March 2025 | 5 minutes
Cybersecurity field guide: Building relationships
From CISO to business leader: A field guide for cybersecurity success
Part 3: Relationships

To effectively execute plans, build trust, and drive cybersecurity initiatives, new CISOs must navigate the triad of time, talent, and relationships.
This field guide provides CISOs with insights to succeed and navigate the ever-changing cyber landscape while prioritizing business objectives. As a CISO, you can make a significant impact on your organization and society. By leveraging this guide, you can confidently position yourself as a leader and achieve your goals by focusing on relationships.
Quick take: Building strong relationships
Secure support early on. CISOs need high-level sponsors in the organization to effectively execute their plans.
Understand stakeholder objectives. Meet with stakeholders in the C-suite to understand their goals and what IT support they will require.
Communicate value. Clearly share the cybersecurity team’s achievements, upcoming improvements, and how they benefit the business.
Establish a brand that focuses on outcomes. Maintain a laser-like focus on outcomes and creating value, and track both current and future performance to showcase progress and build trust with the business.
Cyber doesn’t exist in a bubble
Developing and maintaining a broad and diverse network is critical for a CISO’s professional growth and advancement, but sometimes a CISO’s relationship with the business can be hindered by the organization’s history. Depending on the previous culture, the CISO may inherit a cybersecurity team that is perceived as an “Office of No” rather than a business enabler. In some cases, the CISO will need to repair relationships between the cyber team and the rest of the company.
This can be a challenging task that requires talent adjustments, culture shifts, and a strong commitment to consistent timelines. There are no quick fixes, but a concerted effort can yield positive results.
Relationships with other C-suite titles
It’s crucial to establish strong relationships early on, especially with the chief executive officer (CEO), chief financial officer (CFO), chief risk officer (CRO), chief legal officer (CLO), chief data/technology officer (CDO/CTO), and chief information officer (CIO). Without their support, it can be challenging to cultivate a culture of risk awareness across the organization, contribute to strategic decisions, and earn a seat at the executive table.
Building a network of peers, including other CISOs, can also provide valuable guidance and support. However, it’s important to note these relationships take time and must be earned through a mix of business, financial, and risk acumen.
Relationships with the board
Often, the CISO is translating not only cyber risk, but how it intersects with enterprise risk and technology risk. This requires building relationships outside of cybersecurity to bring data into a unified report and to make sure board members and executives have the right understanding of that risk.
For example, imagine a large financial institution is planning to launch a new online banking platform. The CISO needs to ensure this platform is secure from cyberthreats. However, the CISO’s role isn’t just about identifying cyber risks; it’s also about understanding how these risks intersect with broader enterprise risks (like regulatory compliance and reputational damage) and technology risks (such as system outages or data loss).
To do this effectively, the CISO needs to build a network with various departments, including IT, legal, compliance, and marketing. By collaborating with these teams, the CISO can gather comprehensive data on potential risks and create a unified report that highlights cyber, enterprise, and technology risks.
Relationships with external firms
Collaborating with market-leading firms can helps CISOs improve their organization’s cybersecurity strategy plans and make better decisions. These companies bring valuable experience and fresh ideas, helping to cover any skill gaps and offering new ways to tackle security threats. Building long-term relationships with these firms encourages ongoing improvement, aligns everyone on common goals, and ensures clear communication, leading to stronger and more effective cybersecurity practices.
Relationship with internal audit
Another relationship a CISO should prioritize is with internal audit (IA). Mature organizations use the IA function as a second set of eyes—to vet new solutions or initiatives, to get budget support, or to highlight risks that aren’t getting attention.
Cyber teams can sometimes feel like IA is hindering the team’s goals. But this point of view often stems from a poor relationship or lack of communication.
In conclusion
Remember, cybersecurity does not exist in a vacuum. It requires a concerted effort to integrate cyber risk with enterprise and technology risks, ensuring that all stakeholders—including board members, executives, and IA—have a comprehensive understanding of the threat landscape.
As you move forward in your journey, prioritize building these critical relationships and consider taking advice from market-leading firms that have a broad perspective. They are the foundation upon which you can create a resilient and forward-thinking cybersecurity strategy that not only protects your organization but also empowers it to achieve its objectives.
Next up
In our next series, we’ll delve into CISO communication and reporting to the board.

Cyber solutions
Deloitte offers a unified approach to help you tackle obstacles and build new capabilities fast. Leverage our breadth of solutions and cybersecurity leading practices that can help you transform your organization and achieve success, wherever you are on your journey.
Cyber solutions
Deloitte offers a unified approach to help you tackle obstacles and build new capabilities fast. Leverage our breadth of solutions and cybersecurity leading practices that can help you transform your organization and achieve success, wherever you are on your journey.
Learn more
View previous issues
Let's chat
We’d love to hear what you think—reach out with feedback and suggestions for future topics.
Contact us
1 / 3