4 min read time

2 Days in the Life of a Chief Security Officer

by   in Portfolio

Before Viktor

Meet Viktor. Viktor is the Chief Security Officer for a major financial services corporation in New York. Viktor is highly skilled and highly experienced. He wakes up every single day ready to face cybersecurity threats for his organization, but he must admit that he’s getting a bit tired of dealing with these manually and reactively. He’d like to get in a more proactive position, but Viktor rolls with the punches currently.

Viktor’s responsibilities are vast and numbered. He’s tasked with developing security policies, managing his IT personnel, creating reports and documentation, identifying potential risks and weaknesses, and ensuring organizational compliance. If it seems like a lot for one person to deal with, it’s because it is. And Viktor is starting to feel it.

Rather than counting sheep at night, Viktor counts tasks and potential risks that are his sole responsibility to identify and fix. Here are a few of the task sheep he counted last night:

  • Too much risk. The bigger the organization, the harder it falls when it comes to information breaches. Since Viktor manages security risk for a financial services corporation, he must take special measures to ensure personally identifiable information of their customers is kept tightly locked down.
  • So much data to manage. It doesn’t take a chief security officer to know that organizations are accumulating more data than ever before. Viktor is overwhelmed with creating specific lifecycle retention policies within its system to securely capture and preserve its electronic communication data. He also dreams of a platform that allows him to do all of this with automation, so data preservation doesn’t all fall on his shoulders.
  • Too many people need access to the data. While his organization does have its data housed in a central location, not everyone has access to it. This creates bottlenecks in which his IT team must respond to information requests. It would be much easier if he could allow administrators, auditors, legal, and other authorized users access to communication data from a web browser.
  • He’s got a brand to protect. Just as important as money or information, Viktor has a brand reputation to uphold. His organization has collectively worked to establish a strong brand presence in their industry, and he’d like to keep it that way. However, with the rise of cybersecurity threats like malware, ransomware, or internal vulnerabilities, it’s becoming increasingly difficult to maintain your brand reputation without a third-party platform or product that can do it for you.

Viktor counts these sheep all night and this is not a comprehensive flock. He knows he needs help but isn’t sure of the best route to take.

After Viktor

Meet Viktor. Viktor is the Chief Security Officer for a major financial services corporation in New York. Viktor has a lot on his plate, but he doesn’t let that keep him up at night. What would frighten some, excites Viktor. Viktor knows what today has in store for him as he strolls into work and couldn’t be more excited to face problems head-on.

As the Chief Security Officer, Viktor is focused on setting policies to retain, preserve, and protect his organization’s data. Additionally, he has now set policies in place allowing access to that data for those who need it at a moment’s notice. All without burdening his IT team. Not surprisingly, everyone is really impressed with Viktor at his organization. Viktor accepts the praise, but he knows where much of their information governance strategic success comes from.

Recently Viktor took on the task of implementing a new unified archiving solution in order to get a handle on their information retention and access issues. They saw results extremely quickly.

The implementation came as a response to several employee violations with their data security. This turned out to be a good thing since it inspired Viktor to rethink its current information governance strategy.

To combat these employee violations, Viktor sought out and implemented a unified archiving solution that allowed them to set up policies that monitor employee communication accounts for certain keywords and terms. Once a violation occurred, an alert was sent to Viktor and his team was able to respond quickly and efficiently.

After the organization implemented the solution, they were able to quickly identify the employees who were placing the organization at risk and block further violations. This enabled the legal team to easily put together a comprehensive case assessment of all the individuals involved. By blocking the damaging content, it prevented inappropriate messages from being posted or shared online and ensured that sensitive data did not leave the organization. Since the implementation of the solution, there have been no policy violations, and all attempted violations have been unsuccessful. This has kept the organization's information safe, secure, and compliant with all FINRA and FRCP rules.


While the small details were made up, the actual story isn’t. This is a real success story with real results. Want to know exactly how “Viktor” and his team did it?


Retain Unified Archiving by OpenText is an efficient solution for businesses looking to archive their business communication including email and mobile communication data. It is capable of being deployed off-cloud or in the cloud and offers comprehensive native support for archiving Gmail and GroupWise email. It is an ideal solution for case assessment, search, and eDiscovery. With Retain, businesses can ensure that their data is securely and reliably stored and can be easily accessed when required.

Want to learn more about Retain Unified Archiving?

Want to see if Retain Unified Archiving can help your organization, too? Contact us!

Better yet, try it yourself by requesting a demo.

The Micro Focus IM&G team