Virtual & Interim

CISO or CIO

Growing or evolving organizations may need the expertise of a Chief Information Security Officer or Chief Information Officer, but cannot justify a full time resource on their payroll. BluTinuity can provide expertise and services to bridge the gap in your team's experience or timing. Virtual or interim CISO or CIO roles in a retained-hours plan or in ad-hoc advisory programs are a great way to leverage the information security domain competency when you need it. 

This many include any of the following activities typical in a Virtual CISO or CIO role:

  • Provide leadership for the organization’s Information Security Program.

  • Design, develop, and implement the organizational information security strategy to ensure that the confidentiality, integrity, and availability of information assets is sufficiently protected.

  • Collaborate with the Executive Team, the Board of Directors, Compliance Officer, and other senior leaders to assess, validate, and mitigate risk to levels deemed acceptable by the organization. Ensure all leaders understand existing information security risk to the organization.

  • Provide oversight of information security compliance activities related to federal and state laws.

  • Provide oversight of information security audits.

  • Provide expert guidance and best practice ownership related to security standards (i.e. HIPAA Security, ISO 27000, NIST Cyber Security Framework, HITRUST, etc.).

  • Membership on the Security & Risk Management or similar Committee that meets regularly to oversee security risks, security policies, security controls, and the entire security program.

  • Provide leadership for the Security Incident Response Team; investigate and manage information security and data breach incidents.

  • Perform or provide oversight for security risk analysis at least every 18 months.

  • Assist with vendor security risk management.

  • Promote a culture of security awareness and implement appropriate security training and awareness activities.

  • Prioritize and provide oversight to information security initiatives designed to enhance the security posture of the organization, including the evaluation, selection and implementation of information security solutions.

  • Monitor, analyze, and evaluate emerging threats the organization’s information security, and communicate recommendations to the Executive Team and other stakeholders as appropriate.

  • Monitor advancements in information security technologies.

  • Monitor changes in legislation and accreditation standards that affect information security.

© 2011—2020 by BluTinuity, LLC