This post was updated on January 27, 2020.
IT security managers (also known as cybersecurity managers) serve as an organization’s experts on cybersecurity protection, detection, response, and recovery.
The responsibilities of an IT security manager, however, can vary depending on the size of the organization.
In smaller organizations, you may be the one running the show and could be tasked with everything from setting security policy to managing the technical aspects of security (and everything in between).
In a larger organization, the role of the IT security manager typically assumes a more narrow focus and you can be expected to play one of two roles:
Of course, an IT security manager’s role and responsibilities are going to vary tremendously based on the size of the team and the industry. But there are still a number of critical functions tasked to this individual at nearly any organization. We’ve organized those roles and responsibilities below.
This strategically important role compromises nine key responsibilities:
As the IT security manager, it is your responsibility to ensure that this program is tested throughout the organization and that every high-level manager knows his or her duties during such an incident. This may be a responsibility that is the IT security manager’s alone, or it could be a shared responsibility.
In many large organizations, the chief information security officer is involved in briefing the board members on cybersecurity — but depending on the size and maturity of the security program in your organization, this may fall on the IT security or cybersecurity manager.
If this falls within your scope of work, you should focus on communicating the state of your information security program, including your successes and failures.
That’s where BitSight can help. Our security performance management tools help facilitate data-driven conversations to help teams communicate effectively on cybersecurity risk, identify gaps in their cybersecurity programs, and determine where to focus investments for the highest impact on security program performance.
Data breaches that originate through third parties are more commonplace than organizations are used to. The SolarWinds hack and Kaseya ransomware attack are two recent examples of threat actors exploiting the security practices of...
Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring third-party...
Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469