First 90 days as CISO — the working playbook

Play CISO Game free Free · no signup · plays in 30–45 min
Start playing →

The first 90 days as a new CISO are about inheriting, not changing. Audit what exists (the risk register, audit findings, team, budget, contracts, regulatory clocks), build relationships with the CFO, CTO, General Counsel, CEO, and board chair, and stabilize anything actively burning. New strategies and big-bet investments wait until day 91 onward, after the inheritance is fully understood. New CISOs who announce strategy before they've finished listening usually regret it within six months.

If you've just been hired into your first CISO role — or are negotiating one now — this is the working playbook. The mechanics are the same whether you're inheriting a 200-person scale-up's first security program or a multinational's mature one. The pacing changes; the principles don't.

Days 1-30: Inherit

The first month is listening, reading, and inventorying. The output is a single document that lives on your laptop and nobody else sees yet — call it the inheritance audit.

By day 30 you should be able to answer, in two minutes, on a whiteboard: here's what I inherited, here's what's burning, here's what I don't yet know.

Days 1-30: Relationships

Run in parallel with the inheritance audit. Ten 30-45 minute conversations in the first month, each with a specific intent:

Days 31-60: Stabilize + diagnose

Take action on anything actively burning. Resolve open critical audit findings nearing their deadline (or formally accept the residual risk in writing). Defuse any active incident or near-incident. Renegotiate or cancel one obviously-bad contract before its renewal hits. None of these are strategy — they're operational hygiene the board can see.

This is also the diagnostic phase. By day 60 you should be able to write a one-page assessment of the program: maturity per CSF function (use the NIST CSF 2.0 structure), top 5-10 risks ranked, biggest people/process/tool gaps, three things working that should be preserved. Your first board meeting is built on this document.

Days 61-90: First board meeting + stake-in-ground decisions

The first board meeting is most CISOs' biggest first-90-day milestone. Don't waste it presenting a multi-year strategy — you don't have the credibility yet to defend a strategy under question. Instead, present:

  1. The inherited state — what you found in the first 60 days, framed honestly. Don't blame your predecessor; don't oversell either.
  2. The top 5-10 risks ranked by exposure, with current Composite Posture (or whatever metric the prior CISO used — don't change the scorecard in your first meeting).
  3. One clear stake-in-ground decision. Examples: "We're moving the IR retainer renewal up by 90 days because the current contract caps activation hours below my acceptable level." "We're closing two of four open SOC 2 findings before audit." "We're hiring one Detection Engineer in Q1 because the existing SIEM is shelfware without it."
  4. What you'll come back with at the next board meeting — usually a 12-month roadmap.

The board reads first-meeting CISOs as either confident-and-deliberate or anxious-and-grandiose. Aim for the first.

The three decisions that compound

Most CISO tenures are shaped by three decisions made in the first six months:

  1. Reporting cadence and scorecard. Quarterly, with a one-page CSF-aligned dashboard, is the modern default. Establish it now and don't change it for at least 18 months — boards develop pattern recognition and changes break it.
  2. Team archetype. Operational (detection-led, IR-led) vs governance-led (compliance, audit, board-facing). Most programs need both, but one always leads. The decision is usually made by who you hire as your first deputy.
  3. The vendor philosophy. Best-of-breed versus platform consolidation. There's no right answer; there's only the answer that matches your operational maturity. The CISO budget framework covers this in depth.

Common 90-day mistakes

Where to test this in CISO Game

The Post-Incident Recovery scenario simulates exactly this — you're a new CISO three weeks after a public breach, with low board confidence, depleted budget, and an open finding clock. Play the scenario to see how the first-90-day choices compound across the next 19 quarters. The mechanics are calibrated to the same dynamics this guide describes.

Related guides

First-90-day decisions compound across the entire tenure. Run the Post-Incident scenario to feel them play out across 5 simulated years.

Frequently asked questions

What does a new CISO do in their first 90 days?

The first 90 days as a new CISO are about three things in order: inherit (audit what exists — register, controls, team, budget, audit findings, vendor contracts), build relationships (CFO, CTO, GC, CEO, board chair, key business unit leaders), and stabilize (resolve any open critical findings, defuse any active incidents, lock in budget for the rest of the year). New programs and big-bet investments wait until day 91 onward, after the inheritance is fully understood.

What should a new CISO present at the first board meeting?

The first board meeting belongs to the inheritance, not the new strategy. Present what you found in your first 60-day audit: the top 5-10 risks ranked by exposure, the state of audit findings, the open regulatory clocks (SEC Item 1.05, GDPR Art. 33, etc.), the team you have versus the team the program needs, and a single-slide statement of where the program is on a maturity scale. Don't present a multi-year strategy in the first meeting — you don't have enough context yet, and the board reads premature strategy as overconfidence.

How does a new CISO build credibility quickly?

Three patterns work consistently: (1) close one visible audit finding within 60 days — small, fully-resolvable, board-noticed; (2) show up to one major incident war room as the calm voice, even if you didn't trigger the call — incidents are where credibility either accumulates or evaporates; (3) deliver one concrete budget cut or contract renegotiation in the first quarter that funds something visible the board cared about. None of these need a new strategy. They demonstrate operating discipline, which is what the board hires CISOs for.

What are the biggest mistakes new CISOs make in the first 90 days?

Four common ones: announcing a strategic vision before understanding the inheritance; firing or restructuring the team in week one (you don't yet know who's a problem versus who's been blocked); buying tools to signal action (the previous CISO already bought tools — your value is operational); and taking the first 90 days to listen so completely that you produce nothing visible in quarter one. The first 90 days are about inheriting, not changing. Quarter two is when the first deliberate decisions start.

How does a new CISO assess the inherited team?

Spend 30-45 minutes one-on-one with every direct report and skip-level in the first 30 days. Ask each person: what's working in this program, what's blocked, what would you do if you were CISO, what should I not break. Cross-reference the answers — patterns reveal who has clarity, who has been blocked by leadership, and who is part of the dysfunction. Wait until day 60+ before making any team-shape changes. Most new CISOs who restructure in week one regret it; most who restructure in month four are right.

Play CISO Game free →