Skip to main content

The Power of “Yes, And”: How CISOs Become Business Enablers Without Compromising Security


For many CISOs, the fastest way to erode influence inside the organization is to become known as “the department of no.”

While security leaders rarely intend to block the business, the perception often forms when conversations start—and end—with constraints, risk statements, or policy violations.

The more effective approach is not lowering standards or accepting unmanaged risk. It is changing how the conversation begins.

This is where the power of “Yes, and” becomes a practical leadership tool.


Why “No” Damages Security Outcomes

When security defaults to “no,” several things happen:

  • Business leaders stop engaging early and bring security in late

  • Risk decisions move underground and outside governance

  • Security teams are viewed as compliance obstacles, not partners

  • CISOs lose the opportunity to shape how the business moves forward

Ironically, this increases risk rather than reducing it.

Security does not win by being correct. Security wins by being included.


What “Yes, And” Actually Means in a Security Context

“Yes, and” does not mean unconditional approval.

It means:

  • Acknowledging the business goal as legitimate

  • Aligning security to that objective

  • Introducing guardrails after demonstrating partnership

“Yes, and” reframes the conversation from opposition to collaboration.

Instead of:

“No, you can’t do that—it’s against policy.”

The conversation becomes:

“Yes, I understand why this matters to the business, and here’s how we can achieve it while managing the risk.”

The difference is subtle. The impact is profound.


Practical Examples CISOs Encounter Every Day

Cloud Access Request

  • No mindset: “No, this SaaS is not approved.”

  • Yes, and mindset: “Yes, I see how this SaaS accelerates your team, and we’ll need SSO, logging, and data classification before rollout.”

Remote or Third-Party Access

  • No mindset: “No external access to production.”

  • Yes, and mindset: “Yes, vendor access can support uptime, and we’ll enforce MFA, time-bound access, and audit trails.”

New Digital Initiative

  • No mindset: “No, this creates unacceptable risk.”

  • Yes, and mindset: “Yes, this aligns with growth goals, and here’s what we need architecturally to keep risk within tolerance.”

In each case, security still defines the control requirements. The difference is how they are introduced.


Why This Builds Credibility, Not Weakness

Some CISOs worry that “yes” language signals softness or loss of authority. In practice, the opposite is true.

Consistent use of “Yes, and”:

  • Builds trust with senior leaders

  • Positions security as a problem solver

  • Encourages earlier engagement

  • Preserves the CISO’s right to escalate when risk is truly unacceptable

When teams feel heard, they accept constraints more readily.


From Policy Enforcer to Business Enabler

CISOs who master this approach are no longer seen as gatekeepers. They are viewed as:

  • Strategic advisors

  • Risk translators

  • Partners in execution

This does not dilute security rigor—it strengthens it by embedding security into business motion rather than resisting it.


A Final Thought for Security Leaders

Every conversation is an opportunity to reinforce the role security plays in enabling the organization’s mission.

Start with yes to the business objective.
Use and to define responsible execution.

That single linguistic shift can be the difference between security being tolerated and security being trusted.


Comments

Popular posts from this blog

The associated risks of the NIST CSF

In this series, I am hopefully going to explain the risks associated with the NIST CSF and associated controls.  I will primarily focus on NIST controls.  I intend to review each NIST CSF control individually and help understand the risks associated with not satisfying that control.  This series should help you know which controls are essential for your business when developing your profile.  The information can be further extended to developing scorecards and metrics for your information security program. 

Asset Management - Physical Devices - What do you have? Do you know?

Asset management and inventorying your physical systems, we all know we should do it, and I am sure most try.  I am not going to talk about the should have, would have or could have. Instead, I am going to focus on the risks associated with the NIST CSF control ID-AM.1.   The control simply states, “Physical devices and systems within the organization are inventoried.”  At the simplest level, this control is saying that the organization inventories all physical systems that are apart of the information system. In my opinion, the control is foundational because how can you secure something if you don't know it exists.  If you are not inventorying your systems, how do you know if they have adequate controls to protect the data and network.   If you had a breach of data, would you know what type of data was involved, or would you even know if you had a breach?  To further extend this, how can you perform a risk assessment on the system to understand and relay ...

Vulnerability Management… It’s easy - Planning

I am sure you have had either consultants, vendors, or heard at a conference that vulnerability management is foundational security control.  While I agree that it is an essential control, I also understand that it is challenging to implement.  Vulnerability management is not just to pick a tool, scan, and fix issues.  Many components make it a complicated journey.  This series will attempt to help break it down and give you ideas on how this complex service and be delivered effectively.    Planning   Objective When you start, I recommend creating a targeted objective and set of measures against your objective.   Ensure that you keep in mind your organization’s culture, politics, and risk appetite as you are developing your objective.   I have seen some target just “critical” systems for regulatory compliance, whereas others have targeted their entire enterprise.   No matter your scope, keep in mind your team’s current resource...