This role profile outlines the behaviors, characteristics, and skills of a post-breach CISO, one of Forrester’s six CISO types.