Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity

It Takes a Village to Keep Organizations Secure

By Karyn Hodgson
Laptop Cybersecurity
Getty Images/iStockphoto

ismagilov via iStock / GettyImages Plus

June 11, 2024

Feeling overwhelmed by the monumental task of staying on top of not only the physical but the cyber side of your organization’s security stance? You likely aren’t alone. Then on top of knowing what is going on in your own organization, the fast-shifting regulatory world of both cyber and AI can be another headache.

A recent report from Swimlane found that more than 90 percent of organizations have re-evaluated their cybersecurity strategies in the past year as a result of new regulations, with more than half of them completely reconsidering their strategies as a result. While just over a third did realize budget increases, only 40 percent felt confident that their organization possessed the necessary resources, personnel and tools to fully comply with regulations.

Beyond regulatory compliance concerns, another study by Deep Instinct found that a whopping 97 percent of security experts worry about AI-related security attacks and related cybersecurity strategies emerging to face those attacks. The report also found that the increase in AI-powered threats prompted three-quarters of respondents to adjust their security strategies in the past year.

There is some positive news related to some of the latest technology and the threats they can pose.

On the cybersecurity front, however. CISA recently announced that its Secure by Design pledge has amassed buy-in from 68 leading software manufacturers, who have voluntarily pledged to deliver measurable progress towards seven key goals with the intent of securing critical infrastructure. According to a CISA release, those goals are:

  1. Exhibit actions taken to increase the application of multi-factor authentication throughout the manufacturer’s products.
  2. Reduce default passwords throughout the manufacturer’s products.
  3. Demonstrate a measurable reduction in one or more vulnerability classes throughout the manufacturer’s products.
  4. Increase the security patches installed by customers.
  5. Release a vulnerability disclosure policy (VDP) that allows for public testing, commits to not take legal action against those who follow the VDP in good faith, presents a clear process for reporting vulnerabilities, and allows for public discussion of vulnerabilities.
  6. Demonstrate transparency in reporting vulnerabilities by ensuring every Common Vulnerabilities and Exposures (CVE) record includes accurate Common Weakness Enumeration (CWE) and Common Platform Enumeration (CPE) fields. Furthermore, issue CVE reports in a timely manner.
  7. Increase the customer’s ability to collect evidence of cybersecurity intrusions that impact the manufacturer’s products.

Meanwhile, on the AI front, the OpenAI Board has formed a Safety and Security committee to provide suggestions on decisions for all Open AI projects. The first task will be to develop processes and safeguards for review within 90 days (by end of July) for full review by the board.

Nicole Carignan, Vice President of Strategic Cyber AI at Darktrace, told Security Magazine, “As AI innovation continues to unfold at a rapid pace, we hope to see similar commitments for data science and data integrity. Data integrity, testing, evaluation and verification, as well as accuracy benchmarks, are key components in the accurate and effective use of AI. Encouraging diversity of thought in AI teams is also crucial to help combat bias and harmful training and/or output. Most importantly, AI should be used responsibly, safely and securely. The risk AI poses is often in the way it is adopted.”

Finally, when it comes to cloud-based systems — an increasingly popular option for many companies — a recent Veeam Software report found the desire to integrate cyber technologies with data protection and backup, along with improved protection of cloud-hosed workloads are top drivers for organizations to consider cloud-hosted or cloud-managed services.

That report also highlighted the many roles that are involved in data protection, including IT operations, managed BaaS or DRaaS teams, backup teams, workload administrators, and trusted resellers/integrators. On average, organizations have 2.3 roles dedicated to ensuring backups and 1.8 roles responsible for restoration. This demonstrates the importance of having expertise and judgment in data recovery processes.

In other words, it truly does take a village.

KEYWORDS: Artificial Intelligence (AI) Security CISA

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Karyn Hodgson is a long-time security industry reporter with previous assignments at Security Magazine and SDM Magazine. Karyn is the managing editor for SDM Magazine. She can be reached at 630-694-4025.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0119-education-Feat-slide1_900px

    It Takes a Village: Continuous Communication for Higher Education

    See More
  • Proptech Market Graphic

    Security Systems & PropTech: Coming to a Smart Building Near You

    See More
  • credit card security

    Only 1 in 4 global organizations keep cardholder payment data secure 

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing