatives. These relatively new C-suite executives typically report to the chief information officer (CIO), who then reports to the chief executive officer (CEO).<\/p>\r\n<p>Created as a response to cybercrime, the CISO position will continue to grow as long as cybercrime grows. According to <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a>, cybercrime could reach $10.5 trillion in annual damages by 2025. As the field expands and matures, CISOs will need to stay vigilant in their research, education, and skills training.<\/p>\r\n<p>Here, we explore the CISO career in detail. We look at the path into the career, the responsibilities, and the outlook.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"history\" id=\"history\"><\/a>\n\n \r\n<h2>History of Chief Information Security Officers<\/h2>\r\n<p>In 1995, following a <a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">multimillion dollar hack<\/a> into their electronic funds transfer system, Citicorp recruited Steve Katz to take on the world's first CISO position. While Katz and others held security leadership roles before this, the new CISO position was designed to manage and mitigate business risk related to cybersecurity.<\/p>\r\n<p>Over time, the scope of cybersecurity has grown immensely. Contemporary CISOs need to adapt to constantly <a href=\"https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/\">emerging cybersecurity technologies<\/a>, regulatory changes, new hacker methods and motives, and the business expansion into the digital world. Along with technological expertise, CISOs need to provide insight into how business decisions impact cybersecurity and vice versa.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"careers\" id=\"careers\"><\/a>\n\n \r\n<h2>Similar Specializations and Career Paths<\/h2>\r\n<p>The CISO career path may look different for every individual. Some see the CISO position as a terminal career. Some, however, use the position as a stepping stone to other executive roles, such as chief information officer (CIO), chief technology officer (CTO), and chief executive officer (CEO).<\/p>\r\n<p>Rising through the ranks may require additional experience or training. <a href=\"https:\/\/www.study.eu\/article\/the-academic-backgrounds-of-the-worlds-most-powerful-ceos\" target=\"_blank\" rel=\"noopener\">Research from Study.eu<\/a> found that 64% of global CEOs hold master's degrees and 10% hold doctorates. In North America, 54% of CEOs have MBAs.<\/p>\r\n<p>Despite the importance of <a href=\"https:\/\/www.weforum.org\/agenda\/2021\/06\/cybersecurity-ceos\/\" target=\"_blank\" rel=\"noopener\">cybercrime for CEOs<\/a>, only a small percentage of CEOs come from a technology path, <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/insights\/us\/articles\/6577_FSI-Path-to-CEO-Report-Layout\/DI_FSI_Path%20to%20CEO_Report.pdf\" target=\"_blank\" rel=\"noopener\">as per Deloitte<\/a>. Traditionally, CEOs come from business, operations, and finance, but that may change in the future as cybercrime grows.<\/p>\r\n<p>CISOs in technology industries or those with strong cybersecurity needs may find CEO roles more accessible. In smaller organizations, CISO careers may not be available. In these places, cybersecurity specialists may take on <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\">security analyst<\/a> or <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-manager\/\">security manager<\/a> roles.<\/p>\r\n\r\n\r\n<table class=\"sonic-table\">\r\n<tbody>\r\n<tr>\r\n<th>\r\n<strong>Career<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Description<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Required Education<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Required Experience<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Median Annual Salary<\/strong>\r\n<\/th>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/how-to-become\/\"><strong>Information Security Analyst<\/strong><\/a><\/p>\r\n<\/td>\r\n<td data-title=\"Description\">\r\n<p>These analysts assess the strength of an organization's cybersecurity systems by looking for vulnerabilities and available upgrades.<\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Bachelor's degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>Less than five years<\/p>\r\n<\/td>\r\n<td data-title=\"Salary\">\r\n<p>$102,600<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Top Executive<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Description\">\r\n<p>Top executives set goals for their division and create the programs and policies necessary to accomplish them.<\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Bachelor's degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>Five years or more<\/p>\r\n<\/td>\r\n<td data-title=\"Salary\">\r\n<p>$98,980<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Computer and Information Systems Manager<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Description\">\r\n<p>These managers oversee IT teams and projects. They also report to top executives on technological initiatives.<\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Bachelor's degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>Five years or more<\/p>\r\n<\/td>\r\n<td data-title=\"Salary\">\r\n<p>$159,010<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Computer and Information Research Scientist<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Description\">\r\n<p>Research scientists study and design new computing technologies and new ways of using computers.<\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Master's degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>None<\/p>\r\n<\/td>\r\n<td data-title=\"Salary\">\r\n<p>$131,490<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align: right;\"><small><strong>Source:<\/strong> BLS<\/small><\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore more careers in cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n<h2>What Does a Chief Information Security Officer Do?<\/h2>\r\n<p>The <a href=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/day-in-the-life\">primary goals for CISOs<\/a> include overseeing the cybersecurity systems, practices, and policies. Many, if not all, business and cybersecurity decisions have an effect on the other. CISOs need to analyze these decisions and measure and evaluate their potential impact and risk.<\/p>\r\n<p>CISOs typically oversee a team of IT and<a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\"> cybersecurity professionals<\/a>. They collaborate and report to other managers and C-suite executives, including CIOs, CTOs, and CEOs.<\/p>\r\n<p>The <a href=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/career-and-salary\">CISO career value<\/a> increases alongside the growth in cybercrime. The speed of evolution in cybercrime, however, creates many challenges for cybersecurity professionals. They need to respond to new technologies, new targets, growing sophistication, and the increasingly remote structure of organizations.<\/p>\r\n<p>Below, we highlight some of the skills that CISOs can acquire to improve their chances of success in this complex role.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"key-skills\" id=\"key-skills\"><\/a>\n\n \r\n<sonic-columns columns=\"2\">\r\n    <div>\r\n<h3>Key Soft Skills for CISOs<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon> <strong>Communication:<\/strong> CISOs need to communicate with their teams and other managers to complete projects. They also need to report on cybersecurity issues in an understandable and meaningful way.<\/li>\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon> <strong>Leadership:<\/strong> CISOs often manage teams of IT professionals, which requires them to adapt their leadership style based on the individual. They also need the skills to oversee projects, budgets, and policy implementation.<\/li>\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon> <strong>Decision-making:<\/strong> CISOs need the ability to absorb complex and often conflicting information to make sound business decisions. Their decisions need to take various factors into consideration and represent the needs of the stakeholders, staff, and consumers.<\/li>\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#1271E4'><\/sonic-icon> <strong>Problem-solving:<\/strong> CISOs encounter many cybersecurity challenges that need to be approached with care and consideration. They need to analyze the problems and come up with effective solutions before the issue grows.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div>\r\n<h3>Key Hard Skills for CISOs<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Business operations:<\/strong> CISOs need to understand how businesses operate and how operations impact cybersecurity. They also need to know how cybersecurity decisions impact operations and how stakeholders prioritize business matters.<\/li>\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Cybersecurity systems:<\/strong> CISOs need cybersecurity system expertise to discuss these matters with managers and stakeholders. They need to know their system capabilities, where the technology is going, and what influence system changes might have.<\/li>\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Security standards:<\/strong> CISOs need to know the security best practices and standards to know how their system and processes measure up. They may also need to know cybersecurity laws and regulations.<\/li>\r\n<li><sonic-icon icon='plus-circle' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <strong>Risk Analysis:<\/strong> CISOs need to analyze business decisions for risk. They need to evaluate and report on how new business and new systems fit in with the cybersecurity systems in place.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/sonic-columns>\r\n\r\n<h3>A Day in the Life of a Chief Information Security Officer<\/h3>\r\n<p>A CISOs responsibilities can vary, but they usually oversee the development and implementation of cybersecurity systems and processes. This may include system architecture, establishing best practices, and creating a backup and recovery plan. They can also develop training programs for organization's staff and system users.<\/p>\r\n<p>CISOs regularly evaluate the system, make changes and upgrades, and report on their findings and progress. They provide cybersecurity insight regarding any business decisions as well.<\/p>\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/day-in-the-life\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about a typical day for a chief information security officer<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"salary\" id=\"salary\"><\/a>\n\n \r\n<h2>CISO Career and Salary Outlook<\/h2>\r\n<p>While the Bureau of Labor Statistics (BLS) does not have a specific category for the CISO career, we can look at related fields to determine the outlook. For example, <a href=\"https:\/\/www.bls.gov\/ooh\/management\/top-executives.htm\" target=\"_blank\" rel=\"noopener\">the BLS<\/a> projects the addition of nearly 200,000 new top executive positions between 2021 and 2031, plus more than 300,000 annual openings.<\/p>\r\n<p>Furthermore, <a href=\"https:\/\/www.bls.gov\/ooh\/management\/computer-and-information-systems-managers.htm\" target=\"_blank\" rel=\"noopener\">the BLS<\/a> projects 16% growth for computer and information systems managers during that same period. The projected 35% for information security analysts make it one of the <a href=\"https:\/\/www.bls.gov\/ooh\/fastest-growing.htm\" target=\"_blank\" rel=\"noopener\">fastest-growing careers<\/a> available. Professionals often access the CISO career by way of these growing fields.<\/p>\r\n<p>Along with the promising demand, top executives and computer leaders enjoy above-average wages. <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Chief_Information_Security_Officer\/Salary\" target=\"_blank\" rel=\"noopener\">According to the Payscale<\/a>, CISOs make average annual salaries of $172,912 as of October 2022. With bonuses and profit sharing, salaries range between $113,000-$275,000.<\/p>\r\n\r\n<sonic-callout theme=\"primary-light\">\r\n    <center>\r\n        <sonic-icon icon='currency-dollar' size='large' color='#1271E4'><\/sonic-icon> \r\n        <hr style=\"background:  #1271E4; border:0; height:1px\" \/>\r\n        <p><strong>$172,912<\/strong><\/p>\r\n        <p>Annual Average Salary<\/p>\r\n        <p>Source: <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Chief_Information_Security_Officer\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale<\/a><\/p>\r\n    <\/center>\r\n<\/sonic-callout>\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/career-and-salary\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">See how location affects salary for chief information security officers<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n<section>\n\t<div class=\"text-center mb-8\">\n\t\t<sonic-tooltip class=\"block text-xs text-center mb-4\" label=\"Learn More About Our Partners\">\n\t\t\t<span>CyberDegrees.org is an advertising-supported site. Featured or trusted partner programs and all school search, finder, or match results are for schools that compensate us. This compensation does not influence our school rankings, resource guides, or other editorially-independent information published on this site.<\/span>\n\t\t<\/sonic-tooltip>\n\t<\/div>\n\t<div class=\"bootcamp-widget rounded bg-white box-border pb-10\">\n\t\t<img decoding=\"async\" loading=\"lazy\" class=\"m-auto -mt-8\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/w_120,h_82,c_fill,f_auto,fl_lossy,q_auto\/v1622734180\/BestColleges.com\/sonic\/icon-click.svg\" width=\"120\" height=\"82\" alt=\"\"\/>\n\t\t<h3 class=\"text-center text-2xl md:text-3xl font-bold mt-8 md:mt-12 mb-2 md:mb-3 px-4\">Match me with a bootcamp.<\/h3>\n\t\t<p class=\"text-center text-base mb-8 px-3\">Find programs with your skills, schedule, and goals in mind.<\/p>\n\t\t<div class=\"text-center w-full\">\n\t\t\t<a href=\"\/discover\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"sonic-btn bg-primary-800 hover:bg-primary-900 focus:bg-primary-900 uppercase mx-auto w-64 font-heading\" data-tracking=\"&#x7B;&quot;log&quot;&#x3A;true,&quot;event&quot;&#x3A;&quot;click&quot;,&quot;beam&quot;&#x3A;&quot;ElementClicked&quot;,&quot;data&quot;&#x3A;&#x7B;&quot;position&quot;&#x3A;&quot;PRIMARY&quot;,&quot;location&quot;&#x3A;&quot;BOOTCAMP&#x20;MATCH&#x20;WIDGET&quot;,&quot;elementType&quot;&#x3A;&quot;LINK&quot;,&quot;text&quot;&#x3A;&quot;MATCH&#x20;ME&#x20;TO&#x20;A&#x20;BOOTCAMP&quot;&#x7D;,&quot;actionOutcome&quot;&#x3A;&quot;INTERNALLINK&quot;&#x7D;\">Match me to a bootcamp<\/a>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"how-to\" id=\"how-to\"><\/a>\n\n \r\n<h2>How to Become a Chief Information Security Officer<\/h2>\r\n<p>Becoming a CISO usually requires a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/\">bachelor's degree at minimum<\/a>, though many top executives have a graduate degree. CISOs also need many years of experience, including IT experience, cybersecurity experience, and management experience. The time investment varies by individual, but CISOs can expect to spend at least 4-6 years in postsecondary education and around 10 years gaining experience.<\/p>\r\n<p>The links below provide more information on <a href=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/how-to-become\">becoming a CISO<\/a> and some of the educational paths available.<\/p>\r\n\r\n\r\n\r\n<ul>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/how-to-become\"><strong>Becoming a Chief Information Security Officer<\/strong><\/a><\/li>\r\n<\/ul>\r\n<ul>\r\n<p>Find out what steps professionals need to take to access the CISO career.<\/p>\r\n<\/ul>\r\n\r\n<ul>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-schools\/\"><strong>Top Cybersecurity Schools and Programs<\/strong><\/a><\/li>\r\n<\/ul>\r\n<ul>\r\n<p>Learn about the leading schools and programs for aspiring cybersecurity professionals.<\/p>\r\n<\/ul>\r\n<ul>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/business-and-technology-concentrations\/best-programs\/\"><strong>Best Business and Technology Programs<\/strong><\/a><\/li>\r\n<\/ul>\r\n<ul>\r\n<p>Check out what the various business and technology programs have to offer.<\/p>\r\n<\/ul>\r\n<ul>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-bachelors-in-information-technology-programs\/\"><strong>Bachelor's Degrees in Information Technology<\/strong><\/a><\/li>\r\n<\/ul>\r\n<ul>\r\n<p>Uncover what a bachelor's in information technology covers and where it can lead.<\/p>\r\n<\/ul>\r\n<ul>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-masters-in-information-assurance-programs\/\"><strong>Master's Degrees in Information Technology<\/strong><\/a><\/li>\r\n<\/ul>\r\n<ul>\r\n<p>Discover what students encounter in an information technology master's program and what the degree does for graduates.<\/p>\r\n<\/ul>\r\n<ul>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/it-management\/best-programs\/\"><strong>Best IT Management Degree Programs<\/strong><\/a><\/li>\r\n<\/ul>\r\n<ul>\r\n<p>Take a closer look at the various IT management degree types and the top programs in the field.<\/p>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>Resources for Chief Information Security Officers<\/h2>\r\n<ul style=\"list-style-type: none; border-left: 3px solid #257F93\">\r\n<li><sonic-icon icon='chevron-double-right' size='small' color='#257F93'><\/sonic-icon> <a href=\"https:\/\/www.eccouncil.org\/\" target=\"_blank\" rel=\"noopener\"><strong>EC-Council<\/strong><\/a><strong>:<\/strong> The EC-Council provides cybersecurity training and professional certification, including the <a href=\"https:\/\/ciso.eccouncil.org\/\" target=\"_blank\" rel=\"noopener\">certified CISO credential<\/a>. Members gain access to the organization's training courses, industry white papers, and expert network.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' size='small' color='#257F93'><\/sonic-icon> <a href=\"https:\/\/www.isaca.org\/\" target=\"_blank\" rel=\"noopener\"><strong>ISACA<\/strong><\/a><strong>:<\/strong> ISACA has more than 150,000 worldwide members, offering lifelong learning and professional development opportunities. The association provides members with industry guidance and best practices, access to research and events, and professional credentials.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' size='small' color='#257F93'><\/sonic-icon> <a href=\"https:\/\/cisoexecnet.com\/\" target=\"_blank\" rel=\"noopener\"><strong>CISO Executive Network<\/strong><\/a><strong>:<\/strong> This professional association connects members from across the world to share ideas and discuss various issues in the field. Members gain access to annual meetings and roundtables and thought leadership from some of the top professionals in the industry.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' size='small' color='#257F93'><\/sonic-icon> <a href=\"https:\/\/www.issa.org\/\" target=\"_blank\" rel=\"noopener\"><strong>Information Systems Security Association International<\/strong><\/a><strong>:<\/strong> ISSA International aims to advance the cybersecurity profession and practice. Members have access to meetings, committees, events, continuing education, and professional development opportunities.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h2>Learn More About Chief Information Security Officers<\/h2>\r\n<sonic-columns columns=\"4\">\r\n\r\n    <sonic-card\r\n    title='How to Become a Chief Information Security Officer'\r\n    link=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/how-to-become\"\r\n    image='https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best,w_600,h_512\/v1668018798\/CyberDegrees.org\/how-to-become-ciso\/how-to-become-ciso.jpg?_i=AA'\r\n    icon='lock-closed'\r\n    >\r\n    <\/sonic-card>\r\n    <sonic-card\r\n    title='Salary and Career Outlook for Chief Information Security Officers'\r\n    link=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/career-and-salary\"\r\n    image='https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best,w_600,h_512\/v1668013133\/CyberDegrees.org\/chief-info-security-officer-career-and-salary\/chief-info-security-officer-career-and-salary.jpg?_i=AA'\r\n    icon='lock-closed'\r\n    >\r\n    <\/sonic-card>\r\n    <sonic-card\r\n    title='Day in the Life of a Chief Information Security Officer'\r\n    link=\"https:\/\/www.cyberdegrees.org\/careers\/chief-information-security-officer-ciso\/day-in-the-life\"\r\n    image='https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best,w_600,h_512\/v1668015969\/CyberDegrees.org\/day-in-the-life-ciso\/day-in-the-life-ciso.jpg?_i=AA'\r\n    icon='lock-closed'\r\n    >\r\n    <\/sonic-card>\r\n\r\n    <sonic-card\r\n    title='A Guide to Cybersecurity Certifications'\r\n    link=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\"\r\n    image='https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/shutterstock_696885817.jpg'\r\n    icon='lock-closed'\r\n    >\r\n    <\/sonic-card>\r\n<\/sonic-columns>\r\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n \r\n<h2>Questions About the Career of a CISO<\/h2>\r\n\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            \r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">What is the difference between a CIO and a CISO?<\/mark><\/h3>\r\n            <p>CIOs take leadership over more general IT issues, whereas CISOs specialize in cybersecurity. As a result, CISOs often report to CIOs. CIOs usually report to the CEO and other C-suite executives.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            \r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">Are chief information security officers in demand?<\/mark><\/h3>\r\n            <p>Yes. Due to the growing impact of cybercrime, more organizations will seek out cybersecurity leaders. In fact, <a href=\"https:\/\/cybersecurityventures.com\/boardroom-cybersecurity-report\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a> predicts the percentage of board members with cybersecurity experience will double by 2025.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n           \r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">Is CISO the highest career level in cybersecurity?<\/mark><\/h3>\r\n            <p>Yes. In most organizations, CISO is the highest attainable title for cybersecurity professionals. CIOs and CTOs may have an impact on cybersecurity and sit higher on the hierarchy, but these roles typically fall in more general IT territory.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            \r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">How many years does it take to become a CISO?<\/mark><\/h3>\r\n            <p>The number of years required for a CISO career depends on the individual. Many employers require candidates to have 7-12 years of experience to be considered for CISO roles.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent-light\">\n    <div class=\"container content\">\n        \r\n<h2>Reviewed by: Monali Mirel Chuatico<\/h2>\r\n<sonic-bio name='Monali Mirel Chuatico'\r\nimage=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/v1631643415\/experts\/Monali_Mirel_Chuatico.png\"\r\ntheme=\"white\">\r\n<div slot=\"contentRight\">\r\n    <p>In 2019, <a href=\"https:\/\/www.linkedin.com\/in\/monali-mirel\/\" target=\"_blank\" rel=\"noopener\">Monali Mirel Chuatico<\/a> graduated with her bachelor's in computer science, which gave her the foundation that she needed to excel in roles such as a data engineer, front-end developer, UX designer, and computer science instructor.<\/p>\r\n    <p>Monali is currently a data engineer at Mission Lane. As a data analytics captain at a nonprofit called <a href=\"https:\/\/coopcareers.org\/\" target=\"_blank\" rel=\"noopener\">COOP Careers<\/a>, Monali helps new grads and young professionals overcome underemployment by teaching them data analytics tools and mentoring them on their professional development journey.<\/p>\r\n    <p>Monali is passionate about implementing creative solutions, building community, advocating for mental health, empowering women, and educating youth. Monali's goal is to gain more experience in her field, expand her skill set, and do meaningful work that will positively impact the world.<\/p>\r\n    <p>Monali Mirel Chuatico is a paid member of the Red Ventures Education Integrity Network.<\/p>\r\n    <p><br \/><i>Page last reviewed<\/i> <i>Oct 24, 2022<\/i><\/p><\/div>\r\n<\/sonic-bio>\r\n\n    <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"Chief information security officers are experts in information management, organizational strategy, and computer technology. Learn more about what a CISO does.","protected":false},"author":5,"featured_media":2175,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[31],"rankings":[],"class_list":["post-125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","jobs-overview-guide"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/125\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2175"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=125"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=125"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=125"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=125"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=125"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}