What makes a good information security officer?