Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

A CISO's perspective on the modern cybersecurity landscape

By Sam Rehman
Man in suit looking out at city

Image via Unsplash

June 19, 2024

Many businesses still believe there is such a thing as 100% security, despite every cybersecurity expert affirming the opposite. Because companies push for and demand 100% security, the organization ultimately settles for a false sense of it so their people can function. Such a mindset is not only wrong but incredibly dangerous.

Business leaders must recognize that breaches are imminent, and a robust approach to cybersecurity involves detecting and responding quickly and effectively to incidents. Nevertheless, threat detection and response are like a boxer’s one-two punch — essential but not enough to win a fight or significantly enhance one’s cybersecurity posture.  

Train general employees no different than cyber teams 

The bad news for many businesses is that their cybersecurity teams lack personnel because of a shortage of available talent. This worsening cybersecurity talent shortage puts pressure on understaffed teams, resulting in higher burnout. However, the talent shortage, while significant, is not the main issue. The primary problem is that general employees don’t receive proper training.

While cybersecurity teams run through engaging simulations and life-like rehearsals, other employees watch videos and take quizzes. As such, companies should simulate role-relevant security situations for all of their employees. Just as medical trainers use techniques to help reduce anxiety and build confidence, the entire organization needs to be able to exercise sound judgment. However, remaining aware of cyber dangers isn’t enough; they need to know how to act and apply their knowledge in real situations. A company is only as secure as the least safety-conscious team member — therefore, everyone must understand their role in the organization’s overall security strategy.

Cybersecurity by design: Make things smooth and avoid complexity 

With the threat landscape constantly evolving, organizations must design security to be a smooth process. In other words, if security is too complicated — which it often is — it won’t work. For example, employees know not to click on suspicious links from strangers. But they don’t want to take the time to check if the link is safe — in fact, they might not know how to verify it beyond their gut feeling. As such, businesses must bring their cybersecurity employees and designers together to create a human-centered design process, often called a “cybersecurity-by-design” approach.

A cybersecurity-by-design approach sees security as a core business requirement, not some nice-to-have technical feature. Moreover, the human-centered design element puts the people (or, in this case, employees) at the heart of the process, meaning that the designers are empathic toward the intended targets’ attitudes, skills and capabilities. In the case of dubious links, the security team and designers should build a link-verification tool or solution that is easy to use and not time-consuming, something employees will see value in deploying.

Architect security from the start 

This year saw the rise of generative AI, a technology that benefits businesses and bad actors alike. For instance, hackers leverage AI to create hyper-realistic phishing campaigns and tailored social engineering traps, including malicious code and malware designed to slip past traditional defenses. Likewise, a survey of 1,000 cybersecurity experts revealed that over half thought AI tools made it ‘somewhat’ or ‘much easier’ for people to steal sensitive information using human-like chatbot outputs.

Today, many organizations follow the old security model of fencing off their business with software. This approach isn’t just wrong — it’s almost a farce in the age of generative AI. At the same time, businesses must account for existing vulnerabilities in the cloud and data alongside security challenges with large language models.

Amid the growing prevalence of generative AI, organizations need to architect security at the start to reduce potentially exploitable flaws rather than adding it as a final touch once a product is nearly ready to go to market. This idea of implementing security during the design phase of a product’s development lifecycle is a fundamental principle of cybersecurity-by-design.

Companies should also design their systems with security in mind to make them more defensible. Unfortunately, business leaders often rush technology adoption, forgoing a security officer until later. By not creating self-defenses during development or design, businesses can end up in security debt, which is incredibly costly despite not showing up on one’s profit and loss statement.

It all comes back to strong leadership 

While everyone shares responsibility for ensuring cybersecurity across the enterprise, leaders carry a much heavier burden. The strongest leaders understand this reality and will strive to get the entire organization to do as they do and commit to the best cybersecurity practices, beginning with thinking defensively. Businesses could have the best cybersecurity solutions and software at their disposal. However, if there is no motivation from the top, organizations shouldn’t expect any real behavioral change at the employee level. 

KEYWORDS: CISO CISO leadership cyber threats organizational resilience organizational risks security training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sam rehman 2

Sam Rehman is SVP and Chief Information Security Officer for EPAM Systems. Rehman has more than 30 years of experience in software product engineering and security. Prior to becoming EPAM’s CISO, Rehman held a number of leadership roles in the industry, including Cognizant’s Head of Digital Engineering Business, CTO of Arxan, and several engineering executive roles at Oracle’s Server Technology Group. His first tenure at EPAM was as Chief Technology Officer and Co-Head of Global Delivery. Rehman is a serial entrepreneur, technology expert and evangelist with patented inventions in software security, cloud computing, storage systems and distributed computing. He has served as a strategic advisor to multiple security and cloud companies, and is a regular contributor in a number of security industry publications.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • remote-work-freepik35678.jpg

    Rethinking the current cybersecurity landscape

    See More
  • remote work

    What you cannot see you cannot secure: Shining a light on cybersecurity threats in a work-from-home environment

    See More
  • cyber-shield

    The perfect storm: Finding new ways to navigate and mitigate the cybersecurity pandemic

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing