Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

5 commitments CISOs can make to boost cyber resilience

By James Hadley
Business meeting

Image via Unsplash

March 12, 2024

CISOs have always had a very tough job, but with spikes in virtually every kind of attack, new AI-related risks and a shifting regulatory environment, keeping businesses safe and compliant is only getting more difficult. While there is no way to anticipate every new threat, there are some data-backed ways to limit risk and build lasting resilience against attacks.

Here are five key commitments that CISOs should consider making this year to improve their cybersecurity posture: 

Empower the entire workforce with cyber capabilities

Cybersecurity is not just the responsibility of the cyber team; the whole workforce needs to be adequately prepared for attacks. CISOs and other security leaders should provide opportunities for employees throughout the organization — regardless of role or department — to upskill their cyber capabilities, understand their shortcomings and improve their skill sets. Executives gather data to understand financial performance to fuel decisions — cyber leaders must do the same when it comes to cyber capabilities.

With 80% of cyber leaders uncertain about their teams’ readiness to respond to future attacks, leaders should strive to understand cyber strengths and weaknesses to make more informed decisions and investments in cybersecurity solutions. Employees across the workforce should have access to cyber exercises relevant to their individual responsibilities, an approach that equips leadership with insights into skills gaps. Armed with this data, leaders can be confident that their teams have the knowledge, skills and judgment to respond effectively to cyber threats.

Eradicate blame culture, recognize vigilance

Employees who take part in their organization’s cybersecurity drills or demonstrate security best practices are assets to cyber leaders. It’s important to build a culture that recognizes their diligence whenever possible. At a time when many cybersecurity professionals are considering leaving the industry due to stress, it’s important that employees believe their contributions to cybersecurity are valued. Recognition can take various forms, whether it’s praise during team meetings, awards, or other incentives. Acknowledging employees' dedication to cybersecurity initiatives motivates them to continue this level of work and positive behavior.

People should also be encouraged to speak up and do the right thing, including escalating threats or mistakes, without fear of losing their jobs. Cyber defense is a team sport, and there is no room for the blame game. Organizations that promote open communication about security concerns — even when an error has occurred — help raise awareness of potential threats and quickly address any security issues, ultimately limiting risk in the long run. 

Double down on secure development best practices

Developers are often tasked with building line-of-business applications at pace without focusing on secure coding best practices. Given the inherent risks to organizations, from vulnerable code to the cost of correcting mistakes later in the cycle, requiring developers to upskill and prove coding efficacy should be mandatory. Security leaders should partner with engineering leaders to implement a secure coding “driving license” check for all existing and to-be-hired developers. Especially in light of developers' increased adoption of AI, it can potentially lead to unexpected business risks and leave holes in their cyber resilience to leave the door open for exploitation.

Prepare for after-incident response

It's important to build a team’s cyber capabilities across the MITRE ATT&CK framework. Unfortunately, we often see companies place too much emphasis on preventing attacks, and not enough on what happens after an attack occurs. With breaches more or less inevitable, organizations must implement training and resources to strengthen the cyber resilience of the workforce before, during and especially after an incident.

In an atmosphere that encourages too much time, money and energy to be spent on prevention, security leaders must shift strategies to investing in strategies that empower teams to respond faster and more confidently to emerging threats. By ensuring coverage across all elements of breach prevention and response, you can limit risk and mitigate the impact of a breach. The stronger an organization’s cyber resilience, the better suited they are to prepare for — and respond to — a cyber threat. Just like any skill, cyber leaders should continuously exercise their employees against realistic and emerging threat scenarios.

It’s about preparing, not predicting

We can't predict the threats and vulnerabilities ahead, but security teams and employees can exercise their skills and stay vigilant to ensure that the impact and cost of these attacks are limited. It is the responsibility of the CISO and security leaders to ensure organizations are moving beyond awareness and instead equipping all employees with the right tools to build the knowledge, skills and judgment to respond effectively. By incorporating these commitments, organizations can be better prepared to report and mitigate cyber threats, boosting cyber resilience and overall security postures in 2024 and beyond.


KEYWORDS: best practices CISO leadership preparedness resilience

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

James headshot

James Hadley is CEO and Founder of Immersive Labs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Vertical green numbers on black screen

    5 key elements of cyber simulation exercises to boost cyber resilience

    See More
  • visibility-freepik1170x658v5.jpg

    5 steps CISOs can take to increase supply chain visibility

    See More
  • people working together over a table

    How CISOs and CFOs can collaborate to combat cyber threats

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing