Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity & Business Resilience

Where do CISOs stand in an era cyberattacks and intense scrutiny?

By Jacob Olcott
Chess table and pieces

Image via Unsplash

September 25, 2024

Cybersecurity has no doubt entered the national dialogue when it comes to economic or even national security issues. By nature, cyber is a deeply technical endeavor, but organizational culture surrounding security has become as important as the tech wizardry itself. This is evidenced by Microsoft’s recent testimony before the House Homeland Security Committee around alleged security lapses (for instance, the tech giant was mired in the headline-grabbing SolarWinds breach that touched government agencies). It has now launched an initiative designed to shore up internal processes and boost security strength, along with favorability.

Still, the reception has been tepid at best: a scathing op-ed from former National Security Advisor Robert C. O’Brien warned against Microsoft becoming “a hackers’ superhighway.” Yet, with crippling ransomware attacks and other stealthy breaches on the rise, Microsoft is not the only company reevaluating or enhancing its approach to cybersecurity. So, what’s influencing today’s “security posture” — and how are CISOs actually affecting it? What’s their most effective strategy? Further, is the specter of personal legal or financial responsibility for security leaders, a la the initial fraud charges against SolarWinds’ chief information security officer (CISO), catalyzing security or setting teams back?

This article will analyze the plight of today’s CISOs and their role in safeguarding an organization’s market presence and reputational status, which is the most significant internal driver. In fact, security’s impact on the business should hold more of the focus in high-level conversations — versus potentially ignoring weaknesses or devising ways to pin blame or financial responsibility on individuals. The conversation must evolve, as it takes a village to secure the hundreds of millions of customer dollars, or more, at stake. C-suite members would be remiss not to recognize and empower the battle-tested CISOs who are on the frontlines. But, what does that empowerment look like?

Getting the right leaders into CISO positions

To be clear, day-to-day security strategy starts with the CISO. Of course, cyber risk widens quite extensively beyond this individual, and is now often a CEO and board-level discussion. Still, the CISO provides requisite oversight and administration of the program.

So, first and foremost: a top business consideration must be who is sitting in the CISO chair. These individuals can no longer just be the highest-performing security administrator or even the brightest security strategist. Instead, they need to be big-picture business thinkers capable of connecting their work to organizational performance at the highest level.

This is not a new consideration — for years the industry has called on CISOs to enter these influential business conversations and guide their boards and executives. For traditionally technical folks, this can be a challenge; but there is a pool of talented leaders ready to step up.

The technical-strategic divide

True, SolarWinds has become a bogeyman for security leaders — considering recent enforcement action from the U.S. Securities and Exchange Commission (SEC) that singled out the company’s CISO (though a majority of the charges have since been dropped). Still, the more imminent threat is not so much personal liability — though it’s on CISOs’ minds — but the gulf between security’s technical ins and outs and a deep understanding of its real impacts. In fact, cybersecurity missteps can be profound: impacting insurance premiums, litigation and even business contracts. These are waves coming together and crashing ashore at once.

This makes the CISO role increasingly important. Still, capable CISOs also need a receptive — and engaged — C-suite audience. In fact, the days of operating in a siloed corner of the business are long over. So, for one, a broader range of executive salaries should hinge on the company’s ability to stay cyber-secure. Business-wide failures should not be one person’s undoing.

Still, CISOs must be the catalyst — grounding execs in strategy and outlining preparatory measures. But, risk mitigation also demands broader buy-in. This will ultimately help teams contend with emerging threats and sustain or grow their company’s market position.

Getting those non-security leaders on-board

It’s well understood that top executives need to be clued into security strategy. But, the question becomes: How can CISOs more easily loop them in? Ultimately, it involves fine details and truly “nailing” those presentations and other regular discussions. It means translating cyber’s impact to dollars and cents, or customers won and lost. As a regular exercise, this will help educate various leaders, elevate CISOs and give cybersecurity the attention it deserves.

More specifically, CISOs can actually calculate potential financial losses from data breaches (they reached an all-time high of $4.45 million lost per incident in 2023), including costs of remediation, legal fees, and regulatory fines. They can also assess the impact of security incidents (internal or external) on customer trust, brand reputation, and potential revenue loss from decreased customer retention and acquisition. These are the keywords that will garner attention, and quickly.

Thanks to new methods, including metrics like cyber risk ratings, security teams can also leverage independent analyses that quantify performance — helping to set a baseline and ultimately get wider buy-in on budgets and solutions.

Moving forward

Surging ransomware attacks and recent rhetoric from tech giants have proven that cybersecurity is a highly complex, but more importantly consequential, area of the business. Both proper guardrails and leadership are necessary to boost organizational, and even national, cyber-resilience.

With this guidance and by pushing for broader participation, CISOs and their peers will be set up for success — more easily gauging risk levels, fortifying their systems and data, and keeping cybercriminals at bay.

KEYWORDS: C-suite involvement CISO CISO leadership organizational resilience organizational risks

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jacob olcott headshot

Jacob Olcott is Vice President, Government Affairs at Bitsight. Image courtesy of Olcott 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Lowering stocks on monitor

    The recession-proof security leader: How CISOs can do more with less

    See More
  • Metro Health

    Metro Health joins collaborative effort to combat pandemic-era increase in cyberattacks

    See More
  • Painted Earth

    An era of conflict: Navigating a ‘fragmenting world’ in 2025

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!