{"id":6409,"date":"2021-02-26T11:57:11","date_gmt":"2021-02-26T10:57:11","guid":{"rendered":"https:\/\/edorteam.com\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"},"modified":"2021-07-19T14:36:34","modified_gmt":"2021-07-19T12:36:34","slug":"what-are-the-functions-of-the-information-security-officer-or-ciso","status":"publish","type":"post","link":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","title":{"rendered":"What are the functions of the Information Security Officer or CISO?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.9.7&#8243; custom_padding=&#8221;0px|0px||0px|false|false&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_padding=&#8221;0px|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<\/p>\n<p>At our<strong><a href=\"https:\/\/edorteam.com\/important-changes-in-company-cybersecurity-royal-decree-43-2021\/?lang=en\" target=\"_blank\" rel=\"noopener\"> previous entry<\/a><\/strong> We inform you of the entry into force of Royal Decree 43\/2021, by which all essential service companies and digital service providers must designate their<strong> Responsible for Information Security<\/strong> or<strong> CISO<\/strong> (<em> Chief Information Security Officer<\/em> ).<\/p>\n<p>Broadly speaking, this figure must be designated no later than April 27 of this year, and will be in charge of analyzing the state of cybersecurity of your company and presenting the relevant authorities <strong>Statement of Applicability<\/strong> , in addition to <strong>ensure compliance<\/strong> a posteriori (so it will not be a temporary figure, far from it).<\/p>\n<p>On July 27, the deadline for submitting the Declaration of Applicability ends. As of this date, companies that do not comply with these obligations may be inspected and sanctioned.<\/p>\n<p>The objective of this regulation is very clear: that essential companies <strong>achieve an adequate level of information security<\/strong> , considering that, being essential service companies such as energy, health, waste management or food, they must minimize their risks of suffering a cyber-incident that paralyzes their work activity.<\/p>\n<p>Last week we talked to you in detail about the<strong><a href=\"https:\/\/edorteam.com\/important-changes-in-company-cybersecurity-royal-decree-43-2021\/?lang=en\" target=\"_blank\" rel=\"noopener\"> companies affected by RD 43\/2021<\/a><\/strong> . This week we want to explain the functions of the CISO or Head of Security.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.9.7&#8243; custom_padding=&#8221;0px|0px||0px|false|false&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_padding=&#8221;0px|0px||0px|false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 ez-toc-wrap-left-text counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor:pointer\">Contenido del art\u00edculo<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#Questions_and_answers_about_the_Information_Security_Officer_or_CISO\" >Questions and answers about the Information Security Officer or CISO<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#What_does_a_CISO_or_Security_Manager_do\" >What does a CISO or Security Manager do?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#Edorteam_a_valuable_support_for_your_CISO\" >Edorteam, a valuable support for your CISO<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#Does_the_Safety_Manager_have_to_be_a_company_employee\" >Does the Safety Manager have to be a company employee?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Questions_and_answers_about_the_Information_Security_Officer_or_CISO\"><\/span>Questions and answers about the Information Security Officer or CISO<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_does_a_CISO_or_Security_Manager_do\"><\/span>What does a CISO or Security Manager do?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Its functions are contained in article 7 of RD 43\/2021, which establishes:<\/p>\n<ol>\n<li>Act as a point of contact with the competent authority in matters of supervision of the security requirements of networks and information systems.<\/li>\n<li>Act as a specialized point of contact for the coordination of incident management with the reference CSIRT.<\/li>\n<li>The following functions will be developed under your responsibility, among others:<\/li>\n<\/ol>\n<ul>\n<li>Prepare and propose a Cybersecurity Plan to be approved by the company. This plan must include the technical and organizational measures necessary to manage the risks detected regarding the security of the networks and information systems available to the company.<br \/>Its purpose is to prevent and minimize the effects of cyber incidents that could affect the company and its services. For more information, see the<a href=\"https:\/\/www.boe.es\/diario_boe\/txt.php?id=BOE-A-2021-1192\" target=\"_blank\" rel=\"noopener\"> Article 6 of RD 43\/2021<\/a> .<\/li>\n<li>Supervise and develop the application of security policies, regulations and procedures derived from the organization, supervise their effectiveness and carry out periodic security controls.<\/li>\n<li>Prepare the document of Declaration of Applicability of security measures in accordance with the provisions of article 6.2.<\/li>\n<li>Act as a promoter and trainer for good practices in the organization in cybersecurity.<\/li>\n<li>Send to the competent authority, through the reference CSIRT and without undue delay, notifications of incidents that have disturbing effects on the provision of essential services.<\/li>\n<li>Receive, interpret and supervise the application of the instructions and guides issued by the competent authority, both for the usual operations and for the correction of the deficiencies observed.<\/li>\n<li>Collect, prepare and supply information or documentation to the competent authority or the reference CSIRT, at its request or on its own initiative.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>As we explained on these lines, the figure of the CISO requires<strong> High capacities<\/strong> in information security and carries important responsibilities. The traditional profile of the &#8220;IT company&#8221; specializes and becomes much more complex. However, the Security Manager may rely on services provided by third parties (digital security companies and computer consulting) to fulfill their functions effectively and as required by law.<\/p>\n<p><a href=\"#Contact\">Count on Edorteam to guide your company in adapting to Royal Decree 43\/2021.<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; background_color=&#8221;#0073ce&#8221; custom_padding=&#8221;0px||0px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;800ms&#8221; animation_intensity_slide=&#8221;5%&#8221; global_module=&#8221;5201&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; background_color=&#8221;#ffffff&#8221; width=&#8221;90%&#8221; max_width=&#8221;1800px&#8221; custom_margin=&#8221;0px||0px&#8221; custom_padding=&#8221;0px||0px|&#8221; use_custom_width=&#8221;on&#8221; width_unit=&#8221;off&#8221; custom_width_percent=&#8221;90%&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0073ce&#8221; header_2_font_size=&#8221;1.6em&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;12%|8%|12%|8%|true|true&#8221; header_font_size_phone=&#8221;34px&#8221; header_font_size_last_edited=&#8221;off|phone&#8221;]<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Edorteam_a_valuable_support_for_your_CISO\"><\/span>Edorteam, a valuable support for your CISO<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>We accompany your company in its adaptation to Royal Decree 43\/2021 with the<strong> CISO Advisory Plan,<\/strong> contact us without obligation.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODkifX0=@&#8221; button_text=&#8221;We help you&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;button_url&#8221; background_layout=&#8221;dark&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.7&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00ffaa&#8221; background_color_gradient_end=&#8221;#0073ce&#8221; background_image=&#8221;https:\/\/edorteam.com\/wp-content\/uploads\/plan-ciso-asesor-empresas-responsable-seguridad-informacion.png&#8221; background_size=&#8221;contain&#8221; custom_padding=&#8221;|||&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODkifX0=@&#8221; custom_padding__hover=&#8221;|||&#8221; background__hover_enabled=&#8221;on|hover&#8221; use_background_color_gradient__hover=&#8221;on&#8221; background_color_gradient_start__hover=&#8221;rgba(0,255,170,0.5)&#8221; background_color_gradient_end__hover=&#8221;rgba(0,115,206,0.75)&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_blend__hover=&#8221;multiply&#8221; background_color__hover=&#8221;&#8221; background_enable_color__hover=&#8221;off&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.8.1&#8243; height=&#8221;250px&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.9.7&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_the_Safety_Manager_have_to_be_a_company_employee\"><\/span>Does the Safety Manager have to be a company employee?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Not necessarily, it can be a<strong> department, unit or collegiate body<\/strong> external to the company. However, a natural person must always be appointed as a representative and a substitute to assume his functions in cases of absence, vacancy or illness.<\/p>\n<p>Due to the nature and complexity of its functions, we recommend that the CISO of your company be a<strong> technical professional with specialized knowledge in computer security<\/strong> , to be able to be hired specifically for this position or, in any case, promoted to this new position after receiving the complementary training that he may need.<\/p>\n<p>The professional profile should have the following capabilities:<\/p>\n<ul>\n<li><strong>Advanced computer skills<\/strong> , if possible with a university degree in Computer Engineering or similar.<\/li>\n<li>Specialized knowledge and experience in<strong> cybersecurity<\/strong> from the organizational, technical and legal points of view.