“At least 50% of my week goes into thinking about the future ”
I see that more and more companies across so many sectors are embracing (although perhaps not loving) the CISO role as a critical decision-maker and influencer.
I see that more and more companies across so many sectors are embracing (although perhaps not loving) the CISO role as a critical decision-maker and influencer.
Everyday can be a D-Day for me and I love to celebrate success, no matter how small it is!
First thing I do every day is check email and LinkedIn; normally on the train. I like to get this touch base out of the way before I get into the office so I can map out a plan for my day.
There are privacy issues related to patients data, governmental restrictions and standards required for holding and processing patients data and sovereignty issues if the organisation is multi-national where each nation has different rules and regulations.
Many of the big name organisations have recently boosted their security divisions by securing top ranking IT security heads.
It's hard to describe an average day at IAG. So far no two days have been alike. My days are a combination of setting strategy, making various choices, engaging with my team and colleagues and making things happen.
An average day includes a variety of meetings, project reviews, steering committees, strategy sessions, presentations and briefings.
I try not to settle into predictable routines, but there are a number of tactical priorities I like to address at the start of the day. Things like reviewing threat intelligence, checking over the managed security service dashboard, and checking in with the security team for status updates.
Each day is potentially very different and I expect the work I do day-to-day to change over time. Right now I’m spending time helping the IT team to design security into the foundation of some work we have underway.
Each day is different because of the variety in our work. This can include strategic discussions, solving customer problems, investing in our great people and of course keeping a careful watch on attacks, threats and our cyber activities.