Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Increased Attention from Middle-Market C-Level Executives

By Kevin Coleman
leadership
August 31, 2016

The results of a recent survey of C-suite executives in companies ranging in size from $100 million to more than $1 billion in annual revenues resulted in some surprising changes. One shocking stat that came out of the survey was that in slightly more than 50 percent of respondents, the business leaders or a combination of the business side and IT departments led the adoption of new and emerging technologies within the organization! That is a first. There is fair amount of good news that can be gleaned from this survey, bit with the good news comes some not so good news. The bottom line is that emerging technology is getting a lot more attention these days and seen as strategically important. With that increased importance comes addition cyber surface areas that must be protected from cyberattacks and theft.

Like it or not, CSOs and CISOs are increasingly finding themselves involved in strategy discussions within their organization. After all a surprising 30 percent more executives view technology investments for their strategic value, up from under 40 percent in the past two years. In addition, a recent survey discovered that one-third of executives polled stated that technology spending among middle market companies was up from level for the previous year. In fact, more than 27 percent of those executives stated the increase was up over 5 percent from their previous year. It is no wonder that nearly 50 percent of the executives surveyed believe that technology has enhances business planning and execution.

With all of this increased attention, investment and activity comes additional security risks. It appears the top three areas that every CSO and CISO should have a heightened level of concern are:

1. Cloud Computing

2. Big Data

3. Data Analysis (tools and services)

Surprisingly virtual or augmented reality is increasingly being integrated into business processes and capabilities. As one might expect, the Internet of Things (IoT) is also right up there with top technologies involved in strategic discussions.

If you have not been brought into this growing trend of perusing the strategic value that technology brings, you would be well advised to find out why! After all you are the one responsible for protecting all of this technology! Many executives opening admit that IT security is and will continue to be a top priority. In fact, over 60 percent opening admit that implementing new security processes is the most important focus of their cybersecurity spending. In addition, 28 percent of executives admitted that security is the biggest IT challenge their organizations faces. That is probably why managing cybersecurity and information risks was identified as a top priority by nearly 36 percent of executives asked. Most telling was the fact the information security/cyber intelligence was identified as having the top technology impact on their organization in the past year and will have the biggest technology impact on the organization next year as well. Perhaps the biggest surprise in the survey results comes from the identification of cybersecurity as the top technology-related trend having the greatest impact on customers. Given that finding, it is a sure bet that every CSO and CISO will find themselves under increased scrutiny. Businesses are very protective of customer relationships as they should be. With the formal recognition of the role cybersecurity plays in meeting customer expectations as well as protecting the relationship with customers you can be sure that management throughout the organization will becoming much more engaged with you and concerned about how your cybersecurity strategy may impact their customers.

After analyzing all that information, the bottom line is that middle-market businesses have become acutely aware of the increasing role technology plays in their strategy and operations. With that as the foundation, cybersecurity has been driven to a level of strategic importance – far beyond the level of attention it has received in the recent past. That translates to increased attention and pressure on you the CSO or CISO.
 

KEYWORDS: Chief Security Officer (CSO) CISO cyber security

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing