22:
690:
143:
Through other internal policy committees, personnel and/or other external resources, coordinates and implements site security, operations, and activities to ensure protection of executives, managers, employees, customers, stakeholders, visitors, etc., as well as all physical and information assets,
121:
Directs staff in identifying, developing, implementing, and maintaining security processes, practices, and policies throughout the organization to reduce risks, respond to incidents, and limit exposure and liability in all areas of information, financial, physical, personal, and reputational
132:
Researches and deploys state-of-the-art technology solutions and innovative security management techniques to safeguard the organization’s personnel and assets, including intellectual property and trade secrets. Establishes appropriate standards and associated risk
117:
In cooperation with the organization’s executive leadership team(s), directs the development of an effective strategy to assess and mitigate risk (foreign and domestic), manage crises and incidents, maintain continuity of operations, and safeguard the
148:
Digital or cyber security, sometimes referred to as IT security, does have a cooperative inter-connected involvement. Some organizations have combined various elements of security programs within the "
140:(and international counterparts) to include in-country security (and international security agencies), intelligence, and other relevant governmental functions as well as private sector counterparts .
125:
Ensures the organization’s compliance with the local, national, and international regulatory environments where applicable to the accountability of this role (i.e. privacy,
152:" (CISO) function. IT security typically addresses security-related risk issues across all layers of an organization's technology stack. This may include:
51:
654:
258:
756:
727:
401:
149:
102:
accountable for the development and oversight of policies and programs intended for the mitigation and/or reduction of
73:
44:
751:
761:
577:
251:
159:
391:
216:
511:
286:
572:
476:
441:
281:
210:
766:
746:
461:
396:
244:
34:
516:
491:
446:
411:
406:
371:
331:
326:
321:
301:
192:
38:
30:
521:
501:
451:
431:
416:
386:
376:
366:
361:
291:
701:
720:
649:
567:
506:
471:
421:
341:
311:
55:
106:
strategies relating to the protection of people, intellectual assets and tangible property.
481:
466:
456:
436:
356:
336:
316:
296:
180:
644:
552:
381:
351:
8:
306:
126:
639:
562:
486:
346:
713:
669:
664:
659:
547:
526:
188:
99:
618:
608:
603:
557:
426:
267:
174:
137:
697:
582:
222:
110:
740:
104:
compliance, operational, strategic, financial and reputational security risk
689:
542:
95:
623:
613:
598:
233:
Chief
Security Officer - An Organizational Model, ANSI/ASIS CSO.1-2013
236:
103:
168:
217:
ASIS International
Releases CSO American National Standard -
696:
This job-, occupation-, or vocation-related article is a
113:
of the CSO include, but are not necessarily limited to:
144:
while ensuring optimal use of personnel and equipment.
136:
Develops relationships with high-level officials in
185:Organizational resiliency programs and assessments
738:
215:ASIS International releases CSO ANSI Standard -
43:but its sources remain unclear because it lacks
721:
252:
728:
714:
655:List of business and finance abbreviations
259:
245:
74:Learn how and when to remove this message
129:, and environmental, health and safety).
156:Emerging Technologies and Market Trends
739:
240:
684:
266:
15:
13:
150:chief information security officer
14:
778:
688:
20:
757:Protective service occupations
223:"Chief Security Officer - CSO"
164:Incident and crisis management
160:Identity and access management
1:
198:
700:. You can help Knowledge by
7:
10:
783:
683:
203:
632:
591:
535:
274:
177:and compliance management
193:vulnerability management
29:This article includes a
752:Chief security officers
578:Representative director
58:more precise citations.
762:Management occupations
650:Executive compensation
568:Non-executive director
211:Chief Security Officer
88:chief security officer
181:Security architecture
645:Corporate governance
592:Mid-level executives
553:Development director
402:Information security
191:, intelligence and
640:Board of directors
563:Executive director
31:list of references
709:
708:
678:
677:
670:Talent management
665:Supervisory board
660:Senior management
548:Creative director
536:Senior executives
84:
83:
76:
774:
767:Occupation stubs
747:Corporate titles
730:
723:
716:
692:
685:
268:Corporate titles
261:
254:
247:
238:
237:
230:
227:investopedia.com
167:Information and
111:accountabilities
79:
72:
68:
65:
59:
54:this article by
45:inline citations
24:
23:
16:
782:
781:
777:
776:
775:
773:
772:
771:
737:
736:
735:
734:
681:
679:
674:
628:
619:Product manager
609:Account manager
604:General manager
587:
558:General counsel
531:
392:Human resources
270:
265:
221:
209:CSO Standard -
206:
201:
138:law enforcement
127:data protection
80:
69:
63:
60:
49:
35:related reading
25:
21:
12:
11:
5:
780:
770:
769:
764:
759:
754:
749:
733:
732:
725:
718:
710:
707:
706:
693:
676:
675:
673:
672:
667:
662:
657:
652:
647:
642:
636:
634:
633:Related topics
630:
629:
627:
626:
621:
616:
611:
606:
601:
595:
593:
589:
588:
586:
585:
583:Vice president
580:
575:
570:
565:
560:
555:
550:
545:
539:
537:
533:
532:
530:
529:
524:
519:
514:
512:Sustainability
509:
504:
499:
494:
489:
484:
479:
474:
469:
464:
459:
454:
449:
444:
439:
434:
429:
424:
419:
414:
409:
404:
399:
394:
389:
384:
379:
374:
369:
364:
359:
354:
349:
344:
339:
334:
329:
327:Communications
324:
319:
314:
309:
304:
299:
294:
289:
287:Administrative
284:
278:
276:
275:Chief officers
272:
271:
264:
263:
256:
249:
241:
235:
234:
231:
219:
213:
205:
202:
200:
197:
196:
195:
186:
183:
178:
172:
165:
162:
157:
146:
145:
141:
134:
130:
123:
119:
96:organization's
82:
81:
39:external links
28:
26:
19:
9:
6:
4:
3:
2:
779:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
744:
742:
731:
726:
724:
719:
717:
712:
711:
705:
703:
699:
694:
691:
687:
686:
682:
671:
668:
666:
663:
661:
658:
656:
653:
651:
648:
646:
643:
641:
638:
637:
635:
631:
625:
622:
620:
617:
615:
612:
610:
607:
605:
602:
600:
597:
596:
594:
590:
584:
581:
579:
576:
574:
571:
569:
566:
564:
561:
559:
556:
554:
551:
549:
546:
544:
541:
540:
538:
534:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
493:
490:
488:
485:
483:
480:
478:
477:Restructuring
475:
473:
470:
468:
465:
463:
460:
458:
455:
453:
450:
448:
445:
443:
442:Merchandising
440:
438:
435:
433:
430:
428:
425:
423:
420:
418:
415:
413:
410:
408:
405:
403:
400:
398:
395:
393:
390:
388:
385:
383:
380:
378:
375:
373:
370:
368:
365:
363:
360:
358:
355:
353:
350:
348:
345:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
313:
310:
308:
305:
303:
300:
298:
295:
293:
290:
288:
285:
283:
282:Accessibility
280:
279:
277:
273:
269:
262:
257:
255:
250:
248:
243:
242:
239:
232:
228:
224:
220:
218:
214:
212:
208:
207:
194:
190:
187:
184:
182:
179:
176:
173:
170:
166:
163:
161:
158:
155:
154:
153:
151:
142:
139:
135:
131:
128:
124:
120:
118:organization.
116:
115:
114:
112:
107:
105:
101:
97:
93:
89:
78:
75:
67:
64:February 2015
57:
53:
47:
46:
40:
36:
32:
27:
18:
17:
702:expanding it
695:
680:
496:
226:
147:
108:
98:most senior
91:
87:
85:
70:
61:
50:Please help
42:
543:Chairperson
462:Procurement
397:Information
56:introducing
741:Categories
614:Supervisor
517:Technology
447:Networking
412:Investment
407:Innovation
372:Experience
332:Compliance
322:Commercial
302:Automation
199:References
171:protection
573:President
522:Visionary
502:Solutions
452:Operating
432:Marketing
417:Knowledge
387:Happiness
377:Financial
367:Executive
362:Diversity
292:Analytics
133:controls.
100:executive
507:Strategy
497:Security
472:Research
422:Learning
342:Creative
312:Business
94:) is an
624:Foreman
599:Manager
492:Science
482:Revenue
467:Product
457:Privacy
437:Medical
357:Digital
337:Content
317:Channel
204:Sources
169:privacy
52:improve
382:Gaming
352:Design
189:Threat
427:Legal
307:Brand
297:Audit
122:risk.
37:, or
698:stub
487:Risk
347:Data
175:Risk
109:The
527:Web
92:CSO
743::
225:.
86:A
41:,
33:,
729:e
722:t
715:v
704:.
260:e
253:t
246:v
229:.
90:(
77:)
71:(
66:)
62:(
48:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.