Information Security

What does a CISO actually do?

Information Security

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Information security is important — everyone knows that. But who is really responsible for it? In larger organizations, this is usually a CISO (Chief Information Security Officer). In smaller companies, that responsibility often lies with the IT manager, CTO, CFO or the entrepreneur himself. Nevertheless, the need for someone who really focuses on this is growing. So it's time to clarify exactly what a CISO does and why you can't live without it.

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This article was last updated on
24.03.2026
Written by
Jelle
van Onna
Information Security Consultant & Project Manager

CISO: Chief Information Security Officer

The CISO is the one who monitors the overview when it comes to information security. That means more than preventing data breaches or complying with ISO 27001 whether NICHE 2. A good CISO provides structure, provides direction and makes information security part of the business strategy.

The 5 most important tasks of a CISO

1. Define a security strategy

The CISO sets the course. What are the biggest risks? Where should the focus be? How do you ensure that everyone in the organization is aware of their role? The CISO develops a clear strategy, including awareness programs, policies, and priorities.

2. Managing the security team

When there is a team, the CISO ensures that everyone knows what needs to be done and why. From technical measures to raising awareness among colleagues. No team in house? Then the CISO provides external support or performs tasks himself.

3. Advising and reporting to management

The CISO translates technical risks into clear insights for management. What are the risks if you do nothing now? What does it cost, what does it deliver? The CISO also advises on security measures.

4. Respond to incidents

Is it going wrong anyway? Then the CISO is the director. Incident response, impact analysis, communication: the CISO is responsible. Afterwards, an evaluation follows: what went well, what could be better?

5. Making sure you stay compliant

ISO 27001, NIS2, AVG, BIO — the rules are constantly changing. The CISO ensures that you continue to comply with laws and regulations.

CISO vs. ISO (Security Officer): What's the difference?

The CISO is responsible for the strategy. It looks at the bigger picture: risks, priorities and policy. The ISO (Information) Security Officer) is responsible for implementation. Examples include carrying out checks, implementing measures, monitoring and documentation.

 

In smaller organizations, these roles are sometimes combined, but as you grow, it's smart to split this. This way, you keep focus and overview.

Aspect ISO CISO
Hoofdtaken Uitvoeren van informatiebeveiligingsmaatregelen Opstellen van strategie en beleid voor informatiebeveiliging
Strategisch niveau Beperkt, vooral tactisch en operationeel Ja, strategisch en beleidsbepalend
Operationeel verantwoordelijk Ja, voert risicoanalyses, audits, awareness-trainingen uit Nee, houdt toezicht op uitvoering, stuurt ISO aan
Rapporteert aan Vaak aan de CISO of IT-manager Direct aan directie, CIO of Raad van Bestuur
Focus Praktische uitvoering van beleid en richtlijnen Strategische beveiligingsdoelstellingen en risicomanagement
Besluitvorming Adviseert, maar beslist meestal niet zelfstandig Eindverantwoordelijk voor keuzes en investeringen op beveiligingsvlak
Teamverantwoordelijkheid Werkt individueel of in klein team Stuurt het gehele securityteam aan
Compliance en audits Voert controles en assessments uit Ziet toe op compliance op hoog niveau, neemt eindverantwoordelijkheid
Technische kennis Vaak diepgaande technische kennis nodig Meer focus op management, governance en communicatie

How to become a CISO

There is no fixed route, but there are clear ingredients:

 

  • Experience in IT or information security — many CISOs come from roles such as security officers, IT managers or compliance specialists.
  • Knowledge of standards and regulations — such as ISO 27001, NIS2, AVG.
  • Strong communication skills — you must be able to explain risks to people without a technical background.
  • Analytical and strategic thinking — you oversee the whole thing and think ahead.

 

Courses or certifications that come back often include CISM, CISSP, or courses related to ISO 27001, but just as important: understanding how organizations work and getting people involved in change.

Why you can't live without

Without CISO, information security remains something that is “done on the side”. Often due to IT or compliance, in addition to all their other work. And that is risky. A good CISO brings focus, overview and responsibility. Exactly what you need at a time when threats are becoming increasingly sophisticated.

Not employed by a CISO? Opt for
CISO as a Service

Do you not have enough work for a full-time CISO, but do you need expertise? Dan is CISO as a Service a smart solution. At Fendix, we provide experienced CISOs, flexible and immediately available. Remotely or on location. You decide what's necessary — we'll take care of the rest.

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

How many people participate?

Request now

Thanks!
Oops! The form could not be submitted. Please try again.

More resources

News

Dag stoffige consultancy, hallo Next-Gen C!

thru
Ruben
Blog
Partners

Our Trusted MSPs

thru
Jurre
Blog
Implementation

What documents do you need for ISO 27001 proof?

thru
Mathijs
Kennisartikel