NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
May 23, 2023

CISO Hiring Strategies: Tips for Ensuring a Strong and Secure Future

Justin Fimlaid Justin Fimlaid

Hiring the right Chief Information Security Officer (CISO) can be a daunting task. Without standardized role and responsibility definitions, it’s difficult to identify quality CISO candidates. The challenge is steeper for those who lack familiarity with the security discipline, or struggle to align their security function with broader business objectives. Ultimately, the responsibility for ensuring CISO success lies with the hiring organization. 

Organizations that take the time to define the role, evaluate leadership and advisory skills, and incorporate business alignment into the hiring process are more likely to find a candidate who can successfully lead their security function and align it with business objectives. To avoid common pitfalls in the hiring process, organizations should consider the following strategies: 

1. DO YOUR PREP WORK 

It’s likely that you’re hiring a CISO because your organization lacks the staffing or subject matter expertise you need. For successful senior recruitment, ensure interviewers are prepared and the job description is clear. 

Closely review your existing job description and see if it still applies, or if your security needs have evolved. Check that you’ve included non-technical traits that are essential for CISO success and take the time to imagine and describe the best match for your organization. The right candidate will understand your business and be sensitive to the balance between security and organizational success. Our blog post, Recruiting Your Best Security Partner, offers recommendations to help identify a stand-out security leader who is far more than a well-organized and cybersecurity practitioner. 

2. DON’T OVERLOOK YOUR CURRENT STAFF 

In a job market with hundreds of thousands of open cybersecurity roles, don’t overlook your in-house talent. According to Dark Reading, training employees in new skill sets (i.e., “upskilling”) is a relative bargain for companies seeking to fill skills gaps, compared with the average cost of hiring a new technical employee, which hovers around $32,000.  

"Given the level of risk, cybersecurity hacks are a boardroom conversation across organizations," says Gary Eimerman, CPO at Pluralsight. "Upskilling internally for cybersecurity talent is significantly more cost effective than hiring externally for cybersecurity skills." 

Consider recruiting internally to uncover high-potential team members with strong business acumen and a passion for security. They may already be familiar with your unique business operations and goals. If they possess two-thirds of the requisite skills, and are coachable and eager to grow, you can help them overcome their skills gap and build desired technical and communication capabilities. 

3. DON’T DOWNPLAY THE ROLE OF YOUR CISO 

A common mistake is assuming that someone who knows a lot about security is automatically qualified for the role. Technical expertise is just one aspect of the CISO role; it also requires mentoring, communication, and leadership skills. The recruiting and interview structure must be designed to measure more than technical expertise if you’re going to find the leader you need. 

A CISO's scope is broad, balancing access and ease-of-use with the security of the organization's data, websites, applications, and networks. They act as  a bridge between cybersecurity teams and business managers. Ensure their place in the organizational chart reflects the expected scope of work. If they aren’t part of the executive team, consider an organization change. Giving your CISO a seat at the table as a C-suite partner will give them the holistic view necessary to create those balanced recommendations and effect meaningful change. 

Hiring the right CISO can be taxing but investing in the right person will pay dividends in financial, organizational, and even reputational terms. If you’re looking for a place to start, NuHarbor's job description template provides a solid general description of a security leader that would succeed almost anywhere. Download and customize the description with your company name, the position title, the industry, and role focus. 

For more expert insight and practical tips, catch the video podcast of NuHarbor’s PWNED Episode 167 – Cybersecurity Seat – Half-Full/Half-Empty, Have Patience.  

Included Topics

  • Industry Insights
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Compliance 1 min read
Integrated Risk Management Part 2: Company Strategy Read More
Compliance 2 min read
10 Strategic Security Metrics to Help Manage Your Information Security Program Read More
2 min read
Using Chaos Theory to Guide Strategic Cybersecurity Decisions Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.