Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

CSO & CISO Technology Fatigue

By Kevin Coleman
November 13, 2016

As this year comes to a close it is clear the cyber threat environment continued to evolve and remains a formidable challenge to every CSO and CISO. Few people with an inside view of CSOs and CISOs operating environment would argue that their world is increasing in scope and complexity at a high rate. This increase is being driven by a number of factors. A general review of this topic resulted in several common drivers of complexity in the cybersecurity domain. Here is a list of five of the more common complexity drivers.

Common Complexity Drivers

  1. Regulations and internal rules
  2. New and emerging technologies
  3. Developing solutions to the current problem set
  4. Human resource challenges, including recruiting & continuing education
  5. The ever increasing number of threats particularly sophisticated threats

These are five of the many drivers of complexity in today’s cybersecurity environment. Looking at what the industry analysts are projecting, the complexity of an organization’s technology environment will continue to increase for the foreseeable future. There are way too many drivers of contributing to the dramatic increase in complexity in the cybersecurity environment to list. Some are very industry specific. While not mentioned frequently, I believe the increased involvement of the Board of Directors in cybersecurity issues is contributing to the overall stress of the job. After all, some board members do not understand many aspects of technology and the operational challenges of the growing threats we face in the cybersecurity environment.

FACT: Maintaining a properly sized workforce and continuously updating their skill sets is a growing problem particularly in the cybersecurity area due to a shortage of some skill sets. This will continue to be a problem in the near term.

It is clear that this challenging environment is taking its toll on most if not all of those involved in cybersecurity.  ver heard of technology fatigue? Note: a short time ago CSOs and CISOs issues were identified and termed alert fatigue. While that is true, it is only one of the many factors that is currently driving the fatigue factor. While it is still an issue, other factors should be considered that may be more significant. In the 25+ years I have been involved in technology, I have never seen so many emerging technologies coming into play at the same time. Usually we see one, maybe on rare occasion two, but never before have we seen the number that appear to be on the threshold of moving into the accelerated adoption and advancement stage of their evolution – some put the number at 10. Things will change given the impact all those new and emerging technologies are bound to have on organizations. That will likely increase the workload of nearly every CSO and CISO.

INSIGHT:  It is important to remember the digital transition has just begun and that will bring with it new challenges, issues and opportunities that will impact CSOs and CISOs.

The criticality of the CSO’s and CISO’s role has never been as important as it is today. All of this can lead to a number of issues, including slow or otherwise impaired decision making, chronic lateness, snappiness and irritability, as well as questionable judgement. Left unaddressed this is likely to lead to mistakes, burn-out and increased turnover and that is something organizations can’t afford!

Given the likelihood that 2017 will be another record year for new strains of malicious software, notable cyberattacks and data breaches and the growth of insider threats, the cybersecurity environment will get much worse before it gets better. CSOs and CISO should take action now and become proactive to the extent possible. If a close confidant or thought partner seen you exhibit any of the traits listed above, ask them to pull you aside and tell you!  You do not want to exhibit any of those traits – it could be very detrimental to your career.

 

KEYWORDS: cyber attack cyber security security technology

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing