Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business Resilience

With a recession looming, security leaders should plan for the impact

By Jason Lish
CISO looking at finances

Image via Pixabay

March 9, 2023

Business leaders are speculating about the potential impact of a looming recession. The concerns about how an economic downturn could impact cybersecurity programs are real. Without the benefit of a crystal ball, experienced CISOs and security leaders must remember there have been challenging times before. CISOs and security leaders are not new to budget cuts or the need to justify investments without tangible top/bottom line returns.

The difference this time is that most security professionals are facing increasing scrutiny from regulators, lawyers, customers and shareholders. Stakeholders want assurance that we have the right levels of visibility, protection and response capabilities – regardless of the economic challenges being faced. Here are a few considerations for navigating challenging times and budget pressures under the spotlight of stakeholder scrutiny.

Focus on a robust risk management program

There may be more risk tradeoffs during tough times, so it’s important to have the right framework to drive visibility and risk-based decision making. This includes risk identification, common taxonomy aligned to enterprise risk and treatment of risk. Just like math students, security professionals need to be able to show their work and demonstrate how they came up with the answer or decision. The key takeaway here: It may be acceptable to delay an investment or accept a gap. Just ensure the business is making informed decisions by understanding the tradeoffs and potential options to reduce the risks as much as possible.

Prioritize third-party risk

When companies look to decrease expenses, they often turn to managed or outsourced services. It’s important to assess critical vendors and identify the risks as part of that decision – both initially and in perpetuity. Remember, during tough times, there could be additional reliance on vendors that may create additional risks. In addition, vendors could end up taking shortcuts or making their own risk tradeoffs during challenging times. Identifying those risks early and often is particularly important so exposure can be limited, if necessary.

Know and prioritize attack surfaces

Understanding what attackers can see about an organization’s environment is critical. This includes external IP space, cloud environments and external assets. Additionally, being able to prioritize those assets becomes even more critical in challenging times because certain tradeoffs may be necessary around layered controls. This is important for prioritizing configuration and vulnerability remediation activities, as well. Visibility of critical assets and data is essential to prioritizing security efforts. The good news here is that access to relatively low-cost, automated services that constantly scan and test our environment for exposures is available to help prioritize focus.

Maximize existing investments

Upon entering a new environment, it’s important to assess what toolsets are in place and how they are being used. It’s not uncommon to see that significant investments have been made in platforms where less than half of the capabilities were leveraged. And upon meeting with a solution partner, it’s a good idea to ask about the existing solutions that aren’t being leveraged before the potential partner recommends additional solutions.

It’s also important to look for ways to integrate new or existing solutions to further automate workflow. For example, when it comes to vulnerability identification capabilities, it’s important to attempt to integrate them into existing IT systems (DevOps platforms, ticketing systems, etc.) to maximize usage and value. Requiring IT or application partners to log in to separate systems or tools is never ideal.

Lastly, when considering an investment in new or innovative solutions, think about how the capabilities can expedite the value of existing investments.  Keep in mind that existing investments could be the low-hanging fruit of cost savings. Make sure they’re being used to their full potential and automated as much as possible.

Security awareness is still essential

Creating a culture of security and empowering users to act as an extension of the security team is no small endeavor. However, it has become increasingly more important because criminals and bad actors seek to exploit human vulnerabilities as much as they target technical ones. Enabling users to act like a security professional – regardless of their role – is a best practice, regardless of economic conditions.

Now is a good time to conduct real-time training such as phishing/vishing tests, distribute engaging videos and remind employees how to identify and report suspicious activity. The more awareness can be personalized with relevant topics like travel security, home internet threats and identity protection, the more likely the message will resonate and be applicable in a workplace scenario.

The key takeaway here is that threat actors tend to prey on end users more during global events such as pandemics, recessions and natural disasters. Positioning security as everyone’s responsibility is another tool that can help stop social engineering, impersonations and other exposures.

The uneasiness of a potential economic downturn is real, but it’s neither unprecedented nor unmanageable. Focus on risk management and third-party risk, understand and prioritize your attack surface, maximize existing investments and continue to focus on user awareness. By doing this, it’s possible to weather the storm, satisfy stakeholders and protect the bottom line.

KEYWORDS: cybersecurity economic damages risk management program security awareness third-party risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jason Lish is the Chief Security Officer at Lumen Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Lowering stocks on monitor

    The recession-proof security leader: How CISOs can do more with less

    See More
  • The Long and Winding Road to Cyber Recovery

    Shadow IT was a security crisis. Now Shadow IT 2.0 is looming. Let’s skip the crisis this time.

    See More
  • cyber-csuite-fp1170x658v54.jpg

    Top cyber strategies for C-suite leadership during a recession

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing