{"id":9542,"date":"2020-06-09T12:42:22","date_gmt":"2020-06-09T02:42:22","guid":{"rendered":"https:\/\/nsrd.info\/blog\/?p=9542"},"modified":"2020-06-09T12:42:26","modified_gmt":"2020-06-09T02:42:26","slug":"id-like-to-speak-to-your-cipo-please","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2020\/06\/09\/id-like-to-speak-to-your-cipo-please\/","title":{"rendered":"I&#8217;d like to speak to your CIPO, please"},"content":{"rendered":"\n<p>Chief Information Officers.<\/p>\n\n\n\n<p>Chief Information Security Officers.<\/p>\n\n\n\n<p>You see those roles, and variants of them advertised all the time. And to be perfectly frank, I&#8217;m kind of tired of hearing that I need to talk to CISOs. Sure, CISOs fulfil a function, after almost 25 years of working in data protection, I want to start talking to <strong>CIPOs<\/strong>: <em>Chief Information Protection Officers<\/em>. (To be honest, I&#8217;m kicking myself I didn&#8217;t think to use this term in the <strong><a aria-label=\"second edition of Data Protection (opens in a new tab)\" href=\"https:\/\/www.amazon.com\/Data-Protection-Ensuring-Availability-ebook\/dp\/B087VZGYQ9\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"aioseop-link\">second edition of Data Protection<\/a><\/strong>. In the past, I&#8217;ve focused on the notion of a data protection <em>advocate<\/em>, which evolved over time to be a data protection <em>architect<\/em>.)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"599\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/06\/bigStock-Corporate-Executive.jpg\" alt=\"Corporate executive\" class=\"wp-image-9555\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/06\/bigStock-Corporate-Executive.jpg 900w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/06\/bigStock-Corporate-Executive-300x200.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/06\/bigStock-Corporate-Executive-768x511.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption>Where are the CIPO roles?<\/figcaption><\/figure>\n\n\n\n<p>It&#8217;s not just the case that I&#8217;d like to start talking to your CIPOs \u2014 I genuinely think you actually need CIPOs as well. Here are seven reasons why:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Your data isn&#8217;t stored all in the same place. <\/strong>It used to be that your infrastructure storage leader would also be in charge of data protection. But it now only <em>partly<\/em> resides within your on-premises infrastructure. You&#8217;ve also got data sitting in a variety of public clouds, the edge, IoT, and mobile. Each of the leaders for those areas has their own focus \u2013\u00a0you need someone above them to be responsible for data protection.<\/li><li><strong>Data and business continuity have interdependencies<\/strong>. Following from the above, the interdependencies between different sets of data, and therefore business continuity, is real and potentially complex. Someone who is sitting at the management coal-face (e.g., a leader of the storage infrastructure) can&#8217;t &#8220;see the forest for the trees&#8221;, so to speak. You need someone <em>above<\/em> the different data leads who can provide oversight on protection policies.<\/li><li><strong>You have more protection data than you do regular data<\/strong>. Depending on what your long-term retention policies are, your protection data may represent up to 95% (or even <em>more<\/em>) of the data your business holds. Isn&#8217;t that in itself enough to warrant having a C-level IT executive managing it?<\/li><li><strong>Security officers can&#8217;t devote the time to be data storage protection experts<\/strong>. The CISO fulfils an important function, for sure \u2013\u00a0I&#8217;m not going to dispute that. But CISOs have their own area of expertise that they have to focus on in order to do their job. Asking them to also straddle the fields of data <em>security<\/em> protection and <em>storage<\/em> protection is <em>too much<\/em>.<\/li><li><strong>Risk officers can&#8217;t devote the time to be data storage protection experts<\/strong>. The other area you might turn instead of a CISO is a chief risk officer. Yet risk officers are (justifiably) more likely to come from a formal business background than an IT background since there&#8217;s a lot more involved in risk than just IT-related issues. For the same reason as (4), above, your risk officers can&#8217;t spend the time becoming data storage protection leads.<\/li><li><strong>Isn&#8217;t data the new oil?<\/strong> OK, it&#8217;s almost become a clich\u00e9d term. Still, data is the true wealth of many businesses, regardless of whether it&#8217;s customer account data, intellectual property\/patents, patient records \u2013 whatever the stream of the business, it&#8217;s very likely that much of the <em>worth<\/em> of the business comes from the data it holds. Surely that in itself warrants having a CIPO?<\/li><li><strong>Your business has an accountability problem<\/strong>. If there is one constant I&#8217;ve experienced in all my years of data protection, it&#8217;s that no-one ever seems accountable for making a final decision on things like &#8220;what data do we keep?&#8221;, &#8220;how long do we keep compliance copies for?&#8221; and &#8220;when do we delete data?&#8221; (I can&#8217;t count the number of times when I&#8217;ve been in discussions where someone has argued &#8220;the manager responsible for that has left, and no-one wants to take ownership of it&#8221;, so a bucket of data just sits and eats away at primary and protection storage like <em>cancer<\/em>.) Theoretically, the buck should stop with the CIO, but in practice, the buck sort of fritters away and disappears a long time before it reaches the CIO&#8217;s desk.<\/li><\/ol>\n\n\n\n<p>If your business actually truly values data, its next executive hire should be a <strong>CIPO<\/strong>. And I&#8217;d like to speak to them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chief Information Officers. Chief Information Security Officers. You see those roles, and variants of them advertised all the time. And&hellip;<\/p>\n","protected":false},"author":1,"featured_media":9557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1133,13],"tags":[1569,1570,1568],"class_list":["post-9542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practice","category-general-thoughts","tag-cio","tag-cipo","tag-ciso"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2020\/06\/bigstock-Data-Visualisation.jpg","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-2tU","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=9542"}],"version-history":[{"count":5,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9542\/revisions"}],"predecessor-version":[{"id":9559,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/9542\/revisions\/9559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media\/9557"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=9542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=9542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=9542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}