Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy

By Evgeny Zaretskov
Glowing fibers
Luke Jones via Unsplash
May 13, 2026

The World Economic Forum’s Future of Jobs Report 2025 ranks cybersecurity among the top three fastest-growing skills through 2030. Perhaps unsurprisingly, cybersecurity has moved from antivirus and basic threat prevention to defending against hacks, fraud and DDoS attacks shaped by the fallout from heightened geopolitical risks.

Cybersecurity now sits at the heart of how successful digital products are built, delivered and consumed. The failures in this space are hard to forget and even harder for digital businesses to recover from. In late 2025, Coupang, South Korea’s leading e-commerce and fintech platform, disclosed a major data breach. Reportedly, a former employee was able to keep using an old internal key, gaining unauthorized access that went undetected for months. It was that failure in access control, key management and threat detection that contributed to missed revenue expectations and a decline in active customers. The shares fell sharply when the incident became public, and the discussion of potential penalties for this breach is still ongoing.

Critically, failure in cybersecurity delivery doesn’t only come from gaps in protection. It can also result from controls that are too rigid or poorly calibrated to real-world conditions. Overly aggressive security mechanisms can disrupt the very services they are meant to protect, turning defense into a source of failure.

Around the same time as the Coupang incident, Cloudflare experienced an event that triggered a widespread outage affecting platforms such as X and ChatGPT. The root cause was not an external attack, but an internal configuration issue: a file used to manage threat traffic grew unexpectedly large and ultimately overwhelmed the system responsible for handling it. The result was downtime, disruption and loss of trust, which was caused by the security layer itself.

Both incidents point to the same important conclusion: cybersecurity can no longer be treated as something separate from product delivery. In cloud-native businesses, it is part of delivery. It shapes customer trust, revenue generation and the speed at which organizations can safely evolve.

This shift is also affecting whom organizations seek to hire. A 2026 talent trends report on iGaming, one of the world’s fastest-moving digital sectors, argues that the old model, where security was the responsibility of a small group of specialists, is failing. Instead, companies are moving towards hybrid profiles: people who can combine technical depth with product judgement and commercial awareness. The report also notes that the hardest roles to fill are those operating “between theory and operational reality,” where people do not merely identify problems but make safe and reliable delivery work under production pressure.

We see this in our hiring function at SOFTSWISS as well. The hardest positions to fill are the ones that turn security into a shipping reality. The job no longer consists of just finding issues. It is now focused on designing safe defaults that teams can follow without slowing delivery.

As consumers, we have all become so accustomed to frictionless digital experiences, speed and convenience that our loyalty rarely survives painfully slow service. After all, competing services are only a click away. Whether in e-commerce, travel, financial services or digital platforms, the best cybersecurity teams are increasingly judged by how well they help the business move, rather than by what they block. Too many organizations still separate speed from resilience, as if one belongs to engineering and the other to security and compliance. In reality, the companies that move fastest and are able to do this well are the ones that solve for both at the same time.

Beyond the user experience, there is another reason why doing so is of key importance. In fast-changing cloud environments, evidence disappears quickly, dependencies shift continuously, and the cost of delay compounds. The same report warns that the “we’ll fix it later” approach is punished in always-on, high-load digital environments.

This has direct implications for leadership, as well as for building and hiring teams. Cybersecurity cannot be left to IT or security teams alone. The report argues that cybersecurity is becoming a deciding factor in hiring across multiple functions, not just within IT, and that the organizations most likely to scale successfully are those that treat security as a shared capability backed by cross-functional accountability.

As cybersecurity becomes embedded in delivery, the demand is no longer limited to specialist roles. The same talent trends report highlights that 63% of employers see skills gaps as the biggest barrier to organizational transformation through 2030, while 39% of core skills are expected to change or become obsolete. The gap is most acute in roles that sit at the intersection of security, engineering and operations, affecting the people responsible for making secure delivery work in practice. Organizations that succeed will be those that treat capability building as continuous, integrating security thinking into multiple functions rather than relying on standalone tools or siloed expertise.

This, in turn, raises the bar for leadership and organizational design. Cybersecurity is no longer a function that can be delegated and reviewed after the fact; it requires shared ownership across product, engineering and business teams. Leaders must align incentives, processes and accountability around one goal: delivering secure, reliable services at speed. In this model, security becomes a design principle embedded into how systems are built and operated, rather than a control applied at the end.

KEYWORDS: hiring hiring practices hiring security

Share This Story

Evgeny zaretskov headshot

Evgeny Zaretskov is Group Chief Security Officer at SOFTSWISS. Image courtesy of Zaretskov 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Man silhouette

Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing