← Back to Library

The lazy myth that cisos “don’t understand the business” has to go

Ross Haleliuk dismantles a pervasive industry cliché with surgical precision, arguing that the claim that Chief Information Security Officers (CISOs) lack business acumen is not just outdated, but a dangerous myth that obscures the real systemic failures in corporate governance. While the security sector often obsesses over technical vulnerabilities, Haleliuk shifts the lens to the evolution of the C-suite itself, offering a historical corrective that busy leaders need to hear before their next board meeting.

The Historical Anchor

The piece gains immediate weight by grounding its argument in the specific origins of the role. Haleliuk writes, "Thirty years ago, in 1995, Steve Katz (1942 - 2023) was named to the newly created CISO role by Citicorp. This was the first time a company hired a dedicated CISO." He correctly identifies that this wasn't a proactive strategic move but a reaction to a crisis: Russian hackers had stolen over $10 million, and the bank needed someone to manage the fallout. This historical context is vital because it explains why the early role was often a "scapegoat" position rather than a strategic partnership.

The lazy myth that cisos “don’t understand the business” has to go

Haleliuk points out that the early CISOs were often seasoned managers thrust into a role with no playbook. "It ended up being a lot of on-the-job learning experiences on everybody's part: CISOs had to figure out P&L ownership, strategy, and working with boards, while companies hiring CISOs needed to learn where to draw the line between other roles and that of a CISO." The author's framing here is effective; it reframes the "incompetence" narrative as a failure of organizational design. If the role was created to absorb blame rather than drive strategy, of course the incumbent struggled to speak the language of the board.

The unfortunate part has been that many of the CISOs hired to act as scapegoats if something fails were given no resources and no executive support to actually make a difference. To put it differently, they were set up to fail.

Critics might argue that this historical excuse is becoming a crutch, suggesting that modern leaders should have evolved faster. However, Haleliuk's timeline is compelling. He notes that the infrastructure, the workforce, and the business models have shifted so drastically that comparing a 1995 CISO to a 2026 leader is like comparing a telegraph operator to a satellite engineer. The role has undergone a "complete transformation," driven by the emergence of formal education programs and a wealth of resources that simply did not exist two decades ago.

The Modern Reality of Risk Translation

The core of Haleliuk's argument rests on the financial reality of the modern CISO. He challenges the notion that these leaders rely on technical jargon to secure funding. "Do you really think that when the CFO & CEO are deciding where to allocate budget, and the CISO ends up getting the money, it happens because the CISO just bamboozles them with technical jargon and some CVE-2024-XXXX speak?" This rhetorical question cuts through the noise. In an environment where every dollar spent on security is a dollar taken from growth initiatives, the ability to secure a budget is the ultimate proof of business fluency.

Haleliuk writes, "I would argue that any CISO who can get their executive team bought-in to fund new security initiatives, when everything is about cost-cutting and top-line growth, is a master communicator, negotiator, and evangelist." This is a powerful reframe. It suggests that if a CISO is getting resources, they have already proven they understand the business. The persistence of the myth, therefore, says more about the cynicism of the observers than the capabilities of the leaders.

The author also addresses the boardroom dynamic directly, noting that modern CISOs are not discussing technical vulnerabilities but rather "business impact, regulatory exposure, operational resilience, brand and customer trust." This aligns with the evolution of the role seen in the broader executive suite, where leaders like the first CISOs at Citicorp had to learn on the fly, but today's leaders enter with a toolkit of certifications, associations, and peer networks that were unimaginable in the era of Gene Spafford's early academic work on security myths.

The idea that CISOs are "too technical" for the board ignores the reality that getting to the CISO role in 2026 requires mastering far more than technical triage.

Systemic Barriers vs. Individual Failure

Where the article shines brightest is in distinguishing between individual capability and systemic dysfunction. Haleliuk acknowledges that while the "lazy myth" is false, real problems persist. He identifies three systemic issues: companies using CISOs as liability shields, the inherent difficulty in measuring risk reduction, and unrealistic expectations of certainty.

He notes, "Boards want certainty, and executives still measure security success by 'no breaches' instead of resilience." This is a critical insight. The failure is not that the CISO cannot explain the business case; it is that the business case for security is inherently counter-intuitive. As Haleliuk puts it, "How do we measure risk reduction? How do we explain the ROI and quantify the savings of the attacks that didn't happen?" This rhetorical challenge is shared by other functions like HR and marketing, yet security leaders are uniquely punished for the inability to prove a negative.

The author's conclusion is a call to stop blaming the messenger. "We most definitely need to debate these problems and continue maturing our practices. At the same time, it's really time to retire the lazy idea that CISOs are 'bad communicators who don't understand the business'." This is a necessary correction for an industry that often looks for easy scapegoats when defenses fail.

Bottom Line

Haleliuk's most compelling contribution is the historical evidence that the CISO's perceived lack of business acumen was a structural artifact of the role's infancy, not a permanent trait of the profession. The argument's strongest vulnerability lies in its reliance on the "average" successful CISO; it may overlook the specific struggles of those in under-resourced or hostile corporate cultures who are indeed set up to fail. However, the verdict is clear: the industry must stop conflating systemic governance failures with individual leadership deficits, or it will continue to misdiagnose the root causes of its security gaps.

Deep Dives

Explore these related deep dives:

Sources

The lazy myth that cisos “don’t understand the business” has to go

by Ross Haleliuk · Venture in Security · Read full article

There are many things we repeat in security that are just not true. “Security is a department of “No” (if anything, security gets told ‘No’). “There is a talent shortage in cyber” (yes, there is a huge gap of senior specialized talent, but an oversaturation of entry-level talent). “Security is the most crowded market” (not even close; there are 5-10 times more marketing tech tools, fintechs, and many others). “Attackers only need to get it right once, defenders have to get it right every single time” (the opposite is true - attackers need to stay undetected, and a single mistake can fail them). “Sixty percent of small businesses close within 6 months of being hacked” (my friend Adrian Sanabria did a USENIX talk about this one and a few other myths).

We know that there is a lot of nonsense being repeated, and in the past decade, we have started to challenge it. There is now even a dedicated book titled “Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us” by Eugene Spafford, Leigh Metcalf, and Josiah Dykstra…The point is, we are moving in the right direction.

There are, however, several myths that are just too persistent, and many years later, they are still widely accepted as truth. In a previous article, I tackled two: that “we aren’t getting any more secure than before” (not true) and that “there are simply too many security tools and we need fewer of them” (also not true). This week, I am taking a stab at another egregious lie - that “most CISOs are really bad at understanding the business, can’t translate risk into business language”, etc.

This issue is brought to you by… Tines.

Everyone’s using AI - So why are workloads still growing?.

99% of SOCs are already using AI, yet 81% say workloads increased in the past year.To find out why teams have yet to unlock AI’s full impact, Tines surveyed 1,800+ security leaders and practitioners worldwide for their biggest Voice of Security report yet.

A few standout stats:

AI literacy and prompt engineering are the top skills security professionals need

44% of security work is still manual

87% report board-level attention to cybersecurity has increased in the last year

Get access to the full report here.

Two decades ago, there were few CISOs with a strong track record as business leaders.

“CISOs aren’t business leaders”, “CISOs can’t ...