<\/li>\n<li>Ability to participate in all matters relating to security, maintaining a<strong> communication<\/strong> real and effective with the direction of the company.<\/li>\n<li>Capacity of<strong> independence<\/strong> with respect to those responsible for the company&#8217;s networks and information systems.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Edorteam, as specialists in digital security with more than 25 years of experience, we will be a<strong> valuable support for your Security Manager<\/strong> helping him in his training and new functions.<\/p>\n<p>Our<strong> IT department<\/strong> It will not only be in charge of analyzing the cybersecurity of your company and identifying possible threats, it will also propose<strong> software solutions<\/strong> to meet the standards required by regulations. All under the supervision of our<strong> legal department<\/strong> , made up of lawyers and data protection specialists to guarantee full legal compliance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At our previous entry We inform you of the entry into force of Royal Decree 43\/2021, by which all essential service companies and digital service providers must designate their Responsible for Information Security or CISO ( Chief Information Security Officer ). Broadly speaking, this figure must be designated no later than April 27 of this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5260,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[110],"tags":[116,112,115,113],"class_list":["post-6409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-ciso-en","tag-information-technology","tag-responsible-for-security","tag-security-of-the-information"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the functions of the Information Security Officer or CISO?<\/title>\n<meta name=\"description\" content=\"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the functions of the Information Security Officer or CISO?\" \/>\n<meta property=\"og:description\" content=\"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\" \/>\n<meta property=\"og:site_name\" content=\"Edorteam\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edorteam\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-26T10:57:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-19T12:36:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"672\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Edorteam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@edorteam\" \/>\n<meta name=\"twitter:site\" content=\"@edorteam\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edorteam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\"},\"author\":{\"name\":\"Edorteam\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6\"},\"headline\":\"What are the functions of the Information Security Officer or CISO?\",\"datePublished\":\"2021-02-26T10:57:11+00:00\",\"dateModified\":\"2021-07-19T12:36:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\"},\"wordCount\":1402,\"commentCount\":11,\"publisher\":{\"@id\":\"https:\/\/edorteam.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg\",\"keywords\":[\"ciso\",\"information technology\",\"responsible for security\",\"security of the information\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\",\"url\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\",\"name\":\"What are the functions of the Information Security Officer or CISO?\",\"isPartOf\":{\"@id\":\"https:\/\/edorteam.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg\",\"datePublished\":\"2021-02-26T10:57:11+00:00\",\"dateModified\":\"2021-07-19T12:36:34+00:00\",\"description\":\"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?\",\"breadcrumb\":{\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage\",\"url\":\"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg\",\"contentUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg\",\"width\":1600,\"height\":672},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/edorteam.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the functions of the Information Security Officer or CISO?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/edorteam.com\/en\/#website\",\"url\":\"https:\/\/edorteam.com\/en\/\",\"name\":\"Consultor\u00eda Compliance y protecci\u00f3n de datos\",\"description\":\"Empresa de Ciberseguridad y Protecci\u00f3n de Datos\",\"publisher\":{\"@id\":\"https:\/\/edorteam.com\/en\/#organization\"},\"alternateName\":\"Edorteam\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/edorteam.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/edorteam.com\/en\/#organization\",\"name\":\"Edorteam | Cibersecurity services and data protection company\",\"alternateName\":\"Edorteam\",\"url\":\"https:\/\/edorteam.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png\",\"contentUrl\":\"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Edorteam | Cibersecurity services and data protection company\"},\"image\":{\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/edorteam\/\",\"https:\/\/x.com\/edorteam\",\"https:\/\/www.linkedin.com\/company\/edorteam\/\",\"https:\/\/www.instagram.com\/edorteam\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6\",\"name\":\"Edorteam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/edorteam.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"caption\":\"Edorteam\"},\"sameAs\":[\"http:\/\/edorteam.com\"],\"url\":\"https:\/\/edorteam.com\/en\/author\/web_edorteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the functions of the Information Security Officer or CISO?","description":"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","og_locale":"en_US","og_type":"article","og_title":"What are the functions of the Information Security Officer or CISO?","og_description":"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?","og_url":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","og_site_name":"Edorteam","article_publisher":"https:\/\/www.facebook.com\/edorteam\/","article_published_time":"2021-02-26T10:57:11+00:00","article_modified_time":"2021-07-19T12:36:34+00:00","og_image":[{"width":1600,"height":672,"url":"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","type":"image\/jpeg"}],"author":"Edorteam","twitter_card":"summary_large_image","twitter_creator":"@edorteam","twitter_site":"@edorteam","twitter_misc":{"Written by":"Edorteam","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#article","isPartOf":{"@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"},"author":{"name":"Edorteam","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6"},"headline":"What are the functions of the Information Security Officer or CISO?","datePublished":"2021-02-26T10:57:11+00:00","dateModified":"2021-07-19T12:36:34+00:00","mainEntityOfPage":{"@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"},"wordCount":1402,"commentCount":11,"publisher":{"@id":"https:\/\/edorteam.com\/en\/#organization"},"image":{"@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","keywords":["ciso","information technology","responsible for security","security of the information"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","url":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","name":"What are the functions of the Information Security Officer or CISO?","isPartOf":{"@id":"https:\/\/edorteam.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage"},"image":{"@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","datePublished":"2021-02-26T10:57:11+00:00","dateModified":"2021-07-19T12:36:34+00:00","description":"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?","breadcrumb":{"@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage","url":"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","contentUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","width":1600,"height":672},{"@type":"BreadcrumbList","@id":"https:\/\/edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/edorteam.com\/en\/"},{"@type":"ListItem","position":2,"name":"What are the functions of the Information Security Officer or CISO?"}]},{"@type":"WebSite","@id":"https:\/\/edorteam.com\/en\/#website","url":"https:\/\/edorteam.com\/en\/","name":"Consultor\u00eda Compliance y protecci\u00f3n de datos","description":"Empresa de Ciberseguridad y Protecci\u00f3n de Datos","publisher":{"@id":"https:\/\/edorteam.com\/en\/#organization"},"alternateName":"Edorteam","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/edorteam.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/edorteam.com\/en\/#organization","name":"Edorteam | Cibersecurity services and data protection company","alternateName":"Edorteam","url":"https:\/\/edorteam.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png","contentUrl":"https:\/\/edorteam.com\/wp-content\/uploads\/cropped-favicon.png","width":512,"height":512,"caption":"Edorteam | Cibersecurity services and data protection company"},"image":{"@id":"https:\/\/edorteam.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edorteam\/","https:\/\/x.com\/edorteam","https:\/\/www.linkedin.com\/company\/edorteam\/","https:\/\/www.instagram.com\/edorteam\/"]},{"@type":"Person","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/8d561d676383bddf2086b1de4aec37b6","name":"Edorteam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/edorteam.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","caption":"Edorteam"},"sameAs":["http:\/\/edorteam.com"],"url":"https:\/\/edorteam.com\/en\/author\/web_edorteam\/"}]}},"_links":{"self":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/comments?post=6409"}],"version-history":[{"count":0,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6409\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/media\/5260"}],"wp:attachment":[{"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/media?parent=6409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/categories?post=6409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edorteam.com\/en\/wp-json\/wp\/v2\/tags?post=6409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}