The CISO Renaissance How Security Leaders Are Transforming Into Strategic Business Partners

By Staff Writer | Published: March 27, 2025 | Category: Risk Management

CISOs are embracing expanded responsibilities that extend far beyond traditional security functions, becoming integral parts of strategic business leadership.

Introduction

In Esther Shein's recent CSO article, "CISOs Embrace Rise in Prominence With Broader Business Authority," she explores how the role of Chief Information Security Officer has dramatically expanded from a purely technical position to one that encompasses wide-ranging business responsibilities. According to the article, 72% of security decision-makers report their roles have grown to include additional responsibilities over the past year, with 92% experiencing greater engagement with boards of directors. This transformation reflects the recognition that cybersecurity has shifted from a siloed IT concern to a core business priority demanding leadership visibility and strategic alignment.

While Shein's article provides valuable insights into this evolution, it raises important questions about whether this expansion of CISO responsibilities represents progress or potential overreach. Are organizations setting their security leaders up for success with these broadened mandates, or are they diluting security focus by adding too many disparate functions? This response examines the strategic implications of the CISO role expansion, evaluates potential pitfalls, and offers a framework for organizations to effectively structure security leadership in this new paradigm.

The CISO Role Transformation: Analyzing the Core Argument

Shein's central argument posits that CISOs are experiencing a fundamental shift in their organizational positioning, moving from technical specialists to business-oriented risk leaders with broader operational authority. This transformation is characterized by increased board visibility, expanded functional responsibilities, and greater integration with business strategies.

This evolution represents both an opportunity and a challenge for security professionals. The elevation of cybersecurity to a board-level concern properly acknowledges its strategic importance, yet the expansion of responsibilities creates potential for role confusion, burnout, and diluted security focus if not properly managed.

The transformation of the CISO role should be viewed through a critical lens that considers organizational structure, resource allocation, and strategic alignment. Organizations that simply pile additional responsibilities onto already-strained security leaders without corresponding authority, resources, and structural support risk creating a situation where neither security nor these additional functions receive adequate attention.

According to a 2023 study by the Ponemon Institute, 70% of CISOs report experiencing high levels of stress that affect their mental health and job performance. This statistic raises concerns about whether the expanding CISO role is sustainable without corresponding structural changes in how organizations approach security governance.

The article rightly highlights that this evolution brings CISOs into broader business conversations, but it merits deeper examination of whether this expansion is being implemented thoughtfully or haphazardly across different organizations.

Supporting Arguments and Critical Analysis

The Shifting Risk Management Paradigm

One of the article's key supporting arguments centers on CISOs increasingly taking ownership of enterprise risk management (ERM) functions. Daniel Schatz, CISO of Qiagen, describes taking responsibility for enterprise risk management, business continuity, and crisis management areas traditionally separate from security.

This consolidation of risk functions makes logical sense in some respects. Cybersecurity risks are increasingly intertwined with broader business risks, and having a unified approach can improve coordination. However, this arrangement raises important questions about whether CISOs have the necessary training, background, and perspective to lead enterprise-wide risk functions effectively.

Research from Deloitte reveals that only about 40% of CISOs have formal risk management training beyond their technical security backgrounds. This suggests a potential capability gap that organizations must address through professional development, staffing adjustments, or clear delineation of responsibilities.

A more nuanced approach might involve CISOs partnering closely with risk management professionals rather than subsuming these functions entirely. Organizations should carefully assess whether consolidating these functions under security leadership truly enhances their risk posture or potentially introduces new blind spots by concentrating too much authority in one domain.

Business Continuity and Operational Resilience

The article highlights that CISOs like Larry Jarvis of Iron Mountain have expanded their responsibilities to include business continuity planning and operational resilience. This integration acknowledges the reality that cyber incidents often represent the most significant threats to business continuity.

However, effective business continuity management requires a broad understanding of operational dependencies that extend far beyond digital assets. Harvard Business Review research indicates that the most effective business continuity programs maintain dedicated leadership with specialized expertise in this domain, while establishing clear collaboration frameworks with security functions.

Rather than simply adding business continuity to the CISO's portfolio, organizations should consider whether a partnership model might better serve their resilience objectives. This could involve the CISO providing cyber expertise to a dedicated business continuity function, ensuring both disciplines receive the focused attention they require.

Schatz's approach at Qiagen provides an instructive example: after initially being asked to lead business continuity management, he worked with leadership to establish a partnership model where he contributes cyber expertise without assuming full responsibility for the function. This balanced approach recognizes the need for specialized focus while maintaining coordination.

The Convergence of Physical and Digital Security

Another significant thread in Shein's article involves the convergence of physical and digital security domains, particularly in organizations with operational technology environments. Ian Bramson of Black & Veatch describes how security leaders are increasingly responsible for protecting cyber-physical systems in critical infrastructure.

This convergence presents unique challenges, as securing operational technology requires different approaches, priorities, and expertise than traditional IT security. The potential consequences of security failures in these environments extend to physical safety, environmental damage, and critical service disruptions.

Research from Gartner indicates that organizations with integrated physical and cyber security programs report 30% fewer security incidents affecting operational technology environments. However, this integration requires careful organizational design that preserves specialized expertise while enabling coordinated response.

Rather than simply expanding the CISO's responsibilities to include physical security, organizations should consider establishing collaborative governance structures that preserve domain expertise while enabling coordinated risk management. This might involve security councils with representatives from both functions, or clear delineation of responsibilities with formal communication channels.

Artificial Intelligence Governance and Security

Shein's article touches briefly on the emerging responsibility for AI governance falling to security leaders. Tim Dzierzek of Aya Healthcare mentions security's involvement in "data governance and now even AI governance, to really harness artificial intelligence for us and our customers."

This trend reflects the recognition that AI systems present novel security and ethical risks that intersect with traditional security concerns. However, effective AI governance requires multidisciplinary expertise spanning ethics, legal considerations, bias mitigation, and domain-specific knowledge that extends well beyond security.

A 2023 study by the AI Governance Institute found that organizations with the most effective AI governance programs typically distribute responsibility across multiple functions rather than concentrating it within security or any single department. This distributed approach recognizes the multifaceted nature of AI risks and benefits.

Organizations should carefully consider whether making the CISO responsible for AI governance represents the most effective approach, or whether a collaborative model involving multiple stakeholders would better address the complex challenges of responsible AI deployment.

The Stress and Sustainability Question

Perhaps the most concerning aspect of the expanded CISO role involves the potential impact on sustainability and effectiveness. Dzierzek acknowledges experiencing burnout in previous roles, while Schatz describes the expanding responsibilities as "a mixed blessing" that creates increased pressure on time and resources.

A 2023 survey by the International Information System Security Certification Consortium found that the average CISO tenure has decreased to just 2.3 years, with work-related stress cited as the primary factor in early departures. This high turnover undermines security program continuity and effectiveness.

Organizations must honestly assess whether they are setting their security leaders up for success by providing adequate resources, authority, and organizational support commensurate with their expanding responsibilities. Simply adding functions to the CISO role without corresponding adjustments to team size, budget, and organizational positioning creates unsustainable expectations.

Additional Research and Insights

To provide further context for this discussion, I consulted several recent studies and expert analyses on CISO role evolution: