Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

Cybersecurity trends and the evolution of the CISO in 2024

By Tyler Healy
Woman with box braids working at desk

Image via Unsplash

March 8, 2024

If there’s one constant in cybersecurity, it’s that security leaders embrace new opportunities — and confront unprecedented challenges — with each new year. Emerging technologies, new attack vectors and even geopolitical crises shape the day-to-day evolution of the chief information security officer’s job. 

In 2024, there will be no shortage of embracing the new for CISOs. Security leaders must contend with the application of artificial intelligence in both cyberattacks and defense; a U.S. election cycle with a major focus on election security and fraud prevention; a new SEC disclosure rule requiring publicly traded companies to report material incidents; and a global geopolitical environment fraught with conflicts.   

All of these factors bring risk and even fear to employees at their companies, customers, and customers’ customers. In 2024, CISOs must strive to build trust and confidence in the face of these uncertainties. 

Crypto comeback

The recent approval of Bitcoin ETFs has spurred cryptocurrency to significant gains in value, rising out of the trough of 2022. In 2021, when cryptomania gripped the globe, crypto-related theft and fraud skyrocketed. Once again, security leaders can expect to see new malware delivery that plants crypto miners, account takeovers at cloud service providers, and crypto-related “smash and grabs” where wallets left without the right protections end up being emptied. And the international groups fighting ransomware will stay very busy.

Add in the proliferation of cloud-based-GPUs driven by the expansion of generative AI, and there are a combination of factors that will lead to significant security challenges at the intersection of cryptocurrency value — especially when considering that GPUs are some of the most efficient pieces of hardware for mining and AI-produced content is often traded in crypto. 

AI friend or foe? 

From a cybersecurity and fraud perspective, AI has created an increasingly tricky environment. On a positive note, AI will likely complement security defenses by accelerating threat detection and response. On the other hand, AI can also be misappropriated to create even more sophisticated attack vectors, particularly in social engineering and fraud.

Fraudsters with access to cheap AI will perfect their English or other target-language grifts and become more successful at exploiting vulnerable populations like the elderly, poor, or internet users in developing countries. This will create big questions we must wrestle with as a society: Is maintaining safe use of AI the responsibility of its creators? How expensive will it be to maintain safety, and who will oversee it? Who pays for damaging fraud schemes?

Similar to other challenges in harmful content creation and content risk management, this will force CISOs to carefully navigate the risks and rewards that come from AI implementation. 

Geopolitical collateral damage

At the outset of each international conflict in recent years — primarily Russia’s invasion of Ukraine and the Israel-Gaza conflict — security leaders observed a surge in cyberattacks. Some of that was directly related to the wars, but much was driven by activist groups looking to influence political or military outcomes. 

It’s a trap for CISOs to assume that they have nothing to worry about if they aren’t part of a governmental or military supply chain.

Malware is often poorly targeted or intentionally broad to attempt to land at its final target, with little consideration for the potential of collateral damage. The ongoing conflicts, or potentially new ones in 2024, will continue to put pressure on CISOs to consider threat vectors beyond the immediate risk posture of their business. 

Election-year challenges

It’s been eight years since misinformation campaigns tainted the 2016 U.S. elections. And while the same tactics may not be directly employed this year, the 2024 election cycle will likely come with its own set of challenges. Are content platforms like ‘X’ ready to take on the responsibility of monitoring and managing disinformation or misinformation that could have a direct effect on an election? 

And that’s not all. Objectionable content, employee communications and customer relationships have all become part of the election-year business narrative. GenAI could amplify these challenges. Think that’s not a CISO’s concern? That’s worth reconsidering. Employee and customer trust are often a direct outcome for a CISO, and where cloud platforms are involved, trust has a much wider reach.

SEC material incident filings

In December 2023, the SEC gave CISOs something new to sweat over with its newly implemented rules that require businesses to report cybersecurity incidents that are material in nature within four business days. 

That means CISOs must be able to help determine materiality and all of the nuances that come with that one powerful word. That requires a strong understanding of how a business operates, markets itself and records and collects revenue. 

One outcome is that CISOs may increasingly find themselves working side-by-side with Chief Revenue Officers and Chief Marketing Officers in addition to their technology and finance counterparts. To be successful, a public company CISO must be able to translate the deep technical decisions they make into business outcomes around the customer lifecycle or product development.

Counteracting FUD with trust

If there’s one thing the internet is very good at, it’s spreading fear, uncertainty and doubt at an alarming rate. CISOs have a role in counteracting this force. In the face of a constant drumbeat of negativity, security leaders must exercise our strengths for positive change and outcomes. 

While risk posture may look different in 2024, it is no more dire than other points in modern history. CISOs must step into the role of a truly cross-functional and cultural leader within their companies to strengthen trust with employees and customers.

KEYWORDS: CISO CISO leadership election security geopolitical security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tyler Healy is Chief Information Security Officer at DigitalOcean.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Blank name tags and markers

    Zero trust: The next evolution in cybersecurity

    See More
  • security

    6 areas to watch in the Software Bill of Materials evolution

    See More
  • The University of Texas at Austin; social media monitoring, UT security, emergency communications, incident management, crisis communications

    The Evolution of Crisis Communications in the Social Media Age

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!