Jim Routh

Naples, Florida, United States
29K followers 500+ connections

Join to view profile

Articles by Jim

  • Mentoring Principles & Practices

    Over two decades ago, I was fortunate to have been forced to reach out (to a lifeline) to the first Chief Information…

    22 Comments
  • "Give it to Mikey...he'll eat anything!" Why it makes more sense to generate an automated workflow from models.

    Effective cybersecurity leadership requires more than demonstrating compliance with strong controls; it requires a…

    14 Comments
  • How to Create Your Professional Development Plan

    Thirty years ago, if you joined a mature enterprise as an employee, you were told what skills you needed to learn, when…

    14 Comments
  • How I Got My Start in Cyber Security

    I've found that asking a cyber professional about their start in cybersecurity can be revealing and interesting. Most…

    50 Comments
  • Decoding the Board Room

    H1: Decoding the Boardroom H2: A Fortune 500 CISO's Guide to Winning Hearts and Budgets By: Jim Routh, Senior Advisor…

    10 Comments
  • TVA- Achieve consensus on top Cyber Risks

    Why TVA and not TVM? This is a good question and what I was thinking in 2005 was that I wanted to have a process in…

    5 Comments
  • The Alignment Report: A Transformational Leadership Tool

    A transformational leadership technique that can be highly effective is the use of an Alignment Report shared with your…

    2 Comments
  • KPIs for Cyber Security

    Not All Security Metrics are KPIs The statement, “Ignore/avoid cybersecurity metrics” is a contentious topic in the…

    10 Comments
  • CISO Transition

    Congratulations! You have started your journey toward your definition of post-CISO professional fulfillment. My parents…

    121 Comments
  • Digital Supply Chain Risks Require Board Oversight

    Digital supply chain risk requires board oversight Corporate Boards of Directors (BoD) can no longer ignore the…

    10 Comments

Activity

29K followers

See all activities

Licenses & Certifications

  • CSSLP

    IC2

    Issued
  • CISM

    ISACA

    Issued Expires

Volunteer Experience

Publications

  • Third Party Governance: Digital Identity

    ICIT

    This is for those that want a risk-management approach to third party risk management (TPRM) suitable for today’s attack surface and specific to the software supply chain. Identity management for cloud accounts used in software engineering are essential as a core component of third party risk.

    See publication
  • The Role of a CISO in Shaping Trust in the Age of Artificial Intelligence

    ICIT

    The Chief Information Security Officer (CISO) plays a vital role in AI governance, balancing risk management with seizing business opportunities. This paper defines the CISO's role in establishing an enterprise-specific AI Governance Framework and offers insights into the challenges and options for effective implementation.

    See publication
  • Identity as a First Line of Defense

    IDS Alliance

    Identity has evolved as a primary line of defense for cyber security and data science has emerged as a foundational component of digital identity management for an enterprise. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied to cybersecurity, and IAM within cybersecurity, fueled by data science fundamentals. Identity is being widely discussed as the next generation of the…

    Identity has evolved as a primary line of defense for cyber security and data science has emerged as a foundational component of digital identity management for an enterprise. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied to cybersecurity, and IAM within cybersecurity, fueled by data science fundamentals. Identity is being widely discussed as the next generation of the perimeter as businesses transform from legacy-based, on-premises environments to cloud-hosted and Software as a Service (SaaS) applications. The design of enterprise controls has to keep pace and evolve away from on-prem to cloud-native apps, using data science to drive model-driven security.

    The shift also fundamentally changed enterprise controls as on-premises IAM capabilities were substituted for access control in a cloud or SaaS deployment. However, threat actors also adjusted their approach, which meant the core IAM controls had to evolve with the tech. That saw the introduction of edge protection controls, such as using secure browsers rather than the traditional approach of virtual private network (VPN) tunnels.

    The use of identity for continuous risk management and verification is well established in fraud management within financial services. But what’s new is the maturity of machine learning algorithms, which enable enterprises to apply identity in a near real-time model.

    Traditionally, IAM practices relied on human labor to do the heavy lifting. Managers would have to approve employees’ access to resources, which created delays and workflow challenges and frustrated users. But a model-based approach reduces dependency on human behavior and increases reliance on models or near real-time decision-making to remove human involvement.

    The benefits are significant as IAM controls improve while the productivity of the entire workforce improves.

    See publication
  • The Role of Cybersecurity Leaders as Educators

    The Institute for Critical Infrastructure Technology

    The market for cyber security talent is getting scarcer every year yet the current practices in place by enterprises reflect an employment model that has been obsolete for many years. Cyber security leaders have to adjust their recruiting practices along with their leadership skills demonstrating a solid commitment to talent development to deal with the current market conditions. Unconventional techniques can enable cyber security leaders to both attract and grow diverse talent to meet the…

    The market for cyber security talent is getting scarcer every year yet the current practices in place by enterprises reflect an employment model that has been obsolete for many years. Cyber security leaders have to adjust their recruiting practices along with their leadership skills demonstrating a solid commitment to talent development to deal with the current market conditions. Unconventional techniques can enable cyber security leaders to both attract and grow diverse talent to meet the future needs of the enterprise without increasing compensation or recruiting fees. The key is to consistently demonstrate a commitment developing talent and make adjustments to roles enabling employees to have an opportunity to learn and master new skills that they choose.

    Cyber leaders have to collaborate with HR professionals to apply un-conventional techniques that are essential for the current and future market conditions. Enterprises can't hire cyber security professionals when they are needed due to the constraints of the limited supply of talent. The key is to shift the paradigm to hire top, diverse talent when you find it...not necessarily when you need it. Leaders should expand their networks and consistently recruit talent for loosely defined job categories with a minimum of requirements and encourage their teams to conduct exploratory interviews designed to understand what skills the candidate wishes to master. Top talent should be offered a role that is partially designed to give them an opportunity to learn what they wish to learn.

    Cyber leaders should spend 30% of their time each week on talent development for their employees. CSO/CISOs should identify the development needs for their stakeholders and design curriculums for all of their stakeholders. This demonstrates a shift toward CISOs as educators to provide a multifaceted curriculum for all stakeholders in addition to a demonstrated commitment to talent development for all employees.

    See publication
  • The Growing Obsolescence of Passwords

    ICIT Fellows Publication

    It's time for enterprises to develop an approach to eliminate the use of passwords. They served us well for 60+ years but digital consumers have too many digital assets to remember passwords for. Enterprises have an opportunity to shrink the attack surface, improve the digital experience and lower costs by implementing behavioral based authentication capabilities.

    See publication
  • Why Data Science is Foundational for an Advanced Cyber Program

    FS-ISAC Insights

    There are hundreds of new controls available when applying data science to cybersecurity control design within any enterprise. Most of these new controls don’t require a human action to initiate a risk management task or outcome. Models identify and track behavioral patterns using data streaming. Deviation from the patterns can be measured triggering a threshold of deviation that initiates an automated workflow to mitigate risk in milli seconds without a human involved. Cyber professionals…

    There are hundreds of new controls available when applying data science to cybersecurity control design within any enterprise. Most of these new controls don’t require a human action to initiate a risk management task or outcome. Models identify and track behavioral patterns using data streaming. Deviation from the patterns can be measured triggering a threshold of deviation that initiates an automated workflow to mitigate risk in milli seconds without a human involved. Cyber professionals enhance their analytic capabilities and adjusts control points based on transaction trends.

    See publication
  • Successful Women In Cybersecurity Podcast

    CSO Magazine & IT Security ONE2ONESummits-Reed Exibitions

  • FS-ISAC 3rd Party Software Security Working Group

    FS-ISAC

    White paper on 3 additive controls for a 3rd party vendor governance program specific to software security

  • Beautiful Security

    O'Reilly Media

    Chapter 11

    Other authors
    • John Viega

Honors & Awards

  • CSO Hall of Fame

    CSO Magazine

    Award winner for CSO Hall of Fame for 2020

  • Shared Assessments Lifetime Achievement Award

    Shared Assessments

    Honorees recognized for the contribution to cyber security resiliency over the course of their professional careers

  • Evanta 2017 Break Away Leadership Award

    Evanta

    This honor, built on peer recognition, spotlights CISOs who are revolutionizing their organization’s competitive position in the marketplace through visionary leadership and business transformation.

  • ISE Luminary Award

    ISE

    Founded in 2005, the ISE® Luminary Leadership Award is conferred on annual basis to an extraordinary industry executive at the ISE® North America Awards Gala. This prestigious award showcases and honors an outstanding leader and industry practitioner for their distinguished service, stewardship and contributions in advancing the information security industry.

  • Information Security Executive of the Year Award 2014 North America- Healthcare

    T.E.N.

  • BITS Leadership Award

    BITS

    Recognition for leadership of cross sector working group on Supply Chain Security

  • ISE Northeast Award 2009

    T.E.N.

Organizations

  • NYU

    Adjunct Faculty Member

    - Present

    I design cybersecurity related content for the Tandon School of Business for NYU

Recommendations received

55 people have recommended Jim

Join now to view

View Jim’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jim directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses