Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

CSO & CISO Technology Fatigue

By Kevin Coleman
November 13, 2016

As this year comes to a close it is clear the cyber threat environment continued to evolve and remains a formidable challenge to every CSO and CISO. Few people with an inside view of CSOs and CISOs operating environment would argue that their world is increasing in scope and complexity at a high rate. This increase is being driven by a number of factors. A general review of this topic resulted in several common drivers of complexity in the cybersecurity domain. Here is a list of five of the more common complexity drivers.

Common Complexity Drivers

  1. Regulations and internal rules
  2. New and emerging technologies
  3. Developing solutions to the current problem set
  4. Human resource challenges, including recruiting & continuing education
  5. The ever increasing number of threats particularly sophisticated threats

These are five of the many drivers of complexity in today’s cybersecurity environment. Looking at what the industry analysts are projecting, the complexity of an organization’s technology environment will continue to increase for the foreseeable future. There are way too many drivers of contributing to the dramatic increase in complexity in the cybersecurity environment to list. Some are very industry specific. While not mentioned frequently, I believe the increased involvement of the Board of Directors in cybersecurity issues is contributing to the overall stress of the job. After all, some board members do not understand many aspects of technology and the operational challenges of the growing threats we face in the cybersecurity environment.

FACT: Maintaining a properly sized workforce and continuously updating their skill sets is a growing problem particularly in the cybersecurity area due to a shortage of some skill sets. This will continue to be a problem in the near term.

It is clear that this challenging environment is taking its toll on most if not all of those involved in cybersecurity.  ver heard of technology fatigue? Note: a short time ago CSOs and CISOs issues were identified and termed alert fatigue. While that is true, it is only one of the many factors that is currently driving the fatigue factor. While it is still an issue, other factors should be considered that may be more significant. In the 25+ years I have been involved in technology, I have never seen so many emerging technologies coming into play at the same time. Usually we see one, maybe on rare occasion two, but never before have we seen the number that appear to be on the threshold of moving into the accelerated adoption and advancement stage of their evolution – some put the number at 10. Things will change given the impact all those new and emerging technologies are bound to have on organizations. That will likely increase the workload of nearly every CSO and CISO.

INSIGHT:  It is important to remember the digital transition has just begun and that will bring with it new challenges, issues and opportunities that will impact CSOs and CISOs.

The criticality of the CSO’s and CISO’s role has never been as important as it is today. All of this can lead to a number of issues, including slow or otherwise impaired decision making, chronic lateness, snappiness and irritability, as well as questionable judgement. Left unaddressed this is likely to lead to mistakes, burn-out and increased turnover and that is something organizations can’t afford!

Given the likelihood that 2017 will be another record year for new strains of malicious software, notable cyberattacks and data breaches and the growth of insider threats, the cybersecurity environment will get much worse before it gets better. CSOs and CISO should take action now and become proactive to the extent possible. If a close confidant or thought partner seen you exhibit any of the traits listed above, ask them to pull you aside and tell you!  You do not want to exhibit any of those traits – it could be very detrimental to your career.

 

KEYWORDS: cyber attack cyber security security technology

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing