47%
of new CISOs say their biggest first-year challenge was lack of visibility into the existing security posture (IANS Research 2025)
6 months
median time before a new CISO presents their first board-level security strategy (Gartner 2025)
72%
of security programs at Series A/B companies have no formal asset inventory when the first security hire joins (Vanta 2025)

Most 'first 90 days CISO' guides are written by people who have never actually done it. They tell you to 'build relationships' and 'assess the landscape' without telling you what that means in practice on a Tuesday morning when you have no laptop, no access, and three engineers asking you to sign off on a production deployment.

This guide is structured around the reality of the first 90 days: you have no context, limited access, and high expectations. The sequence matters. You cannot fix what you cannot see. You cannot see what you do not have access to. And you cannot get access without trust.

The plan is organized by week. Each week has a primary objective, specific deliverables, and the conversations you need to have. It applies whether you are a CISO at a 200-person SaaS company, the first security hire at a 50-person startup, or a security engineer tasked with rebuilding a program after a previous team departed.

Before Day 1: What to Do Before You Start

If you have a start date set and time before it, do this now:

Review what is publicly available about your new employer's security posture:

  • Search Shodan and Censys for the company's IP ranges and domain -- what is internet-exposed before you have even started?
  • Check their SSL/TLS configuration via SSL Labs (ssllabs.com/ssltest)
  • Search for the company name on HaveIBeenPwned, DeHashed, or IntelX for previously leaked credentials
  • Check their DNS configuration: SPF, DKIM, DMARC records via MXToolbox
  • Search GitHub for the company's organization -- are there public repositories? Do any contain sensitive information?

This takes 2 hours and gives you your first week's talking points. Nothing says 'I know what I'm doing' like walking in day one with actual findings.

Prepare the questions you will ask in week one:

  • Where is customer data stored and what types of data do you process?
  • What compliance requirements does the company have or expects to have?
  • Have there been any prior security incidents or near-misses?
  • Who currently handles security decisions in the absence of this role?
  • What external audits, penetration tests, or assessments have been done?
  • What is the biggest security concern the CEO or CTO has right now?

Weeks 1 to 2: Listen, Map, Access

Your job in weeks one and two is information collection, not action. Resist the urge to start fixing things.

Priority conversations to have:

StakeholderWhat to ask
CEO / FounderWhat keeps you up at night security-wise? What would a breach cost us commercially?
CTO / Engineering LeadWhat is the tech stack? Where is data stored? What is the deployment process?
Head of SalesWhat security questions do enterprise prospects ask? What deals have we lost due to security?
Head of LegalWhat are our contractual security obligations? What regulations apply?
FinanceWhat is the current security budget? What tools are we already paying for?
HRWhat is the employee onboarding/offboarding process for system access?
Any prior security personWhy did they leave? What did they build? What did they not finish?

Asset inventory sprint (days 3 to 10):

You cannot secure what you do not know exists. Start building an asset inventory:

  1. Request admin access to AWS/GCP/Azure and list all resources across all regions
  2. Request admin access to your identity provider (Okta, Google Workspace, Azure AD) and export all users and their access
  3. Request a list of all SaaS tools the company pays for from Finance and IT
  4. Ask engineering for a list of all production services and their dependencies
  5. Ask IT for a list of all corporate devices (laptops, servers, network equipment)

Document this in a simple spreadsheet: Asset | Type | Owner | Data Classification | Internet Facing | Has MFA | Last Security Review

What you will find in almost every environment:

  • Former employees with active accounts
  • SaaS tools no one remembers purchasing with live data in them
  • Production services exposed to the internet that engineering thought were internal
  • AWS resources in regions nobody is actively using (legacy test environments)
  • Service accounts with no owner and excessive permissions

Deliverable at end of week 2: A current-state memo (3-4 pages) describing what you found. Not a plan -- just a factual description of the environment. Share with your manager and the CTO. This demonstrates competence and builds the credibility you will need for week four's conversations.

Identity and access audit

Export all users from your IdP, flag former employees, flag accounts without MFA, flag service accounts with no clear owner

Cloud asset inventory

List all cloud resources across all accounts and regions; flag publicly exposed resources, unused resources, and resources with no owner tag

SaaS tool audit

Get the list from Finance/IT, identify which tools contain customer or employee data, identify who has admin access to each

Internet exposure review

Run Shodan/Censys against your IP space; list all open ports and services; identify anything unexpected

Incident history review

Ask for any prior incident records, security tickets, or post-mortems; understand what went wrong before you arrived

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Weeks 3 to 4: Quick Wins That Build Credibility

By week three you have enough context to start fixing things. The goal is not to fix everything -- it is to ship visible wins that demonstrate you can do more than talk.

The highest-ROI quick wins in almost every environment:

1. Deprovision former employee accounts (day 15-16)

You almost certainly found former employees with active accounts in week two. Revoke them. Every one. Walk the engineering lead through your findings: 'We had 7 ex-employees with active AWS access. I've revoked all of them.' This is the fastest way to make the CTO trust you.

2. Enable MFA for everyone without it (day 17-20)

In most companies, MFA is enabled in the IdP but not enforced -- people enrolled are not required to use it. Turn on enforcement. Communicate the change 48 hours in advance. Allow a 2-week grace period for TOTP apps if needed. Expect friction; manage it. The discomfort of MFA enforcement is worth the security.

3. Fix the obvious external exposures (day 18-21)

If Shodan found services that should not be public, work with engineering to remove the public IP or add firewall rules. Pick the two or three most obvious issues and fix them in the first month.

4. Add DMARC (days 14-21 if not present)

If the company does not have DMARC with at least p=quarantine, add it. This is a one-line DNS change that protects the company from email spoofing. Add it at p=none first to monitor for 2 weeks, then move to p=quarantine. Two DNS changes, no engineering required, visible and meaningful.

5. Set up basic security monitoring (week 3-4)

If there is no SIEM or alerting, at minimum set up:

  • AWS GuardDuty (5 minutes, $x/month, catches most common cloud threats automatically)
  • CloudTrail in all regions with logs shipped to a separate account
  • Log alerting for: root account login, new IAM user creation, security group modifications

This is not a comprehensive monitoring program. It is the floor below which you cannot go.

Deliverable at end of week 4: A 'week one to four' summary deck (5-10 slides) for your manager and key stakeholders. Show what you found, what you fixed, and what you deferred. Quantify where possible: '7 accounts deprovisioned, MFA enforced across 100% of users, 3 external exposures remediated, AWS GuardDuty enabled.' This deck sets the tone for your first board or leadership presentation.

Weeks 5 to 8: Build the Foundation

With quick wins shipped and credibility established, weeks five through eight are about building the foundational structures that everything else depends on.

Write your three core policies (even if imperfect):

Policies are governance artifacts, not operational documents. A policy does not tell engineers how to do things; it tells them what the company has committed to doing. Three policies cover 80% of compliance requirements:

  1. Information Security Policy (ISP): The master policy. Covers scope, roles and responsibilities, the overall security program objectives, and pointers to other documents.
  2. Acceptable Use Policy (AUP): What employees can and cannot do with company systems, data, and devices.
  3. Incident Response Policy: Who declares an incident, what the escalation path is, and how the company communicates internally and externally.

Do not spend four weeks writing perfect policies. Write a good-enough v1 in two weeks. Get them reviewed and signed by your manager or CEO. That act of approval is what makes them enforceable.

SANS has free policy templates: sans.org/information-security-policy -- use these as starting points. You do not need to write from scratch.

Set up password/secrets management:

If engineers are sharing passwords over Slack or storing them in Notion, fix this now. The investment is small:

  • Corporate password manager: 1Password Teams or Bitwarden Business ($4-7/user/month)
  • Secrets in code: integrate detect-secrets into your pre-commit hooks across all repos
  • Production secrets: AWS Secrets Manager or HashiCorp Vault (start with AWS if you are already on AWS)

Define your asset classification tiers:

Not all data is equal. Create a simple 3-tier classification:

  • Tier 1 (Confidential): Customer PII, payment data, credentials, health data, legal documents
  • Tier 2 (Internal): Business strategy, financial data, employee information, source code
  • Tier 3 (Public): Marketing materials, public documentation, open-source code

Publish this classification as a one-page reference. It becomes the foundation for encryption requirements, access controls, and data retention policies.

Start your vendor inventory:

Map every vendor that has access to Tier 1 or Tier 2 data. This is your TPRM starting point. For each vendor: what data do they access? What is their security certification? What happens if they are breached?

For SOC 2 readiness (if that is on the roadmap), this vendor list becomes your sub-processor register.

Weeks 9 to 12: Your 90-Day Security Roadmap

At the end of 90 days you need to deliver a security roadmap. Not a completed program -- a credible, prioritized plan.

The structure that works for leadership presentations:

Slide 1: Current state (3 sentences) Where the security program is today. Factual. No blame.

Slide 2: Risk landscape (top 3 risks) The three things most likely to hurt the company. Each risk needs: likelihood, impact, and current mitigation status.

Slide 3: What we have done (90-day wins) Quantified. 'X accounts deprovisioned, MFA enforced, Y exposures remediated, Z policies written.'

Slide 4: The roadmap (next 12 months) Organized by quarter, not by control. Each quarter has a theme: Q3 = 'Foundations' (asset inventory, access reviews, policies), Q4 = 'Detection' (SIEM, monitoring, IR testing), Q1 = 'Assurance' (pentest, SOC 2 readiness), Q2 = 'Certification' (SOC 2 audit period).

Slide 5: What we need (resources) Budget, headcount, tool spend. Frame it in terms of risk reduction per dollar, not tool names.

The 90-day deliverable checklist:

  • Asset inventory (cloud, SaaS, devices) documented and owned
  • All former employee accounts deprovisioned
  • MFA enforced across 100% of corporate accounts
  • Information Security Policy, AUP, and IR Policy written and approved
  • Password/secrets management deployed
  • Basic cloud monitoring enabled (GuardDuty or equivalent)
  • DMARC at p=quarantine or p=reject
  • Top 3 external exposures from Shodan scan remediated
  • Vendor list with security tier assigned for Tier 1 data processors
  • 90-day security roadmap presented to leadership

What to defer (do not try to do this in 90 days):

  • SOC 2 audit (needs 6-12 month observation period; start the program, do not rush the audit)
  • Comprehensive security awareness training (get the policies first)
  • Penetration test (until you have fixed the obvious issues; a pentest that just confirms what you already know wastes budget)
  • SIEM deployment (basic alerting is enough for now; a full SIEM is a month-long project)
  • Zero trust architecture (strategy, not month one implementation)

Asset inventory documented

Cloud resources, SaaS tools, corporate devices, and production services catalogued with owners and data classification

Former employee access revoked

All ex-employee accounts in IdP, cloud, and SaaS tools identified and deprovisioned

MFA enforced

100% MFA enforcement across corporate identity provider with enforcement policies enabled, not just available

Three core policies approved

Information Security Policy, Acceptable Use Policy, and Incident Response Policy written and signed by leadership

Basic cloud monitoring live

GuardDuty (or equivalent) enabled, CloudTrail active in all regions, alerting on root login and privilege escalation

DMARC deployed

SPF, DKIM, and DMARC at minimum p=quarantine to prevent email spoofing

Password/secrets management deployed

Corporate password manager rolled out; pre-commit secret scanning hooks in all repos; production secrets in a secrets manager

90-day roadmap presented

Current state, top risks, wins achieved, and 12-month roadmap delivered to leadership

Common First-90-Days Mistakes (And How to Avoid Them)

Mistake 1: Presenting a strategy before you have listened enough

The classic error: arrive week one with a strategy framework you built at your last company and start presenting it before you understand the business. The strategy will be wrong, and the organization will notice. Spend the first two weeks only listening and mapping. Save the strategy for week four.

Mistake 2: Fixing everything instead of fixing what matters

A security audit will reveal 200 things that are wrong. If you try to fix all of them, you will burn out your engineering relationships and yourself in the first 30 days. Pick the 5 highest-impact items and execute them well. Demonstrate prioritization ability -- it is the most important skill a security leader has.

Mistake 3: Treating security as a security problem instead of a business problem

Every control you implement has an operational cost: developer time, employee friction, tool spend. The question is never 'should we have this control?' It is 'does the security benefit justify the operational cost?' If you cannot answer that question, you will lose credibility with engineers and leadership quickly.

Mistake 4: Getting pulled into a major project before you have the basics

Something exciting will be happening when you start -- a major cloud migration, a new product launch, a big enterprise deal. People will want you involved. Participate, but do not let it consume your first 30 days before you have completed the baseline audit. You cannot protect a new environment if you do not understand the old one.

Mistake 5: Not communicating up frequently enough

Your manager and the CEO/CTO do not know what you are doing day-to-day. Send a brief weekly email: three bullet points on what you did, three on what you found, one on what you need. It takes 5 minutes to write and prevents the 'what exactly does the security person do?' conversation that kills credibility.

The bottom line

The first 90 days are about earning the trust and access you need to do the actual security work. Audit before you advise. Fix the obvious things fast. Write the foundational policies even if they are imperfect. And communicate your progress in business terms, not security terms. The security program you build in months four through twelve will be better because you spent the first three months understanding the organization instead of trying to change it.

Frequently asked questions

What should be the very first thing a new CISO or first security hire does?

Before anything else: audit what you cannot see. Run Shodan against your IP space, check for former employee accounts in the identity provider, pull the AWS CloudTrail logs and look for unusual activity, and search GitHub for company repositories. You are looking for things that are obviously wrong and that you can fix quickly. These findings give you credibility and give you an honest picture of where you are starting from. Relationships matter too, but facts matter first.

How do I prioritize when everything looks like a security problem?

Use three criteria: likelihood (how likely is this to be exploited?), impact (what is the business consequence if it is?), and effort (how hard is it to fix?). Former employee accounts with production access score high on all three: high likelihood, high impact, low effort to fix. Start there. Save the complex architectural changes (zero trust, SIEM deployment) for month four when you have the organizational trust and context to execute them well.

How do I present security risk to non-technical leadership?

Translate every risk into a business outcome: not 'we have no DMARC record' but 'attackers can impersonate our domain in emails to our customers, which could result in credential theft and reputational damage.' Not 'our RDS instance is publicly accessible' but 'our customer database is reachable from the internet without VPN; a successful attack would expose X records and trigger GDPR notification requirements.' Frame risk in terms of: what happens if this goes wrong, who is affected, and what it costs.

What is a realistic security budget for a 50-person startup?

Realistic baseline for a 50-person startup: identity provider with MFA enforcement (Okta or Google Workspace, $10-15/user/month), password manager ($4-7/user/month), endpoint management MDM ($4-8/user/month), basic cloud security tools (AWS GuardDuty, Security Hub: $200-500/month), and a password manager for shared credentials. Total: $10,000-20,000/year for the basics. Add a penetration test ($15,000-30,000) annually and a GRC tool for SOC 2 prep ($10,000-30,000/year) when SOC 2 is on the roadmap. A first security hire at a 50-person startup should be able to build a functional program for under $50,000/year in tooling.

When should I do a penetration test?

After you have fixed the obvious issues, not before. A penetration test on a freshly audited environment with former employee accounts still active, no MFA, and publicly exposed databases is not a test of your security -- it is an expensive confirmation that you have not done the basics. Wait until you have MFA enforced, the obvious exposures closed, and basic monitoring in place. Then a pentest is useful: it will find the non-obvious issues that require skilled attackers to identify.

How do I handle the inevitable 'can you just quickly review this?' requests from engineering?

Yes -- with a documented process. Create a lightweight security review request form or Jira template: what is being built, what data does it handle, what is the threat model, what is the timeline. Reviews requested without that information get queued behind requests that do have it. This is not bureaucracy for its own sake; it forces the requestor to think about security before they schedule the review, which means the review itself is more productive. The key insight: your time is finite and must be allocated to the highest-risk reviews first.

Sources & references

  1. NIST Cybersecurity Framework 2.0
  2. CIS Controls v8 Implementation Guide
  3. SANS Information Security Policy Templates
  4. CISA: Cybersecurity Best Practices for Small Businesses
  5. NIST SP 800-61: Computer Security Incident Handling Guide
  6. Microsoft Security Best Practices

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.