NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
June 14, 2018

Organizational structure's impact on information security

Jeffrey Bamberger Jeffrey Bamberger

If you’re a member of your organization’s executive team, then you’re likely well-versed in various information security responsibilities, either by choice or by regulation. If you work for a private sector organization, then responsibilities likely include choosing a framework to align your information security program with. One such framework may be the National Institute of Standards and Technology’s (NIST) Special Publication 800-53. NIST 800-53 is just one of many standards and guidelines published by NIST to assist federal agencies in implementing the Federal Information Security Act of 2002 (FISMA). As a private sector organization, you have the freedom of choice.

There’s plenty of evidence throughout the private sector indicating that organizations prefer to align their information security programs with NIST 800-53 controls. While this increases the likelihood that businesses operate in a controlled manner with a focus on the confidentiality, integrity, and availability of data, it also presents challenges to the executive team. Will your organization have a structure that allows for efficient and effective implementation of controls? Will your organization be configured in such a way to support desired risk management and security efforts?

Management Information Security Reporting Structure

How your information security team’s reporting chain is configured can influence your information security efforts. In many organizations, there’s a Chief Information Security Officer (CISO) who may be responsible for establishing and maintaining the organization’s vision, strategy, and protecting the organization’s assets, including data and technology. The CISO often reports to the Chief Information Officer (CIO) who may be primarily responsible for the development of the information security program. This structure is often not recommended as it can complicate separation of duties.

In addition, not every organization is the same and structure can vary widely from industry to industry and from company to company. For instance, in small entrepreneurial organizations, executive personnel are often fewer in number and may wear many hats. As a result, some organizations operate without a CIO and have the CISO report directly to the Chief Financial Officer (CFO). There can be significant risk in doing this. The CFO’s typical focus is on maintaining a “reasonable” budget rather than meeting the needs of the information security program. Both goals are important, but if the CFO doesn’t communicate regularly with the CISO and isn’t sufficiently made aware of the needs of the security function, funding will unquestionably be inadequate, making alignment with frameworks such as 800-53 extremely difficult.

Organizational Culture

How your organization is configured, and the resulting culture, can also have a significant effect on your efforts to align with 800-53 and other information security frameworks. Culture also plays an important role in the identity of your organization. It may be very important to you to provide and promote a positive culture for your staff to help maintain overall employee satisfaction. It’s increasingly popular to structure an organization with a “culture of openness.” However, adversaries often prey upon organizations that are known to have a culture of openness.

Colleges, universities, and other entities involved with research and development are often targets for social engineering, spoofing, phishing, and other email-based malware campaigns. Squelching an organization’s open culture for the sake of security would hinder the company. Rather, you should ensure you understand the associated risks and act accordingly to ensure you can simultaneously support both the desired culture and your information security and risk management programs.

Final Thoughts

Building and maintaining a robust information security program is no small task. If you’re a private sector company that has chosen to align with NIST 800-53, for example, your efforts may include ensuring the operating effectiveness of anywhere from 100+ to 300+ controls. Implementing any one control may not tax your organization’s resources whereas addressing a large number of controls will.

Efficiently structuring your culture to allow it to flourish will have a significant positive effect on your overall information security effort. But you shouldn’t fret if your program isn’t at your target maturity level. It takes time, effort, dedication, and a positive tone that is allowed to permeate throughout the entire organization. As playwright John Heywood was attributed with saying, “Rome wasn’t built in a day, but they were laying bricks every hour.”

Interested in a security program review? Check out our services page for more information: https://nuharborsecurity.com/security-program-reviews/.

Interested in an 800-53 security assessment? Check out our services page for more information: https://nuharborsecurity.com/fisma-compliance.

Included Topics

  • Compliance,
  • Industry Insights
Jeffrey Bamberger
Jeffrey Bamberger

Jeffrey Bamberger is the Principal Advisor for Information Assurance at NuHarbor Security. Jeff brings over 30 years in cybersecurity and information technology experience, focusing on consulting, risk management, compliance, and audit. Jeff's broad consulting experiences include cyber risk/threat management and assessment, information security control assessments, payment card industry (PCI) compliance, social engineering and physical security, privacy, vendor management, and Sarbanes-Oxley compliance. A graduate of the F.W. Olin Graduate School of Business at Babson College, he holds a Master of Business Administration degree. Jeff also has a Bachelor of Arts in Computer Science and Religion from Colgate University. He is a current member of the New England Chapter of the Information Systems Audit and Control Association and holds both a CISA and CISM certification.

Related Posts

Compliance 3 min read
NIST 800-53 Security Assessment Process Read More
Compliance 4 min read
Which Security Controls Framework Is Right for You? Read More
Compliance 3 min read
Meet Knox: NuHarbor Security’s Certification Program Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.