May's Blog

✨ Written with help of AI

If you’ve ever watched a shonen anime protagonist walk into a battle with a plan, intel, and the right teammates, you’ve seen what a good CISO looks like under pressure. The bad version? Think “charging in with a flashy weapon and no map.” In security, flashy tools without strategy are just cosplay.

What this post covers:

Why this matters: attackers move faster than org charts. The CISO’s job isn’t to be a superhero—it’s to build a system where ordinary humans can do the secure thing easily and consistently 1 2 3 4.

Good CISO vs Bad CISO: A Field Guide

Strategy and Alignment

What to do:

Asset and Identity First

What to do:

Cloud and SaaS Reality

What to do:

Incident Response and Preparedness

What to do:

People, Culture, and Communication

What to do:

Metrics That Matter

What to do:

Governance and Third-Party Risk

What to do:

Compliance, But Not Compliance-Only

What to do:

Leadership Traits

What to do:

A 30/60/90-Day Blueprint for New CISOs

Open-Source Allies You Should Know

If you’ve followed my work, you know I’ll always advocate for transparent, auditable tooling. Great complements or alternatives to commercial stacks:

Open source isn’t just about cost—it’s about control surfaces you can inspect and integrate with your engineering culture. Pair with managed offerings when you need enterprise-grade support.

Security Implications You Can’t Ignore

Practical Checklist: Are You Acting Like a Good CISO?

A Quick Anime Analogy (because you knew this was coming)

A good CISO runs security like the scout regiment in Attack on Titan—constant reconnaissance, tight comms, and trust built on repetition and shared playbooks. A bad CISO? Giant wall, no scouts, and hoping the Titans respect audit season. Hope isn’t a control.

Closing Thoughts

Good CISOs don’t promise “unhackable.” They build adaptive systems, measure exposure honestly, and make the secure path the easy path. If you’re stepping into the role—or evaluating your current posture—start with identity, inventory, and incident rehearsals. Then align everything to risk reduction the business cares about.

What signals of good or bad CISO leadership have you seen in the wild? Which open-source tools are non-negotiable in your stack? I’d love to hear your stories and war-room lessons in the comments.


  1. Cyberday: 10 Most Important Tasks for a CISO and Tips for Being Successful – https://www.cyberday.ai/blog/10-most-important-tasks-for-a-ciso-and-tips-for-being-successful ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  2. EC-Council: CISO Guide to Information Security Leadership – https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-guide-to-information-security-leadership/ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  3. Carnegie Mellon SEI: The Top 10 Skills CISOs Need in 2024 – https://www.sei.cmu.edu/blog/the-top-10-skills-cisos-need-in-2024/ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  4. UpGuard: What Makes an Effective and Successful CISO – https://www.upguard.com/blog/what-makes-an-effective-and-successful-ciso ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  5. CISOShare: Best Practices – Top Steps Every CISO Should Follow – https://cisoshare.com/resources/best-practices-top-steps-every-ciso-should-follow ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  6. Indiana University: Information Security Best Practices – https://informationsecurity.iu.edu/resources-professionals/best-practices.html ↩︎ ↩︎ ↩︎ ↩︎

  7. Orca Security: CISO Best Practices – Cloud Security Reinvented – https://orca.security/resources/blog/ciso-best-practices-cloud-security-reinvented/ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  8. GitProtect: CISO Practical Guide – 10 Steps Every CISO Should Take – https://gitprotect.io/blog/ciso-practical-guide-10-steps-every-ciso-should-take/ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎ ↩︎

  9. UCLA: Security Best Practices – https://ociso.ucla.edu/security-best-practices ↩︎