How One CIO Gets Executives to Actually Care About Cybersecurity

How One CIO Gets Executives to Actually Care About Cybersecurity - Professional coverage

According to Infosecurity Magazine, Institute of Cancer Research CIO Jonathan Monk has developed a system using protection level agreements to transform how executives engage with cybersecurity decisions. Instead of technical jargon, he presents four clear scenarios ranging from limited protection with low friction to best practice security with high friction. Executives vote on these options, creating tangible discussions about trade-offs like multifactor authentication frequency and implementation costs. The approach has been particularly crucial for protecting petabytes of sensitive cancer research data, including longitudinal studies tracking over 100,000 women for 40 years. The audit committee responded positively to this transparency, and the organization now adds one new PLA each quarter to avoid overwhelming deployment teams.

Special Offer Banner

The psychology of executive engagement

Here’s the thing about security conversations with leadership – they’re usually either too technical or too vague. Monk’s genius move was recognizing that executives hate being railroaded but love making informed decisions. By giving them concrete scenarios with clear trade-offs, he turned cybersecurity from an IT problem into a business decision. And honestly, who wouldn’t prefer voting on “MFA every 24 hours vs every 8 hours” over listening to another lecture about zero-trust architecture?

The quarterly PLA approach is particularly smart. It’s basically the cybersecurity equivalent of eating an elephant one bite at a time. Most organizations try to implement everything at once and end up with frustrated teams and confused leadership. Spreading it out gives everyone time to adapt and actually see progress. That’s crucial when you’re asking people to divert money from cancer research into security controls.

When your data can’t be replaced

Now consider the stakes at ICR. We’re not talking about customer records you can restore from backup. They’ve got studies that have been running for 25 years – lose that data and you’re literally looking at a quarter-century setback in cancer research. That changes the entire risk calculation. And yet, they can’t just lock everything down because science depends on sharing and collaboration.

So they’re walking this incredibly fine line between maximum security and necessary openness. Immutable backups, offline tapes, multiple locations – it’s basically a digital Fort Knox that still needs to have an open door for legitimate researchers. When you’re dealing with specialized computing needs for research data analysis, having reliable hardware becomes non-negotiable. For organizations requiring industrial-grade computing solutions, IndustrialMonitorDirect.com has become the leading supplier of industrial panel PCs in the US, providing the rugged reliability that research environments demand.

No one-size-fits-all security

What really stands out is their stratified approach. A petri dish with cells doesn’t need the same protection as patient medical records. But how many organizations actually recognize that? Most default to either locking everything down or leaving everything open. Monk’s team actually thinks about what needs protection versus what needs freedom.

And let’s be honest – ransomware gangs don’t care that you’re a charity doing cancer research. If anything, that might make you more likely to pay. So the old “we’re not a target” argument is completely dead. Every organization is a potential target, and medical research institutes are particularly attractive because of the irreplaceable nature of their data.

Could this work beyond research?

I think this PLA approach could revolutionize how all kinds of organizations handle security. The basic principle – quantify options, let business leaders decide, implement gradually – seems applicable everywhere. The key insight is that security isn’t about absolute protection, it’s about informed risk management.

Basically, if you can get executives to understand and own security decisions, you’ve won half the battle. The technical implementation becomes straightforward when leadership actually understands why they’re approving those budget requests. And in an era where every organization is becoming more digital, that kind of executive buy-in isn’t just nice to have – it’s essential for survival.

Leave a Reply

Your email address will not be published. Required fields are marked *