Hack The Box: Cybersecurity Training
Popular Topics
  • JOIN NOW
ALL Red Teaming Blue Teaming Cyber Teams Education CISO Diaries Customer Stories Write-Ups CVE Explained News Career Stories Humans of HTB Attack Anatomy Artificial Intelligence

CISO Diaries

6 min read

How CISO roles have evolved with GRC

As cyberattacks become a top-of-mind concern CISOs are having to step up their c-suite presence, prepare for strict reporting requirements, and deal with rising stakes.

Howard Poston avatar

Howard Poston,
Jul 24
2024

Cyber Teams
Hack The Box Article

CISOs wear many hats, including managing the company’s cybersecurity-related Governance, Risk, and Compliance (GRC) program.

However, as cybersecurity and data protection laws and regulations grow more numerous and prescriptive, CISOs are increasingly called to act as GRC experts as well as offering their critical security knowledge and business acumen.

GSC frameworks for security leaders

How has the role of a CISO evolved?

The role of the CISO has always been to act as the head of an organization’s cybersecurity program.

 This involves protecting it against potential cyberattacks while maintaining compliance with the requirements of cybersecurity-related regulations, such as PCI DSS

Loading Preview...

, GDPR

Loading Preview...

, HIPAA

Loading Preview...

, and others.

The high-level job description of a CISO has remained relatively constant, but it has changed significantly in the details, even over the last few years. Some of the more significant trends include:

  • C-suite presence: Historically, CISOs often reported to the CIO or head of IT, reflecting their role as one part of the “technology” part of the business. More recently, CISO roles are reporting directly to the CEO as cyberattacks become a top-of-mind concern. In fact, nearly half of CISOs

    Loading Preview...

    now report directly to the CEO.

  • Compliance creep: CISOs have always been required to maintain compliance with regulatory requirements. And these responsibilities are expanding over time. When the EU enacted GDPR, this kicked off a wave of data protection laws. Meanwhile, new technologies such as artificial intelligence (AI) have driven the creation of many new laws and standards governing security.

  • Prescriptive requirements: As data privacy laws evolve, they increasingly include requirements that mandate that a CISO implement certain security solutions or capabilities. For example, the SEC ruling on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies

    Loading Preview...

    and the EU’s NIS2 law

    Loading Preview...

    created new breach reporting deadlines (four days and 24 hours, respectively) that require CISOs to have certain incident response plans

    Loading Preview...

    and capabilities in place.

  • Rising stakes: The growth of regulations also comes with higher stakes for non-compliance and security incidents. While many penalties for data breaches amount to a slap on the wrist, new regulations are expanding enforcement powers and maximum allowable penalties. For example, NIS2, which goes into full effect in Europe later this year, allows executives to be held personally responsible

    Loading Preview...

    for gross negligence and takes a “name and shame” approach to incentivizing compliance.

How can GRC and cybersecurity work together?

GRC makes up only a fraction of a CISO’s duties. And cybersecurity regulations are only one aspect of a corporate compliance program. Collaboration between the two functions offers significant benefits for both.

The GRC function is all about protecting data and systems, which falls squarely within the CISO’s wheelhouse. If a CISO does their job well—implementing strong cyber defenses, preventing breaches, and maintaining full visibility into what’s going on in their systems—then cybersecurity GRC becomes easier.

A GRC program also supports CISOs who are asking themselves questions like:

  • What do I need to do to secure my systems?

  • How do I demonstrate value and ROI to the business?

  • Is purchasing X worth the money?

  • How do we improve?

As cybersecurity regulations become more numerous and prescriptive, they also lay out a roadmap for how an organization can architect its cybersecurity programs. 

If a regulation requires a firewall, then the business needs a firewall. If the company needs to be able to prove that its data hasn’t been breached, then the CISO needs to know: 

  • What data they have.

  • Its classification level.

  • How it’s protected.

  • And who has accessed it.

That said, taking a check-the-box approach to cybersecurity compliance is a bad idea because cybersecurity regulations define the minimum acceptable level of security, so they often lag behind the technology. There are also an increasing number of regulations, so the checklist keeps growing.

However, the CISO can get ahead of the regulations by following some of the great cybersecurity standards out there such as the NIST CSF 2.0

Loading Preview...

. These frameworks lay out the structure of a cybersecurity program, metrics for evaluation, and a path to strong security. 

Building around a framework like NIST and mapping its controls to various regulations creates a secure, sustainable cybersecurity program. Doing this also requires the help of GRC.

How GRC supports CISOs



Benefits for CISOs aligned with GRC

CISOs and GRC programs have complementary skill sets and overlapping priorities. A CISO who prioritizes compliance and works to maintain a close relationship with your GRC teams can reap various benefits, including:

Enterprise-wide alignment 

CISOs are responsible for the cybersecurity aspect of GRC, but this is only a portion of an organization’s regulatory responsibilities. Working to align the CISO's responsibilities with GRC provides CISOs with access to more resources and support and makes the GRC portion of their job easier.

Streamlined compliance management

Whether they like it or not, CISOs will need to generate compliance reports and undergo regular audits for various regulations. Maintaining a tight partnership with your GRC teams helps ensure that they’re ready for these and can help eliminate last-minute scrambling or potentially failing an audit.

Improved security posture: 

The goal of data protection regulations and other cybersecurity laws is to prevent data breaches and other security incidents. While regulations outline minimum security requirements, they offer a solid foundation and guidelines for improving a corporate cybersecurity program.

Improving cybersecurity and GRC with HTB

Achieving and maintaining compliance with a patchwork of regulatory requirements poses a significant challenge for CISOs. One vital aspect of this is verifying that existing security controls and processes both meet regulatory requirements and effectively protect the business against data breaches and other cyber threats.

HTB offers enterprises the tools they need to build core skills and effectively test their cybersecurity and compliance programs. For example, the DFIR labs for incident response

Loading Preview...

provide valuable skills training for blue teams looking to meet strict new incident reporting deadlines.

Choose HTB to boost your cyber performance

  • Risk mitigation: Timely content offers training on the latest CVEs in real-world environments, reducing risk and exposure to these vulnerabilities.

  • Employee retention: Cybersecurity teams that are offered upskilling opportunities are far more engaged and less likely to burn out.

  • Performance benchmarking: Conduct CTFs and gap analysis to identify weaknesses in your security posture.

  • Tailored training to industry standards: HTB content is mapped to MITRE ATT&CK and NIST NICE frameworks so you can assess your cyber preparedness in different areas.

  • Boost organizational awareness: HTB can assess cyber readiness and performance company-wide with effective practices like tabletop exercises (TTXs) or nearly practical assessments designed for security staff and non-technical teams.

GET A DEMO
 
START A FREE TRIAL
GET A DEMO FREE TRIAL

Contents

  • How has the role of a CISO evolved?
  • How can GRC and cybersecurity work together?
  • Benefits for CISOs aligned with GRC
    • Enterprise-wide alignment 
    • Streamlined compliance management
    • Improved security posture: 
  • Improving cybersecurity and GRC with HTB
  • Choose HTB to boost your cyber performance

Latest News

Hack the Box Blog

Humans of HTB

9 min read

Humans of HTB #12: Tassos's journey into engineering

duckarcher avatar duckarcher, May 30, 2025

Hack the Box Blog

News

5 min read

Building a threat-ready cyber workforce: Hack The Box 2025 Buyers Guide

b3rt0ll0 avatar b3rt0ll0, May 28, 2025

Hack the Box Blog

Customer Stories

3 min read

Ynov Campus students put their skills to the test in a thrilling CTF experience powered by Hack The Box

Noni avatar Noni, May 26, 2025

Hack The Blog

The latest news and updates, direct from Hack The Box

Read More
Hack The Box: Cybersecurity Training

The #1 platform to build attack-ready
teams and organizations.

Get a demo

Forrester wave leader Forrester wave leader
ISO 27001 ISO 27701 ISO 9001
G2 rating Capterra rating

Products
Teams
Courses & Certifications Cyber Ranges Enterprise Attack Simulations Cloud Infrastructure Simulations Capture The Flag Tabletop Exercises Talent Sourcing
Individuals
Courses & Certifications Hacking Labs Defensive Labs Red Team Labs Capture The Flag Job Board
Solutions
Job Roles
Red Teams Blue Teams Purple Teams
Industries
Government Higher Education Finance Professional Services
Use Cases
Technical Onboarding Team Benchmarking Candidate Assessment Threat Management Code Vulnerability Crisis Simulation Governance & Compliance
Resources
Community Blog Industry Reports Webinars AMAs Learn with HTB Customer Stories Cheat Sheets Compliance Sheets Glossary Guides & Templates Parrot OS Help Center
Programs
Channel & Resellers Ambassador Program Affiliate Program SME Program
Company
About us Careers Brand Guidelines Certificate Validation Trust Center Product Updates Status
Contact Us
Press Support Enterprise Sales
Partners
Become a Partner Register a Deal
Store
HTB Swag Buy Gift Cards
Products
Teams
Courses & Certifications Cyber Ranges Enterprise Attack Simulations Cloud Infrastructure Simulations Capture The Flag Tabletop Exercises Talent Sourcing

Individuals

Courses & Certifications Hacking Labs Defensive Labs Red Team Labs Capture The Flag Job Board
Solutions
Job Roles
Red Teams Blue Teams Purple Teams

Industries

Government Higher Education Finance Professional Services

Use Cases

Technical Onboarding Team Benchmarking Candidate Assessment Threat Management Code Vulnerability Crisis Simulation Governance & Compliance
Resources
Community Blog Industry Reports Webinars AMAs Learn with HTB Customer Stories Cheat Sheets Compliance Sheets Glossary Guides & Templates Parrot OS Help Center

Programs

Channel & Resellers Ambassador Program Affiliate Program SME Program
Company
About us Careers Brand Guidelines Certificate Validation Trust Center Product Updates Status

Contact Us

Press Support Enterprise Sales

Partners

Become a Partner Register a Deal

Store

HTB Swag Buy Gift Cards
Cookie Settings
Privacy Policy
User Agreement
© 2025 Hack The Box