January 14, 2016 By Kevin G. Joseph 3 min read

With the arrival of the new year comes new changes. Businesses are implementing new sales strategies, new products and services and new management teams. There is no denying that the business landscape has dynamically changed since the start of the 21st century.

Chief executive officers and operating officers can no longer just focus on corporate efficiency and sales strategy. Chief financial officers and compliance officers can no longer focus solely on forecasting and planning. The new cyberthreat landscape requires chief executives to rethink how and who they hire.

https://youtube.com/watch?v=bWjrVXB0ZvQ

Cyber-Conscious Executives

The most dangerous doctrine in business is, “We’ve always done it this way, why change now?” The cybersecurity crises of today choose our leaders. Electing a leader who will protect the enterprise is the most important decision in today’s business environment. When organizations are selecting new executives to take over the top spots in their institutions, choosing an executive with security aptitude must be at the center of the selection process.

As organizations continue to adopt cloud, mobile and analytics solutions, the threat landscape is becoming more diverse and the business more vulnerable. These trends are calling for organizations to implement comprehensive, enterprisewide security strategies. However, before implementing a security strategy, an organization must be sure to select the appropriate chief executives to lead its missions.

In today’s business environment, chief executives lose their jobs when the organization experiences a data breach or damaging cyberattack. Many times, these leaders have made no investment in cyber defense and countermeasures, which left their enterprises vulnerable to malicious actors.

If you’re a gambler and make no investment to protect yourself and your business, then you’re at risk of losing your job when your business is attacked. However, if you’re a cyber-conscious chief executive who is taking proactive measures to increase the security IQ of employees, implement cyber defense solutions and create incident response teams, you have made a much better case to keep your job.

Security Helps Grow the Business

While keeping your job may be your No. 1 priority, retaining your customer base is a close second. In my experience, there are only two ways to grow your business:

  • Get customers to buy more; or
  • Get more customers.

No matter what industry you’re in — financial, health care, energy, education, etc. — cyberattacks and data breaches are among the leading reasons why customers will leave you for a more secure competitor.

Today, if you can’t show customers that you are making a proactive investment to keep their information secure, then I would suggest the customer find another service provider. Their personal information is just too important to risk.

Slow to Hire, Quick to Fire

With this is mind, companies seeking new management teams need to be aware of the consequences of hiring executives who place no focus on cybersecurity.

  • Chief executive officers and chief operating officers who have poor security policies are likely to see a loss of market share and reputation, increased legal exposure and disruption in business continuity as a result of a data breach.
  • Chief compliance officers and chief financial officers can expect failed audits, fines and drastic financial loss.
  • Chief information officers will see an impact to data and systems as well as disruptions in confidentiality, integrity and availability of infrastructure.
  • Chief human resource officers and chief marketing officers can expect a violation of employee privacy, loss of sensitive data, loss of customer trust and damaged brand reputation.

Your board and CEO are demanding a cybersecurity strategy. The consequences are too great and your job is too important. Take the time to be proactive instead of reactive. Hire the right people. And remember: The crisis of today chooses our leaders. Choosing a leader who will protect the business is the most important decision we can make in today’s environment.

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today