Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and Management

The Art of Security: It Is Time to Rethink the CISO’s Role

By Joe Oleksak
Hand holding lightbulb
lilartsy via Unsplash
May 5, 2026

“If you know thy enemy and know thyself, you need not fear the result of a hundred battles.” – Sun Tzu

Today, when businesses find themselves entrenched in unending cyber conflict and threats lurk in every corner, Sun Tzu’s admonition to know thy enemy and know thyself are prophetic. Despite years of effort and investment, hackers continue to gain ground even as business leaders who invested in advanced technologies look to IT for answers while stubbornly clinging to the misconception that IT alone is responsible for security.

Traditionally, executives placed the Chief Information Security Officer (CISO) within the IT department, where they focused primarily on managing cybersecurity threats with technical measures — a vulnerability in itself. To know thyself is to know that this approach is inadequate and treats cybersecurity as a series of isolated skirmishes rather than an all-out war that demands a comprehensive strategy.

Placing the CISO in an IT silo is akin to fighting with one hand tied behind the back, with little knowledge not only of the enemy — a foe that is sophisticated and determined — but also one’s own colleagues and defenses. To be effective, the CISO must, like a battlefield officer, work with keen intelligence of the organization on hand and the support of its C-suite. Just as in war, where adaptability is key, businesses must adapt their approach to leadership in order to effectively repel attacks that will only grow more complex.

That is why companies must rethink the role of their CISO, transforming it from a cyber foot soldier into a strategic officer and cornerstone of their defense strategy. This can only happen if organizations acknowledge the importance of aligning the CEO, CFO, CIO, and CISO in defensive efforts where each position understands its part in the cyber war.  

The CEO: The General Leading the Charge

Just as a general sets the course for battle, the CEO shapes the organization’s culture and strategy. A visionary CEO understands that cyber war is not just about foiling attacks but about fostering a culture of security and resilience. By working closely with the CISO, the CEO’s role involves rallying the troops — ensuring every department recognizes the importance of security and works towards a shared strategic objective. The CEO embeds security into the ethos of the business so it is prepared for the long fight ahead. 

The CFO: The Quartermaster

In battle, the importance of supplies cannot be overstated. Similarly, the CFO ensures the financial resilience needed to withstand prolonged engagements. The CFO’s expanded mandate includes anticipating and mitigating the economic impacts of cyber threats and by working closely with the CISO allocates resources to strengthen defenses.

The CIO: The Tactician

In war, knowing the terrain is crucial. The CIO, as the master tactician, ensures the technological architecture is both innovative and secure. The CIO must navigate the delicate balance between advancing technology and protecting the organization from new vulnerabilities. By collaborating with the CISO, the CIO integrates security measures into every technological initiative, ensuring that innovation does not compromise the organization’s defenses.

The CISO: Battlefield Strategist

The modern military emphasizes strategy over brute force. The modern CISO embodies this principle, evolving from  a technical guardian into a strategist who serves as the organization’s eyes and eyes on the battlefield — providing situational awareness and embedding security into its very fabric while working with the CEO, CFO, and CIO.

The New Paradigm: Integrated Command

When the CEO, CFO, CIO, and CISO operate in concert, the result is an integrated command structure that mitigates operational, financial and technology risks while encouraging:

  • Collaborative Strategy Development: Security must be a central tenet of strategic planning, with the CISO contributing insights on emerging threats and mitigation strategies that directly impact operational, financial and technology-focused decision making.
  • Effective Resource Allocation: The CFO and CISO collaborate to prioritize security initiatives to ensure that investments bolster defenses and that viable plans are in place to safeguard the financial strength required to fight.
  • Technological Synergy: The CIO and CISO work together to implement secure technologies that support innovation without exposing the organization to undue risks.
  • Cultural Integration: The CEO and CISO drive a cultural shift that values security as a critical component of the organization’s DNA, fostering an environment where every employee understands their defensive role.
  • Compliance: Beyond the executive suite, the CISO also collaborates with the legal and compliance to stay ahead of regulatory changes and with human resources to keep people engaged.

Reimagining the CISO role is a necessity to win the war. As cyber threats continue to evolve, organizations that recognize the CISO as a central figure in their leadership team will thrive. By integrating the CISO’s expertise into strategic planning, financial management, and technological innovation, businesses can build a resilient framework capable of withstanding the complexities of the modern and unrelenting cyber war. The time has come to rethink the CISO’s role.

KEYWORDS: CFO CFO cybersecurity cfo partnerships CFO role CIO CISO security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Oleksak joe headshot

Joe Oleksak, CISSP, CRISC is a partner in Plante Moran’s cybersecurity practice, where he has more than two decades of experience providing companies across industries, including banking, healthcare, and insurance, with strategic guidance for IT planning and operations. His specialties include information security risk assessments, information technology audits, network security assessments and penetration testing, business continuity planning, incident response, application controls, SOC reviews, privacy audits — including HIPAA and HITECH — and standards and compliance with regulations like Sarbanes-Oxley and standards such as PCI-DSS.

Image courtesy of Olesak

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • hybrid-work-security-fp1170x658.jpg

    How the role of CISO is evolving due to hybrid and remote work

    See More
  • The Long and Winding Road to Cyber Recovery

    Shadow IT was a security crisis. Now Shadow IT 2.0 is looming. Let’s skip the crisis this time.

    See More
  • The Uncharted Path for New Security Leaders

    Hiring a CISO: The evolving role of your security executive

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing