{"id":70,"date":"2004-12-07T00:00:00","date_gmt":"2004-12-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/07\/show-time-for-security\/"},"modified":"2021-12-30T11:36:27","modified_gmt":"2021-12-30T11:36:27","slug":"show-time-for-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/07\/show-time-for-security\/","title":{"rendered":"Show Time for Security"},"content":{"rendered":"<p>Sure, image isn&#8217;t everything. But in security, projecting the right image helps get the job done.  The article&#8217;s idea is to explore the role of appearances in security and determine how the profession needs to make itself over in order to get its message heard.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;There is an element of appearances to security, and I don&#8217;t mean this in an unfavorable way,&#8221; says the famously unflappable de Becker, who has guarded his image as closely as the Hollywood stars he is hired to protect.  &#8220;Precautions that are expected to deter often draw some of their effectiveness from appearing to be this or that.&#8221;<\/p>\n<p>Once an assortment of stereotyped &#8220;geeks&#8221; and &#8220;guards&#8221; who&#8217;d been promoted up a few tax brackets, CSOs are now struggling to become&#8212;and be recognized as&#8212;businessmen and women who take a strategic view of risks across the enterprise.<\/p>\n<p>On the first level are CSOs themselves&#8212;you&#8212;who are learning that to be taken seriously as executives, you have to act like your peers from other parts of the business.  Just look at what eBay&#8217;s Howard Schmidt, one of the country&#8217;s most prominent CISOs, has done to his look over the years.<\/p>\n<p>Closely tied with the CSO&#8217;s personal image is a second level: how other business executives and their staffs view the security department and its leader.  Michael Assante, CSO of American Electric Power, is candid about the kind of forethought that goes into this transformation.  &#8220;I knew that image was going to be an important part of being able to have success,&#8221; says Assante, who two years ago became the first person at AEP to have control over both corporate and information security.<\/p>\n<p>&#8220;Image is 100 percent important,&#8221; says Schneier, author of Beyond Fear and a prominent observer of the security industry&#8217;s evolution.  If you don&#8217;t deal with everything around the politics and socialization, you never get to the actual security.&#8221;<\/p>\n<p>In other words, it&#8217;s not style over substance.<\/p>\n<p>http:\/\/www.csoonline.com\/read\/120104\/image_intro.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-70","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/70\/revisions"}],"predecessor-version":[{"id":2557,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/70\/revisions\/2557"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=70"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=70"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}