<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Are C-suite Executives our greatest risk? in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/85005#M1415</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1610895209"&gt;@vishybear&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/253792811"&gt;@nkeaton&lt;/a&gt;&amp;nbsp; &amp;nbsp;Here in New Zealand and within other countries CEO's and Directors are directly responsible for the financial fiduciary "&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;A fiduciary is &lt;STRONG&gt;a professional who manages money or property for other parties and has a legal duty to act only in their client's best interests.&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;Including that of the organisation they manage etc.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;CEO's and Directors can be prosecuted under the Companies Act&amp;nbsp; -&amp;nbsp;&lt;A href="https://www.legislation.govt.nz/act/public/1993/0105/latest/DLM319570.html" target="_blank" rel="noopener"&gt;https://www.legislation.govt.nz/act/public/1993/0105/latest/DLM319570.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;I assume most countries will have similar regulations and laws.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Oct 2025 21:16:00 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2025-10-23T21:16:00Z</dc:date>
    <item>
      <title>Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53099#M733</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to a PWC report, the C-Suite Executives are the greatest risk?&amp;nbsp; What do you think?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you concur or do you have another perspective?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityboulevard.com/2022/08/pwc-survey-finds-c-level-execs-view-cybersecurity-as-biggest-risk/" target="_blank"&gt;https://securityboulevard.com/2022/08/pwc-survey-finds-c-level-execs-view-cybersecurity-as-biggest-risk/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:18:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53099#M733</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:18:05Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53105#M734</link>
      <description>&lt;P&gt;This quote from the article says it all:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"The cybersecurity team also often takes the blame for a breach when in fact the root cause is usually traced back to a user that disregarded one cybersecurity policy or another. Sadly, that end user often turns out to be a C-level executive that should have known better."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In reality, C-level executives may not always know better. It is often the layer of management below them that is not fully comprehending the gravity of allowing vulnerabilities in production systems and allowing exceptions to policies. And it gets worst, hackers know the odds are that a new release has an approval to go live with vulnerabilities, yes people that happens. There is a lot of application technical debt out there just waiting to be discovered.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 01:41:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53105#M734</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2022-09-06T01:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53106#M735</link>
      <description>&lt;P&gt;I once had a Sr. VP click on the attachment in an email entitled "ILOVEYOU".&amp;nbsp; When asked if they knew the sender, the reply was "NO, I was just curious:"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Totally agree that middle management are sometimes put corporations at risk more than the C-Suite.&amp;nbsp; C-Suite become involved after a breach and typically open the wallet for security spending.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 02:10:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53106#M735</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2022-09-06T02:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53108#M736</link>
      <description>&lt;P&gt;It seems much of the article is trying to say the C-suite is now taking security seriously. But I think the larger point is still being missed. Security is a cultural thing, and it can take years to change corporate culture. But if the problem is the C-suite hasn't prioritized security, the other half of the equation is the security folks haven't done a good job either getting that message across or moving into senior management roles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, I think senior management generally is getting the idea or willing to listen now. There's still work to do, but where I see the biggest risk or gap is with young employees. They come into the workplace with certain bad habits and expectations. Maybe 10 or 20 years ago, there was a need to integrate information security into business school. Today, it has to be done at the elementary schools.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 03:54:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53108#M736</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2022-09-06T03:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53109#M737</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps, this is where AI fits in, indicating to a C-Suite member, that potentially if you chose this decision, it will have the following consequences or did you know, if you take this particular route, you open up a whole heap of pain for yourself, the organisation and potentially a technical debt, which will keep you spending X number of dollars for the x number of years etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They need to understand the consequences of their decisions, hindsight is not good enough these days, we need to predict the actual reality from the existing lessons learnt everyday by a lot of organisations and practitioners.&amp;nbsp; We need to commence gathering this data, and using to protect and educate our C-Suite to understand risks associated with their decisions, before they are allowed to throw the big switch to actually make it happen.&amp;nbsp; Scenario based cybersecurity played out, before they are allowed to make that decision.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rather like Tanker captains put in a miniature ship, within a canal, and taught real live scenarios and to learn the consequences of running aground for instance - I know it does not quite match, but you get my drift.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 04:31:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53109#M737</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-09-06T04:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53117#M738</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;Perhaps, this is where AI fits in, indicating to a C-Suite member, that potentially if you chose this decision, it will have the following consequences or did you know, if you take this particular route, you open up a whole heap of pain for yourself, the organisation and potentially a technical debt, which will keep you spending X number of dollars for the x number of years etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;But isn't this the dilemma/challenge? People want an app to think for them. We live in an age of TL;DR - "It's your fault that I am too lazy to read." It's this sense of intellectual entitlement that has led to a willing suspension of common sense. We have conditioned people to follow the crowd or download the app rather than to think. It's not that people are incapable of understanding risk. They just choose not to, and I see that problem prevalent throughout the workforce, not just at the c-suite level.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 12:51:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/53117#M738</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2022-09-06T12:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/54704#M756</link>
      <description>&lt;P&gt;And think about how attackers shift their attacks to avoid the latest security thing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I am a burglar I try to break into your house. The battle usually goes like this:&lt;/P&gt;&lt;P&gt;Bad guy (BG): Try the door handle. Finds it unlocked, goes in and steals something.&lt;/P&gt;&lt;P&gt;Home Owner (HO). Installs locking door handles.&lt;/P&gt;&lt;P&gt;BG: Tries handle and finds it is locked. Breaks Window, goes in and steals something.&lt;/P&gt;&lt;P&gt;HO: Repairs glass. Installs surveillance system with glass detection sensors.&lt;/P&gt;&lt;P&gt;BG: Gets a ladder and breaks in through second story window.&lt;/P&gt;&lt;P&gt;HO: Puts sensors on all windows and doors. Gets a dog.&lt;/P&gt;&lt;P&gt;BG. Stakes out your house and learns the security code. Brings a pack of meat. Goes in and steals something.&lt;/P&gt;&lt;P&gt;HO: Puts up a sign that their neighbors house doesn't have locks.&lt;/P&gt;&lt;P&gt;If we shift the responsibility to an Artificial Intelligence (AI) method, a motivated attacker will just change their methodology and attack the new thing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attacking the psychology behind the attacks. In our latest phishing test I asked all of the clickers to respond to me on "why" they clicked and it breaks down into roughly 5 psychological areas of attack:&lt;/P&gt;&lt;P&gt;1) Trust - Fooled by a logo or something else they have been taught to trust.&lt;/P&gt;&lt;P&gt;2) Inattentive - Just weren't paying attention&lt;/P&gt;&lt;P&gt;3) Panic - Account lock out, fake charges to their account, a login from Russia, etc.&lt;/P&gt;&lt;P&gt;4) Irresponsible - Mixed personal use with business use&lt;/P&gt;&lt;P&gt;5) Wall of shame - Lying - They lied to me about the reason they clicked. i.e. The dog jumped on my arm while I was just about to delete it. I was about to delete it and I sneezed, etc. They hide behind the "wall of shame" because they don't want to admit that they were fooled.&lt;/P&gt;&lt;P&gt;I can create awareness campaigns around those to reduce our click rate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the C-Suite needs to understand the psychology of the attackers and how they prey on our user's psychological weaknesses and allow us CISO's and Information Security folks to use that knowledge to help protect our environments.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 15:14:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/54704#M756</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2022-10-28T15:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/59989#M890</link>
