The changing role of the CISO in uncertain times

The changing role of the CISO in uncertain times



COVID-19 has dramatically altered the world of cybersecurity and gravened the threat poised to companies that are increasingly shifting assets online, beyond the safety of the firewall. In this new reality, where cyberattacks are constant and security barriers porous, the guarantee in keeping organisations safe now lies beyond simple prevention.


The pandemic has proven a heady time for threat actors, as companies have had to quickly stand-up remote working infrastructure to support their distributed workforces. This has left ample opportunity for new weaknesses to be discovered, while cybercriminals have additionally exploited the anxiety populations felt surrounding COVID-19, leaving them vulnerable to social engineering attack. Although the pandemic may be abating in certain regions, security teams are also now having to navigate how remote working devices are being brought back into company networks, while maintaining security.


With organisations as vulnerable to cyberattack as they have ever been, responsibility and expectations have been placed on technical leaders to keep their companies safe. No longer can cybersecurity be seen as a maintenance cost, but as an integral part of the company budget to maintain operations. CEOs and board members must now face the reality that a successful cyberattack may ruin their company’s entire upward trajectory.


In wake of this cybersecurity crisis, CISOs have been thrust into a pivotal role, acting as generals on the frontline of the cyber-battlefield. This is even true to the nation-state level, as corporate espionage, and other strategies of cyberattack against Western industries, are increasingly attributed to hostile foreign actors such as China, Russia, and Iran. Beyond geopolitics, well-organised criminal syndicates are conducting high-profile attacks against businesses for huge financial gain – using methods that are only growing in s ..

Support the originator by clicking the read the rest link below.