Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » 5 Reasons Why Collaboration Between CISOs, Developers Yields Better Cybersecurity
Cybersecurity as a Business Enabler

5 Reasons Why Collaboration Between CISOs, Developers Yields Better Cybersecurity

Chris HughesBy Chris HughesMarch 2, 20234 Mins Read
Facebook Twitter LinkedIn Email
pro developers CISO
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

On the surface, it might not be obvious why developers need CISO guidance. Most developers spend their time knee-deep in code, building software to help enable business outcomes. They don’t typically have a major focus on security; they might even view security as an impediment due to past experiences. But peel back the curtain, and it becomes clear why CISO guidance is needed.

Developers are producing software that is driving business value in our modern digital business ecosystem. These businesses are governed by a myriad of compliance, privacy, and other regulatory requirements in which most developers aren’t well versed — but the CISO is. In this analysis, I’ll lay out five ways in which CISOs and developers can work together to maximize the security posture of their organization as new software is created.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner-analysts.

Enforce Security and Compliance

The CISO can guide developers so that they understand security and privacy requirements for the applications they develop and how those applications use data. This is particularly important for data types such as personal identifiable information (PII), protected health information (PHI), and payment card data. Developers are likely not as familiar as their security peers with regulatory requirements around data types since it is the CISO and security teams’ job to be current on regulations and ensure regulatory compliance on behalf of the business.

Deliver Business Enablement

One of the most critical functions that CISOs perform is business enablement, and their work with developers is a prime example of how they can deliver on that priority.

For some time now, we’ve heard calls for security to work as an enabler and not a blocker of business initiatives. CISOs and their security teams can work with the product and development teams to create new ways to ensure software is secure. They can do this by building protection measures into processes for developing and deploying software.

This may include hardened endpoints, continuous integration and continuous delivery/deployment (CI/CD) pipelines of security tooling, and controls to protect sensitive data. This improves developer experience by ensuring not only that code gets to production but that it does so securely, aligned with organizational security and regulatory requirements.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Protect Developer Workstations and Tools

An often overlooked but critical part of enterprise security is the hardware — workstations and tools — used by developers in their everyday work. Often, hackers or bad actors will not go to production systems first. They know there are organizations that have development systems with access to production environments. In addition, many developers have elevated permissions and may have corporate certificates for testing purposes. From a developer’s perspective, it can be comforting to know there is a larger team, the CISO’s team, helping secure the myriad of development machines and environments.

Secure Corporate Data Stores

Developers will usually appreciate and want to work with the CISO to reduce risks from disparate data and code assets. Elevated developer permissions and development environments can also be an issue in securing corporate data stores. Many developers have credentials to databases and sometimes backups as well. Often the databases are copied on a regular basis to development database servers. Some developers may be building for a secure private cloud but, in an effort to reduce cost, testing using a public cloud, highlighting the complexity and potential risks that need to be managed.

Identify Insider Threats

Regular communication between the CISO and developer leads or teams can also assist in spotting disgruntled employees. Many hacks and leaks are initiated by people inside the company. A disgruntled developer with access to an organization’s certificates, secrets, and data can be a particularly problematic scenario. If developers are regularly communicating with the CISO, the CISO may be able to eliminate threats from disgruntled employees by spotting them sooner. From a developer’s perspective, such communication can open avenues for the resolution of issues that may be interfering with productivity.

Conclusion

Building a collaborative approach between security and development teams alleviates some tension between the development and security teams and helps break down silos, which is a common theme with the continued push for DevSecOps and its objective to break down barriers between development, security, and operations teams. CISOs can help build this rapport through efforts such as security champions programs, brown-bag and educational sessions, outreach. Effective security enablement is quite possibly the best measure to fuel collaboration.

Paul Swider, founding CEO of healthcare tech startup RealActivity and Acceleration Economy analyst, also contributed to this analysis.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

CISO data database featured
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Why Cybersecurity Leaders Need to Know the CISA Zero Trust Maturity Model

March 30, 2023

How Informatica Unlocks Digital Transformation With AI-Powered Data Management Platform

March 30, 2023

How ChaptGPT Plugins Create New AI Value, Including Real-Time Information

March 30, 2023

How to Prioritize IT Projects and Explain Their Value to the C-Suite, Board, and Business Units

March 30, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Why Cybersecurity Leaders Need to Know the CISA Zero Trust Maturity Model
  • Let’s Talk Transformation | Strategy
  • How Informatica Unlocks Digital Transformation With AI-Powered Data Management Platform
  • How ChaptGPT Plugins Create New AI Value, Including Real-Time Information
  • How to Prioritize IT Projects and Explain Their Value to the C-Suite, Board, and Business Units

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.