      <description>&lt;P&gt;The article is about how C-Suite Executives view cybersecurity as the greatest risk to their organizations. I, for one, am delighted to see that upper management 'gets it.' Information Assurance\cybersecurity used to be 'tacked on' at the end of setting up a company, pasted on instead of baked INTO the company.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do encourage our colleagues to read the article.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doctor J.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 01:37:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/59989#M890</guid>
      <dc:creator>jbuitron</dc:creator>
      <dc:date>2023-06-14T01:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/60284#M898</link>
      <description>&lt;P&gt;If we take the context of PWC in Australia - then it seems PWC presented the greatest risk...:)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.msn.com/en-us/money/companies/why-pwc-is-selling-part-of-its-business-in-australia-for-less-than-1/ar-AA1d2Eeh" target="_blank"&gt;Why PwC is selling part of its business in Australia for less than $1 (msn.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 16:30:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/60284#M898</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2023-06-26T16:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/81372#M1324</link>
      <description>&lt;P&gt;coming late to this as it's a 2022 topic,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in 2025 there are 2 sets of people I wouldn't give a laptop to until they could prove they can be trusted...C-Suite &amp;amp; Developers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're all used to directors leaving laptops on trains with their password on a post it note pasted to it. Usually the day after they've got a replacement one after losing their previous one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, these days, DevOps, Developers are multiples more dangerous. They all want admin or similar rights, randomly create accounts or download random libraries from Github or PyPi with no oversight. These days Visual Studio Code plugins are an attack vector. In a previous job, we refused to let ANYONE install these on the VDI the offshore teams were using without justification from their managers. I would extend this to libraries and Github repositories and FOSS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chatbots now as well extends this to normal users too. Automated Agents.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2025 14:40:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/81372#M1324</guid>
      <dc:creator>vishybear</dc:creator>
      <dc:date>2025-06-12T14:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84630#M1375</link>
      <description>&lt;P&gt;C-suite executives have wide access to sensitive data, make high-impact decisions, and are frequent targets for phishing or social engineering. That makes them a significant insider risk if they are careless, misinformed, or compromised.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2025 21:46:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84630#M1375</guid>
      <dc:creator>mrsimon0007</dc:creator>
      <dc:date>2025-10-11T21:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84635#M1376</link>
      <description>i remember as a desktop support guy... it was ALWAYS directors who'd leave laptops on the train&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from my iPhone</description>
      <pubDate>Sun, 12 Oct 2025 12:26:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84635#M1376</guid>
      <dc:creator>vishybear</dc:creator>
      <dc:date>2025-10-12T12:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84658#M1377</link>
      <description>&lt;P&gt;This is why one implements automated group policy mechanisms to encrypt hard drives, enforce screen locks, use MFA when possible, and to enable remote-wipe-and-report.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, buy them an Airtag to keep in their laptop bag.&amp;nbsp; Might cause their phone to beep while there is still time to go back for it.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2025 01:39:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84658#M1377</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-10-13T01:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84698#M1379</link>
      <description>&lt;P&gt;Absolutely, that is combined with our technicians/technology specialists.&amp;nbsp; If I may explain.&amp;nbsp; According to the governing bodies (IEEE/ACM, INCOSE, ISO, etc), cyber is the combination of the people, processes, and technology.&amp;nbsp; Combined this becomes a socio-technical system (or STS).&amp;nbsp; Much of leadership came from a single technology or field - this skews the leader into believing their "flavor" is the single cybersecurity "flavor" - this month it is "AI", it has been "secure software", "IT based security", "IS based security" etc.&amp;nbsp; I have been told multiple times I cannot fill a "C" suite role as I can explain threats so other org leaders can understand what is going on.&amp;nbsp; This terrifies me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When leadership neither reads nor understands the whole picture, they handicap their own organization (people), their processes, and hinder their technology.&amp;nbsp; Worse their actions can impose the actions onto business affiliates tied to them (think third party risk) their actions not only expose themselves and their organizations, but anyone doing business with them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently, I am working on job crafting research, oddly multiple vendors (two of the big ones) are still saying Cyber is a sub component of Information Technology, Computer Science, Computer Engineering, Software Engineering, Data Science, or even Information Systems.&amp;nbsp; Information Systems is probably the closest to being correct (as it should have an integrated STS).&amp;nbsp; If your certification body is antiquated and out of touch with reality, how can you be anything but?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I realize this isn't just about cybersecurity but all "C" suite folks, if their decision making processes are antiquated because those teaching them are antiquated (think tenure faculty who have not updated their "general knowledge" but only conducted specialized "research" they want to deal with).&amp;nbsp; This is job crafting, it is how we broke up our departments to begin with - do what you are good at, let others deal with what you are not good at.&amp;nbsp; Those who are good at our weaknesses, often hate what we are good at.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a side note, several certification bodies went on to say they are only responsible for "digital"components, not responsible for end-users, end-user actions, or the processes of the organization.&amp;nbsp; Essentially, when we look at breaches, we recognize breaches occur in the people, processes, or technology - essentially finding the weakest of the STS countermeasure components.&amp;nbsp; Certifying bodies who deny the people or processes are saying it is someone else's job - but definitely not theirs. I cannot respect any cybersecurity certifying body that says "it's someone else's problem".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We as professionals are responsible for our working organizations, we can vote our profession (by membership), by researching, and by refusing to be part of organizations that refuse to update their philosophies or be responsible for their professionals.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2025 00:52:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84698#M1379</guid>
      <dc:creator>ervinfrenzel</dc:creator>
      <dc:date>2025-10-14T00:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84705#M1380</link>
      <description>There is a MASSIVE issue in the tech industry across the whole board that refuse to acknowledge that humans exist.&lt;BR /&gt;&lt;BR /&gt;Everyone has processes, ‘good practices’, standards, etc etc yet are STLL surprised when a user will do something because it makes their job easier to do. Or Directors that insist on letting their kids use Minecraft on their work laptops. I’ve even worked in a place where we provided IT support to a directors wife and kids.&lt;BR /&gt;&lt;BR /&gt;Every department in organisations is understaffed now, outsourcing, offshoring make things even harder. Yet for some reason, saying to the Directors or the C-Suite..”YOU decided to stick this Helpdesk offshore and YOU decided to make our IT support work out of the same office builds and sound identical to the scammers that call our users everyday. How come it’s suddenly OUR problem” is seen as something that isn’t done. (Unless it’s me)&lt;BR /&gt;&lt;BR /&gt;I think training needs to be directed toward the technical resource on how to understand humans as much as it’s needed for staff to understand how to recognise a phishing email.&lt;BR /&gt;&lt;BR /&gt;There’s been too much STEM STEM STEM recently and not enough concentration on looking at the soft skills, psychology, basic human nature and how to talk to people.</description>
      <pubDate>Tue, 14 Oct 2025 12:46:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84705#M1380</guid>
      <dc:creator>vishybear</dc:creator>
      <dc:date>2025-10-14T12:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84706#M1381</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1610895209"&gt;@vishybear&lt;/a&gt;&amp;nbsp; &amp;nbsp;We have been emphasizing STEAM for years because of that soft skills component.&amp;nbsp; You are correct that they need those very human interaction skills.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2025 13:25:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84706#M1381</guid>
      <dc:creator>nkeaton</dc:creator>
      <dc:date>2025-10-14T13:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84794#M1384</link>
      <description>&lt;P&gt;It grates on my nerves, like fingernails on a chalkboard . . every time I see the phrase "IT Security." The 'information technololgy' portion of 'security' is only a percentage of the entirety.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And, you mentioned how cyber professionals like CISOs are continually placed 'under' authorities like the CFO, the COO, the CEO, ad infinitum, ad nauseum . .&amp;nbsp; &amp;nbsp;I found a paper by Rebecca Herold that clearly states (and logically so) how the CISO should/must be independent and not have their authority hamstrung or shackled. (Now, I need to scan that work into my PC) . . or find a copy online.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;keep thinking . . it may be a dangerous occupation, yet it is Now needed in cyber More than Ever,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dr. Jan, DCS&lt;/P&gt;&lt;P&gt;(aspiring CISO)&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 00:35:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84794#M1384</guid>
      <dc:creator>jbuitron</dc:creator>
      <dc:date>2025-10-17T00:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84800#M1385</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/986863095"&gt;@jbuitron&lt;/a&gt;&amp;nbsp;agree with you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most do not see the entire picture and many think it is an IT issue.&amp;nbsp; WRONG for so many reasons.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have always found it amazing that Audit gets a seat with the Board but not Security.&amp;nbsp; I suppose that comes from external Auditors pounding on tables and pointing to deficiencies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you find Rebecca's paper, would love to read it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 09:54:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84800#M1385</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2025-10-17T09:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84810#M1386</link>
      <description>&lt;P&gt;Hi dcontesti,&lt;/P&gt;&lt;P&gt;Rebecca Herold's work on Organization and Roles is within this edition of the Information Security Handbook available online at:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ic.unicamp.br/~rdahab/cursos/inf712/repositorio/ISMHandbook_toc.pdf" target="_blank"&gt;https://www.ic.unicamp.br/~rdahab/cursos/inf712/repositorio/ISMHandbook_toc.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a copy of the .pdf attached. Please keep in mind that cybersecurity/Information Security papers regarding structure and operations that do not 'get old' like Microsoft Windows '95 does. Great Work is always Great work!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This ISC2 site won't allow me to upload the .pdf with just the article in it. Nevertheless, it is in the handbook at the link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This was the first paper that I found when I was starting the Norwich U., MSIA in 2008. It STILL RINGS TRUE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dr. Jan F-B., DCS&lt;/P&gt;&lt;P&gt;CISSP, C-CISO&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 13:14:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84810#M1386</guid>
      <dc:creator>jbuitron</dc:creator>
      <dc:date>2025-10-17T13:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Are C-suite Executives our greatest risk?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84813#M1387</link>
      <description>&lt;P&gt;Ok, So let's recognize we are talking about two separate types of security - IT Security is just that security that deals with IT I'm including a pic to assist.&amp;nbsp; The reason it is important to recognize is that ISACA and such state Cyber is a sub-component of IT Security which is a sub-component of IT which is an enabler for the business.&amp;nbsp; Effectively we are fighting the colleges of business on this one (which I am totally good for).&amp;nbsp; I realize we are not ISACA, but many of the leaders in business have subscribed to those philosophies and ones like them.&amp;nbsp; When I wrote my exegesis - I spelled these out.&amp;nbsp; Since then I have simply created a chart to help folks (mostly students) understand - there is a place within business for IT security, and IS security, and secure software development - but this fight has been going on for some time.&amp;nbsp; We have to recognize that IT absorbed IS, or most of its functions in the early 2000's - and the terminology IT now means something different to business than it does to technologists.&amp;nbsp; In business it means all of the technologies used to regulate their organizational technology - effectively everything.&amp;nbsp; In technology it is the hardware and software used by technologist to keep the organization going..&amp;nbsp; It's a subtle difference, but one just the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ervinfrenzel_0-1760708124451.png" style="width: 400px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/10267iA6553DF5C9CA41FB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ervinfrenzel_0-1760708124451.png" alt="ervinfrenzel_0-1760708124451.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember if we want to properly address the problem, we need to address it properly.&amp;nbsp; We need to recognize that all of us are not cyber practitioners.&amp;nbsp; Some are technology specialist (which are as important if not more so at times), some are people specialists, some are process specialists.&amp;nbsp; Bottom line is cyber is not an individual sport, it is a team event - it takes everyone together to make it happen.&amp;nbsp; From the listing above, all of the components are necessary to create a defense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At least if they are referring to it as "IT Security" and they understand it from the technologist point of view, we have hope to educate them about other securities and make an organizational change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ervin Frenzel, PhD&lt;/P&gt;&lt;P&gt;Cybersecurity Leadership&lt;/P&gt;&lt;P&gt;CEI, CCISO, CISSP-ISSAP, CISSP-ISSMP, ECSA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 13:51:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Are-C-suite-Executives-our-greatest-risk/m-p/84813#M1387</guid>
      <dc:creator>ervinfrenzel</dc:creator>
      <dc:date>2025-10-17T13:51:52Z</dc:date>
    </item>
  </channel>
</rss>

