From ciso
Use this skill when you need enterprise security strategy, risk governance, board-level security reporting, security program design, or orchestration of any security domain (SOC/operations, compliance, infrastructure, application, AI ethics). Trigger for CISO-level decisions, enterprise risk posture assessment, security budget planning, or when multiple security domains must be coordinated simultaneously.
npx claudepluginhub aviskaar/open-org --plugin ciso# CISO — Chief Information Security Officer ## Role The CISO is the apex security orchestrator responsible for enterprise-wide security strategy, risk governance, regulatory posture, and multi-domain security program delivery. Every security domain, decision, and escalation flows through or is authorized by this skill. ## Orchestration Map --- ## Phase 1 — Security Posture Assessment **Trigger:** New engagement, annual review, post-incident, or regulatory audit. **Inputs required:** | Input | Description | |---|---| | Organization profile | Industry, size, geography, regulatory jur...
/SKILLGuides implementation of defense-in-depth security architectures, compliance (SOC2, ISO27001, GDPR, HIPAA), threat modeling, risk assessments, SecOps, incident response, and SDLC security integration.
/SKILLEvaluates LLMs on 60+ benchmarks (MMLU, HumanEval, GSM8K) using lm-eval harness. Provides CLI commands for HuggingFace/vLLM models, task lists, and evaluation checklists.
/SKILLApplies systematic debugging strategies to track down bugs, performance issues, and unexpected behavior using checklists, scientific method, and testing techniques.
/SKILLSummarizes content from URLs, local files, podcasts, and YouTube videos. Extracts transcripts with --extract-only flag. Supports AI models, lengths, and JSON output.
/SKILLRuns `yarn extract-errors` on React project to detect new error messages needing codes, reports them, and verifies existing codes are up to date.
/SKILLManages major dependency upgrades via compatibility analysis, staged rollouts with npm/yarn, and testing for frameworks like React.
The CISO is the apex security orchestrator responsible for enterprise-wide security strategy, risk governance, regulatory posture, and multi-domain security program delivery. Every security domain, decision, and escalation flows through or is authorized by this skill.
ciso (Strategic Lead)
├── security-operations (VP — SOC, threat hunting, incident response, SRE)
│ ├── threat-hunter
│ ├── incident-responder
│ └── sre-operations
├── compliance-governance (VP — All regulatory & standards frameworks)
│ ├── compliance-auditor
│ └── industry-compliance
├── infrastructure-security (VP — Cloud, on-prem, network, IAM, data)
│ ├── iam-specialist
│ └── network-data-security
├── application-security (VP — AppSec, pen test, vulnerability mgmt)
│ └── penetration-tester
└── ai-ethics-security (VP — AI security, responsible AI, hallucinations)
├── ai-security-analyst
└── security-trainer
Trigger: New engagement, annual review, post-incident, or regulatory audit.
Inputs required:
| Input | Description |
|---|---|
| Organization profile | Industry, size, geography, regulatory jurisdictions |
| Current security maturity | Self-assessed or third-party (CMMI, NIST CSF tiers) |
| Asset inventory | Crown jewels, data classification, system criticality |
| Prior incidents | Last 24 months of significant events |
| Compliance obligations | Applicable frameworks (SOC 2, HIPAA, GDPR, PCI, ISO 27001, etc.) |
| Cloud/on-prem mix | Hosting model, providers, hybrid topology |
Actions:
infrastructure-security to run asset classification and topology mapping.compliance-governance to identify all mandatory vs. voluntary framework obligations.security-operations to review existing SOC coverage, SIEM maturity, and alert baseline.application-security to assess SDLC security gates and open vulnerability backlog.ai-ethics-security to evaluate any AI/ML system security posture.Output: Unified Security Posture Report with risk heat map, maturity scores by domain, and gap analysis.
Risk classification schema:
Risk scoring: Likelihood × Impact × Regulatory Multiplier
Actions:
Output: Enterprise Risk Register with owner, timeline, control mapping, and residual risk.
Program pillars (non-negotiable):
| Pillar | Owner | Key Deliverables |
|---|---|---|
| Threat & Vulnerability Management | security-operations | SIEM, SOAR, threat hunting cadence |
| Identity & Access Governance | infrastructure-security | PAM, MFA, RBAC/ABAC policies |
| Data Protection & Privacy | infrastructure-security | Encryption, DLP, PII controls, retention |
| Application Security | application-security | Secure SDLC, SAST/DAST, pen test schedule |
| Compliance & Audit | compliance-governance | Framework calendar, evidence collection |
| AI & Emerging Tech Security | ai-ethics-security | AI risk framework, hallucination controls |
| Security Awareness | security-trainer | Training cadence, phishing simulations |
| Incident Response | incident-responder | IR playbooks, tabletop exercises |
Security architecture principles (enforce across all domains):
Delegation rules:
| Scenario | Primary Delegate | Secondary |
|---|---|---|
| Active incident or breach | security-operations → incident-responder | compliance-governance (regulatory notification) |
| Compliance audit prep | compliance-governance → compliance-auditor | infrastructure-security (evidence) |
| New cloud deployment | infrastructure-security | application-security (app layer) |
| AI/ML system launch | ai-ethics-security → ai-security-analyst | compliance-governance (GDPR/EU AI Act) |
| Pen test engagement | application-security → penetration-tester | security-operations (monitoring) |
| Regulatory inquiry | compliance-governance → industry-compliance | Legal/GRC |
| Merger/acquisition | All VPs in parallel | CISO reviews unified report |
Escalation gates:
CISO Dashboard metrics (real-time):
SECURITY POSTURE SUMMARY
═══════════════════════════════════════════════════════
Security Maturity Score: [X/5] [NIST CSF Tier]
Critical Open Risks: [N] Target: 0
High Open Risks: [N] Target: <5
Mean Time to Detect (MTTD): [Xh] Target: <1h
Mean Time to Respond (MTTR):[Xh] Target: <4h
Patch Compliance (Critical):[X%] Target: 100% in 24h
Phishing Click Rate: [X%] Target: <3%
MFA Enrollment: [X%] Target: 100%
Third-Party Risk Reviews: [N] SLA: 30 days
Compliance Status: [Frameworks: X/Y PASS]
Active Security Incidents: [N]
AI System Risk Flags: [N]
═══════════════════════════════════════════════════════
Board-level quarterly report structure:
Monthly cadence:
Annual cadence:
| Phase | Artifact | Owner |
|---|---|---|
| Posture Assessment | Security Posture Report + Risk Heat Map | CISO |
| Risk Register | Enterprise Risk Register with scores | CISO |
| Program Design | Security Program Charter + Policy Framework | CISO |
| Orchestration | Delegation log + escalation decisions | CISO |
| Dashboard | Real-time metrics + board quarterly report | CISO |
| Improvement | Annual roadmap + continuous update log | CISO |