IDEAS home Printed from https://ideas.repec.org/a/ers/journl/vxxviiy2024i2p35-46.html
   My bibliography  Save this article

Chief Information Security Officer: A Vital Component of Organizational Information Security Management

Author

Listed:
  • Marek Ciekanowski
  • Slawomir Zurawski
  • Zbigniew Ciekanowski
  • Yury Pauliuchuk
  • Artur Czech

Abstract

Purpose: The article aims to identify the role of the Chief Information Security Officer (CISO) in managing information security within an organization. Design/Methodology/Approach: The research problem was formulated as follows: What role does the CISO play in ensuring information security within an organization? To address this research problem, appropriate research methods were employed, such as literature analysis, both domestic and foreign, about information security, ISO 27000 standards, the role of the CISO, and information security threats. This method facilitated understanding existing theories, research frameworks, and practices in the field of information security, as well as the analysis of documents and reports containing current research, data, and information, enabling an understanding of practices and standards applicable in a given organization or sector. Findings: The process of developing, implementing, maintaining, improving, and auditing the quality management system impacts the security level of the organization. Consequently, it serves as a modern tool focused on instilling organizational order in the company, encompassing both the structure and creativity of all employees. Practical implications: The article addresses the topic of information security, emphasizing its significance in today's digital world, where data is a critical asset for organizations, and it focuses on the ISO 27000 standard, which is one of the most important standards related to information security management. It discusses its main assumptions, scope, and benefits resulting from its implementation. Another aspect addressed is the role of the CISO (Chief Information Security Officer) in the organization. The authors analyze the tasks, responsibilities, and expectations placed on the individual fulfilling this role. They explain that the CISO is a key player in ensuring the integrity, confidentiality, and availability of data within the organization, while also being a leader in the field of information security. The article also discusses the threats that CISOs must contend with in their work, encompassing both technical threats and those associated with human factors, such as lack of employee awareness regarding information security or neglect in security policies and procedures. The authors emphasize that the role of the CISO is becoming increasingly strategic in ensuring information security in organizations. Originality/Value: The authors accentuate in this article the fact that organizations must provide adequate support for their CISO and enable access to appropriate resources, including financial and human resources, to effectively fulfill their duties. Furthermore, they emphasize that continued research in the field of information security management is crucial because cyber threats are constantly evolving, and organizations must stay updated with the latest methods and tools for data protection. This research may include new technologies, best practices, risk management, and the development of skills and competencies for information security personnel. Pursuing the continuous improvement of information security processes and strategies will be crucial for maintaining data protection at an appropriate level in a dynamic and changing business environment.

Suggested Citation

  • Marek Ciekanowski & Slawomir Zurawski & Zbigniew Ciekanowski & Yury Pauliuchuk & Artur Czech, 2024. "Chief Information Security Officer: A Vital Component of Organizational Information Security Management," European Research Studies Journal, European Research Studies Journal, vol. 0(2), pages 35-46.
  • Handle: RePEc:ers:journl:v:xxvii:y:2024:i:2:p:35-46
    as

    Download full text from publisher

    File URL: https://ersj.eu/journal/3370/download
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    Information security; CISO; management; organization; ISO 2700 standard.;
    All these keywords.

    JEL classification:

    • D89 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Other
    • M10 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - General
    • M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ers:journl:v:xxvii:y:2024:i:2:p:35-46. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Marios Agiomavritis (email available below). General contact details of provider: https://ersj.eu/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.