<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An exploration into the requirements and respons- ibilities of CISO roles: Balancing art with science</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Moufida Sadok</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iain Reid</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Criminology and Criminal Justice, University of Portsmouth</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>This paper presents the results of an investigation into 50 Chief Information Security Officer (CISO) job openings listed by various organisations in the UK from 2022 to 2025, aiming to identify the essential and desirable skills required by employers. The findings indicate a growing demand for both soft skills and established security certifications, such as the Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM). Furthermore, the requirements and responsibilities emphasise the key role of the CISO in aligning security with business needs, which necessitates a good understanding of business processes that support the delivery of value, as well as work practices to enhance security engagement in the workplace. This study has the potential to inform future educational and training programmes in security to close the skills gap.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;CISO</kwd>
        <kwd>Soft skills</kwd>
        <kwd>Hard skills</kwd>
        <kwd>Information security</kwd>
        <kwd>Sociotechnical approach</kwd>
        <kwd>Job description 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The ubiquitous digitisation of information and the pervasive connectivity of work systems have
made securing information essential to ensure business continuity, sustainability, and compliance
with regulatory frameworks. The International Standards Organisation (ISO) 27001:2022 [1]
recommends organisations to implement an information security management system, based on a
business risk approach, including policies, procedures, guidelines, activities and associated
resources, to maintain and improve the security of information assets. The Chief Information Officer
(CIO), also referred to as the Chief Information Security Officer (CISO), is responsible for every
aspect of information security management and is expected to advise on how to leverage technology
to address an organisation's security needs. The role of CISOs is pivotal to ensure an effective
security strategy supporting business model operations; therefore, it requires certain personal and
professional qualifications to meet the demands of the position successfully.</p>
      <p>
        The recent incidents involving CISOs from Huber and SolarWinds have raised questions about
the liability of CISOs. The U.S. Securities and Exchange Commission has charged SolarWinds
Corporation and its former CISO with fraud and internal control failures related to the company's
cybersecurity practices leading up to the 2020 cyberattack [
        <xref ref-type="bibr" rid="ref1">2</xref>
        ]. Although the charges against them
were subsequently dismissed, this case still shows the challenges in identifying who should be
considered
liable when under a cyber-attack. In May 2023, a former Uber CISO was fined and sentenced to three
years’ probation after being the first cybersecurity executive to be convicted of covering up elements
of a data breach perpetrated by external attackers [
        <xref ref-type="bibr" rid="ref2">3</xref>
        ]. These incidents also raise questions about the
applicability of the parity principle of authority and responsibility, as CISOs seem to lack the
required autonomy and decision-making authority to run and maintain an effective information
security management system. CISOs are seen as being answerable to the C-Suite, rather than being
part of it, with Da Silva et al. [
        <xref ref-type="bibr" rid="ref3">4</xref>
        ] arguing that CISOs “are often scapegoated when things go
wrong”.
      </p>
      <p>This paper aims to identify the qualifications required to fulfil the job of a CISO. It presents a
content analysis of 50 job postings from different organisations between 2022 and 2025 in the UK.
The study of job listings offers a comprehensive overview of the key skills employers expect. The
longitudinal approach to data collection has the potential to identify patterns in terms of required
qualifications and skills.</p>
      <p>This paper is organised as follows. The next section provides some background on the role of
CISO. Section three details the study and data collection. The last section discusses the results and
provides some concluding remarks</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>It is widely acknowledged that the CISO is a key player responsible for developing and
implementing a security strategy that supports the delivery of business value. This involves an
effective assessment of significant risks and the development of a security policy that mitigates or
prevents them from impacting the continuity of the business. Further, the CISO must ensure that
security measures comply with privacy and regulatory frameworks.</p>
      <p>
        The importance of the CISO role is continuously growing. The research by Karanja [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ]
investigating the role of CISOs before and after an IT security breach shows that hiring a CISO was a key
element in a reactive plan. Maynard et al. [
        <xref ref-type="bibr" rid="ref13 ref5">6</xref>
        ] argue that there are five requisite dimensions to the
strategic role of the CISO: (a) dimension of thought reflecting the ability to be creative and
innovative to keep up with the evolving and uncertain threat landscape; (b) dimension of
contextualisation which involves the ability to achieve an appropriate alignment between security strategy and
the business model requirements; (c) dimension of execution which involves the ability to use
efficiently available resources to implement an actionable security plan; (d) dimension of response
reflecting the ability of a CISO to be proactive and responsive to significant changes in the business
environment; and (e) dimension of advocacy which involves the ability to effectively
communication the relevance of security controls to different groups of stakeholders.
      </p>
      <p>
        Complementary skills, alternatively known as soft skills, are considered highly important within
the UK cyber sector, with 28% of respondents rating them as essential in the Cyber Security Skills in
the UK Labour Market 2024 [
        <xref ref-type="bibr" rid="ref6">7</xref>
        ]. However, 34% of businesses report that they have a complementary
skills gap within their organisation. Whilst such soft skills are often seen as being necessary within
the role of a CISO, they may not always be listed in job adverts [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ]. Within a Dutch context, whilst
soft skills are valued by CISOs, they may not always be explicitly stated in job adverts. This, in
turn, may create a potential mismatch between what organisations are advertising for in the role
of a CISO and what CISOs' experience of the job actually is. By being more explicit in job adverts
regarding the need for soft skills then better recruitment decisions may be made, including
ensuring that applicants know what their responsibilities will be in the role of CISO [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ].
      </p>
      <p>
        Information security research has also focused on the need for effective communication of the
relevance of security controls to employees involved in implementing those controls in their
everyday work practices ([
        <xref ref-type="bibr" rid="ref8">9</xref>
        ]; [
        <xref ref-type="bibr" rid="ref3">4</xref>
        ]; [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ]; [
        <xref ref-type="bibr" rid="ref10">11</xref>
        ]). The CISO role may further be seen as a mediator,
facilitating communication between technical employees and higher levels of management ([
        <xref ref-type="bibr" rid="ref9">10</xref>
        ];
[
        <xref ref-type="bibr" rid="ref11">12</xref>
        ]). Hooper and McKissack [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ] question the technically-oriented job descriptions of CISOs and
suggest that CISOs should play a key role in matching security to business requirements. This
entails both a broad understanding of business processes supporting the delivery of value and strong
communication skills needed to work effectively with different groups of stakeholders, including
managers, business process owners and end-users [
        <xref ref-type="bibr" rid="ref3">4</xref>
        ]. Ashenden and Sasse [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] showed that CISOs
often experience difficulties in communicating the why and how behind security measures and
that there is a need to use more effective channels or methods of communication to “sell” the
relevance of such measures. The authors also emphasise the challenge CISOs face in gaining credibility
due to a lack of authority and ambiguity about their responsibilities.
      </p>
      <p>
        It is not always clear who CISOs should be reporting to, whether to the CEO or to the CIO,
depending upon the nature of a vacancy, i.e. a newly created role versus a replacement [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. CISOs
may need to report to the board, with some research arguing that CISOs should be part of the board
itself due to the security of information assets being a critical business function [
        <xref ref-type="bibr" rid="ref10">11</xref>
        ]. Shayo and Lin
[16] further argue that there is no one-size-fits-all reporting structure for CISOs, and that any
reporting structure will reflect the organisational, cultural, and socio-technical make-up of an
organisation. This may, in turn, compound the challenges in assessing CISOs' responsibilities,
liabilities, and who they are answerable to when there is no consistent job role description for CISOs.
      </p>
      <p>The findings of the 2022 Global Cybersecurity Outlook 2022 Insight Report [17], which involved
120 cybersecurity leaders from 20 countries, confirm the challenges faced by CISOs and identify
three main gaps between security-focused and business executives (Chief Executive Officers).
Firstly, CISOs believe that cyber is not prioritised enough in business decisions. As a consequence,
the second gap deals with the lack of involvement of CISOs in business decisions, which could
result in security issues. The third gap concerns recruiting and retaining cybersecurity talent. While
CISOs find it challenging to respond to a cybersecurity incident due to the shortage of skills within
their team, business executives appear less acutely aware of the gaps.</p>
      <p>In one study exploring pathways to the role of a CISO, Kappers and Harrell [18] examined degree
requirements, certifications, hard skills and soft skills, alongside broader security risk management
abilities, and business management. Their work attempted to identify the key skills required for the
role of a CISO as identified by practitioners and academics. Although the sample size is limited, this
study highlights the importance of developing the skills required for a CISO from an undergraduate
degree level. This further reflects broader changes within the UK higher education ecosystem, as
attempts are made to professionalise cybersecurity career pathways and reduce the cyber skills gap.
Specifically, cybersecurity degree pathways are being mapped against the Cyber Security Body of
Knowledge, including those that reflect the skills required for a CISO role.</p>
    </sec>
    <sec id="sec-3">
      <title>3. The study</title>
      <p>The data collection was carried out through the teaching of the module “Information Security
Management” delivered to final-year undergraduate students. The first assignment in this module is
to find three job openings for the position of Chief Information Security Officer (CISO), each from a
different organisation. Students should critically discuss and compare the required essential and
desirable skills between the organisations’ adverts. Students must also critically discuss, using
academic literature, the key challenges a CISO faces in managing information security.
The module has been running for four years, and the authors of this paper, who are also the
assessors of the assignment, collected the data using the links provided for the job adverts. The
keywords that guided the analysis of the data include: experience, education, certification, soft
skills, and IT-related skills.</p>
      <p>Over the years, job descriptions have been shaped by technological and legislative factors. For
instance, big data influenced job descriptions in 2022. By 2025, nearly all job vacancies will require
some knowledge of Artificial Intelligence. In recent years, there has been a growing focus on
complying with the General Data Protection Regulation 2016, and within the UK context, the Data
Protection Act 2018.</p>
      <p>The table below presents the outcomes of the content analysis of 50 job adverts between 2022 and
2025 in the UK.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion and conclusion</title>
      <p>Cybersecurity roles, in particular cybersecurity leadership roles, are in high demand. The 2024
study by the Department of Culture, Media and Sport on Cyber Security skills in the UK labour
market estimates that around half (44%) of businesses have skills gaps in basic technical areas.
Further, nearly half (48%) of cyber leads within businesses lack confidence in their ability to undertake
a
cybersecurity risk assessment and in developing cybersecurity policies. The participants in this
study suggest that the combination of soft and technical skills is rather a rare skill set.
The 2024 Global Cybersecurity Outlook report states that organisations lack the right number of
people with critical technical and soft skills, preventing them from achieving their strategic
cyberresilience objectives. To upskill the workforce, as many as 91% of organisations are willing to pay for
cybersecurity training and certification for their employees. Certifications or short educational
courses are one way to fill skills gaps.</p>
      <p>The findings of this study are consistent with the recent research by Ramezan [19] that
involved 250 job adverts listed across 27 nations. In particular, employers value prior professional
experience, strong communication skills, and knowledge of regulatory frameworks and cybersecurity
standards. The study also reveals that employers value bachelor’s or master’s degrees in business
fields, which could equip CISOs with relevant business knowledge that has the potential to support
a better alignment between security and business strategy. Ramezan [19] recommends the
inclusion of management, data privacy, or business strategy modules within cybersecurity program
curricula to reflect the shift of the CISO role to a more management and strategic focus.</p>
      <p>The outcomes of this study are useful to improve the content of this module and inform future
cybersecurity training programs. A valuable next step would be to incorporate qualitative research
methods, such as interviews or focus groups with CISOs and hiring managers responsible for
creating CISO job descriptions. This could provide deeper insights into how the listed requirements
align with real-world practices and highlight which criteria are considered most critical during the
hiring process.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.
[1] ISO 2022 https://www.iso.org/standard/27001</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>U.S</given-names>
            <surname>Security and Exchange Commission</surname>
          </string-name>
          ,
          <year>2023</year>
          . https://www.sec.gov/newsroom/pressreleases/2023-
          <fpage>227</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>U.S</given-names>
            <surname>Attorney's Office</surname>
          </string-name>
          ,
          <year>2023</year>
          . https://www.justice.gov/usao-ndca/pr/former-chief
          <article-title>-securityofficer-uber-sentenced-three-years-probation-covering-data</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Joseph</given-names>
            <surname>Da</surname>
          </string-name>
          Silva and Rikke Bjerg Jensen.
          <year>2022</year>
          . “
          <article-title>Cyber security is a dark art”: The CISO as Soothsayer</article-title>
          .
          <source>Proc. ACM Hum.-Comput. Interact</source>
          .
          <volume>6</volume>
          ,
          <issue>CSCW2</issue>
          , Article
          <volume>365</volume>
          (
          <year>November 2022</year>
          ),
          <volume>31</volume>
          pages. https://doi.org/10.1145/3555090.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Karanja</surname>
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>The role of the chief information security officer in the management of IT security</article-title>
          .
          <source>Information &amp; Computer</source>
          Security Vol.
          <volume>25</volume>
          No.
          <issue>3</issue>
          , pp.
          <fpage>300</fpage>
          -
          <lpage>329</lpage>
          . DOI 10.1108/ICS-02-2016- 0013
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.B.</given-names>
            <surname>Maynard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Onibere</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Ahmad Defining the strategic role of the chief information security officer Pac</article-title>
          .
          <source>Asia J. Assoc. Inf. Syst</source>
          . (
          <year>2018</year>
          ), pp.
          <fpage>61</fpage>
          -
          <lpage>86</lpage>
          ,
          <fpage>10</fpage>
          .17705/1pais.10303
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7] Department for Science,
          <source>Innovation &amp; Technology</source>
          . (
          <year>2024</year>
          ).
          <article-title>Cyber security skills in the UK labour market 2024</article-title>
          . https://www.gov.uk/government/publications/cyber
          <article-title>-security-skills-in-the-uklabour-market-2024/cyber-security-skills-in-the-uk-labour-market-2024#current-skills-andskills-gaps.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>van Yperen</given-names>
            <surname>Hagedoorn</surname>
          </string-name>
          , Jeroen M.J.; Smit, Richard; Versteeg, Patric; and Ravesteyn,
          <source>Pascal, "Soft Skills of The Chief Information Security Officer"</source>
          (
          <year>2021</year>
          ).
          <source>BLED 2021 Proceedings. 31</source>
          .https://aisel.aisnet.org/bled2021/31I. Editor (Ed.),
          <article-title>The title of book two, The name of the series two</article-title>
          , 2nd. ed., University of Chicago Press, Chicago,
          <year>2008</year>
          . doi:
          <volume>10</volume>
          .1007/3-540-09237-4
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Albrechtsen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2007</year>
          ),
          <article-title>“A qualitative study of users' view on information security”</article-title>
          ,
          <source>Computers and Security</source>
          , Vol.
          <volume>26</volume>
          No.
          <issue>4</issue>
          , pp.
          <fpage>276</fpage>
          -
          <lpage>289</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Karlsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Karin Hedström</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            and
            <surname>Göran Goldkuhl</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          (
          <year>2017</year>
          ), “
          <article-title>Practice-based discourse analysis of information security policies”</article-title>
          ,
          <source>Computers and Security</source>
          , Vol.
          <volume>67</volume>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>279</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Monzelo</surname>
          </string-name>
          ,
          <article-title>Pedro and Nunes, Sérgio, "The Role of the Chief Information Security Officer (CISO) in Organisations (</article-title>
          <year>2019</year>
          ).
          <source>CAPSI 2019 Proceedings. 36</source>
          . https://aisel.aisnet.
          <source>org/capsi2019/36</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Sjøberg</given-names>
            <surname>Sveen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Østrem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Radianti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            , &amp;
            <surname>Munkvold</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. E.</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>The CISO role: a mediator between cybersecurity and top management. In Norsk IKT-konferanse for forskning og utdanning (No. 2)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Hooper</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          and
          <string-name>
            <surname>McKissack</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2016</year>
          ), “
          <article-title>The emerging role of the CISO”</article-title>
          ,
          <string-name>
            <surname>Business</surname>
            <given-names>Horizons</given-names>
          </string-name>
          , Vol.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>No. 6</source>
          , pp.
          <fpage>585</fpage>
          -
          <lpage>591</lpage>
          ..
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Ashenden</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Sasse</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2013</year>
          ),
          <article-title>“CISOs and organisational culture: their own worst enemy?”, Computers and Security</article-title>
          , Vol.
          <volume>39</volume>
          , pp.
          <fpage>396</fpage>
          -
          <lpage>405</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Karanja</surname>
            , Erastus and Rosso,
            <given-names>Mark A.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>"The Chief Information Security Officer: An Exploratory Study,"</article-title>
          <source>Journal of International Technology and Information Management:</source>
          Vol.
          <volume>26</volume>
          : Iss.
          <article-title>2, Article 2</article-title>
          . DOI: https://doi.org/10.58729/1941-
          <fpage>6679</fpage>
          .
          <fpage>1299</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>