Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Increased Attention from Middle-Market C-Level Executives

By Kevin Coleman
leadership
August 31, 2016

The results of a recent survey of C-suite executives in companies ranging in size from $100 million to more than $1 billion in annual revenues resulted in some surprising changes. One shocking stat that came out of the survey was that in slightly more than 50 percent of respondents, the business leaders or a combination of the business side and IT departments led the adoption of new and emerging technologies within the organization! That is a first. There is fair amount of good news that can be gleaned from this survey, bit with the good news comes some not so good news. The bottom line is that emerging technology is getting a lot more attention these days and seen as strategically important. With that increased importance comes addition cyber surface areas that must be protected from cyberattacks and theft.

Like it or not, CSOs and CISOs are increasingly finding themselves involved in strategy discussions within their organization. After all a surprising 30 percent more executives view technology investments for their strategic value, up from under 40 percent in the past two years. In addition, a recent survey discovered that one-third of executives polled stated that technology spending among middle market companies was up from level for the previous year. In fact, more than 27 percent of those executives stated the increase was up over 5 percent from their previous year. It is no wonder that nearly 50 percent of the executives surveyed believe that technology has enhances business planning and execution.

With all of this increased attention, investment and activity comes additional security risks. It appears the top three areas that every CSO and CISO should have a heightened level of concern are:

1. Cloud Computing

2. Big Data

3. Data Analysis (tools and services)

Surprisingly virtual or augmented reality is increasingly being integrated into business processes and capabilities. As one might expect, the Internet of Things (IoT) is also right up there with top technologies involved in strategic discussions.

If you have not been brought into this growing trend of perusing the strategic value that technology brings, you would be well advised to find out why! After all you are the one responsible for protecting all of this technology! Many executives opening admit that IT security is and will continue to be a top priority. In fact, over 60 percent opening admit that implementing new security processes is the most important focus of their cybersecurity spending. In addition, 28 percent of executives admitted that security is the biggest IT challenge their organizations faces. That is probably why managing cybersecurity and information risks was identified as a top priority by nearly 36 percent of executives asked. Most telling was the fact the information security/cyber intelligence was identified as having the top technology impact on their organization in the past year and will have the biggest technology impact on the organization next year as well. Perhaps the biggest surprise in the survey results comes from the identification of cybersecurity as the top technology-related trend having the greatest impact on customers. Given that finding, it is a sure bet that every CSO and CISO will find themselves under increased scrutiny. Businesses are very protective of customer relationships as they should be. With the formal recognition of the role cybersecurity plays in meeting customer expectations as well as protecting the relationship with customers you can be sure that management throughout the organization will becoming much more engaged with you and concerned about how your cybersecurity strategy may impact their customers.

After analyzing all that information, the bottom line is that middle-market businesses have become acutely aware of the increasing role technology plays in their strategy and operations. With that as the foundation, cybersecurity has been driven to a level of strategic importance – far beyond the level of attention it has received in the recent past. That translates to increased attention and pressure on you the CSO or CISO.
 

KEYWORDS: Chief Security Officer (CSO) CISO cyber security

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing