This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Chief information security officer" – news ·newspapers ·books ·scholar ·JSTOR(May 2016) (Learn how and when to remove this message) |
Achief information security officer (CISO) is a senior-level executive within anorganization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information andinformation technology (IT) risks, managesinformation security technologies, implements policies, and ensures compliance with regulatory frameworks such as GDPR, PCI DSS and FISMA. The CISO is also usually responsible for information-related compliance (e.g. supervises the implementation to achieveISO/IEC 27001 certification for an entity or a part of it). The CISO is also responsible for protecting proprietary information and assets of the company, including the data of clients and consumers. A CISO may report to achief information officer (CIO) or directly to achief executive officer (CEO).
Having a CISO or an equivalent function in organizations has become standard practice in business, government, and non-profits organizations. CISOs are often in high demand and compensation is comparable to other C-level positions that also hold a similarcorporate title.

The role of chief information security officer developed in the mid-1990s as organizations faced growing digital threats. The first person to hold the title of Chief Information Security Officer was Steven Katz, appointed at Citicorp in 1995 after a major hacking incident.[1] Throughout many years, other large corporations, particularly in the financial-services sector had adopted similar roles such as cybersecurity and data protection, which also became an important part to business risk-management.[2] Early CISO functions often put importance on technical security controls and the responses towards incidents. Over time, the role changed to focusing on enterprise risk, governing, privacy, board level engagement and business needs.[3]
By 2009, approximately 85% of large organizations had a security executive, up from 56% in 2008, and 43% in 2006.[citation needed] In 2018,The Global State of Information Security Survey 2018 (GSISS), a joint survey conducted by CIO, CSO, and PwC,[4][5] concluded that 85% of businesses have a CISO or equivalent.
The United StatesFederal Information Security Modernization Act (FISMA) requires U.S. federal agencies to have a senior information security officer.[6]

Normal CISO responsibilities can include establishing any security policies, reacting to any cyber incidents, tracking identity and access management, regulatory compliance, managing overall information risk, business co-operations, disaster- recovery planning, and leading security operations teams. These responsibilities overlap with business units, IT, legal and finance departments. In modern organizations, the CISO usually play a more strategic role which includes advising executives and boards on cyber risk, merging security investment with enterprise priorities, tracking third party and supply-chain risk, and also tracking the development of the security environment and awareness across the business.
In corporations, the trend is for CISOs to have a strong balance of business acumen and technology knowledge. The CISO may translate cyber performance into measurable business terms, such as value at risk (VaR) breach cost avoidance and incident response maturity.
In general, responsibilities may include:
The role of CISO has broadened to encompass risks found inbusiness processes, information security, customer privacy, and more. As a result, there is a trend now to no longer embed the CISO function within the IT group. In 2019, only 24% of CISOs report to achief information officer (CIO), while 40% report directly to achief executive officer (CEO), and 27% bypass the CEO and report to the board of directors. Embedding the CISO function under the reporting structure of the CIO is considered suboptimal, because there is a potential for conflicts of interest and because the responsibilities of the role extend beyond the nature of responsibilities of the IT group. The reporting structure for the CISO can vary depending on the organization’s size, industry, regulatory environment, and risk profile. However, the importance of information security in today’s businesses has raised the CISO’s role to become a senior-level position.[7]
Many CISOs reported to the Chief Information Officer (CIO), however since the late 2010's organizations have increasingly changed the role to report directly to seniors in the management. A survey in 2020 found that only 34% of these roles reported straight to the CEO, while 33% reported to a CIO.[8] Organizations with revenues under $100 million were less likely to have multiple advanced roles like CISO in comparison to bigger entities.[9] According to the 2024 global survey of 416 CISOs, different reporting lines and models show an increase in complex governance, but the overall trend towards direct board or CEO access remains clear.[10] The change to direct reporting has mainly been led by issues regarding conflict of interest if the CISO is included in IT operations, and by the requirement for independent management of the enterprise.
CISOs usually have more than ten years of prior experience in information security or IT governance and often have professional certifications. A typical CISO holds non-technical certifications (likeCISSP andCISM), although a CISO coming from a technical background will have an expanded technical skillset. As the role changed over time, CISO's were usually not only expected to understand technical controls but also understand cyber-risk into business language and influence decision making in senior management. Steven Katz had stated that the role is about business risk and cybersecurity is a way to assess business risk, "not an end in itself".[11] Key skills were now about organizational leadership, strategic thinking, communication with boards, budget management, vendor relations, business processes, regulatory overview, and the ability to merge security outcomes with business needs. Other typical training includes project management to manage the information security program, financial management (e.g. holding an accredited MBA) to manage infosec budgets, and soft-skills to direct heterogeneous teams of information security managers, directors of information security, security analysts, security engineers and technology risk managers. Recently, given the involvement of CISO with Privacy matters, certifications likeCIPP are highly requested.
In the United States, median compensation was CISOs was around $500,000 in 2024, and the high percentile earning executives, especially with larger companies, can be over $1 million annually.[12] A 2025 survey showed that the average salary was around $700,000 for big organizations but only around 60% were happy with their security budget and board.[13]
A recent development in this area is the emergence of "Virtual" CISOs (vCISO, also called "Fractional CISO").[14][15] These CISOs work on a shared or fractional basis, for organizations that may not be large enough to support a full-time executive CISO, or that may wish to, for a variety of reasons, have a specialized external executive performing this role. vCISOs typically perform similar functions to traditional CISOs, and may also function as an "interim" CISO while a company normally employing a traditional CISO is searching for a replacement.[16] These services typically include developing cybersecurity strategy, advising on cyber risk, checking on compliance and helping internal security teams. vCISOs have grown in popularity among small and mid sized enterprises who want better leadership without the cost of a full time CISO.[17]
Key areas that vCISOs can support an organization include: advising on addressing cyber risk; coaching management team members to improve security expertise; evaluating and selecting vendor products and services; assessing the maturity of engineering team processes, capability and skills; board and management team briefings and updates; and planning and review of operating and capital budgets related to cybersecurity. This includes identifying and prioritizing cybersecurity investments, developing cost-effective strategies for cybersecurity, and ensuring that adequate resources are allocated to address cybersecurity risks.