Inside The Mind Of A CISO

AI is a disruptive technology in more ways than one. A survey of 209 CISOs and security leaders globally shows security professionals struggling to reach consensus about what AI means for their organisation and their own roles. 

Despite a range of divergent and sometimes contradictory views, the report Inside the Mind of a CISO leaves little doubt that AI is a powerful force for change. What’s less clear is whether change overall will be good or bad. And perhaps it’s too early to expect CISOs - or anyone - to be able to settle that question.

As for disruption, the survey points to a worryingly high-level of burnout among security professionals, with as many as two-thirds of CISOs who believe that security practitioners experience a higher rate of burnout then other roles.   Aggravating factors for this include the hiring landscape: over half of CISOs say their teams are understaffed and 87% are currently hiring. 

However, there is growing confidence that AI will make a positive difference at least in automating some of the less skilled roles. Nearly a quarter of respondents (23%) say that AI tools have already enabled them to reduce or repurpose headcount, while 71% expect to have made cuts over the next three to five years. 

Gartner endorses this trend. They have gone on record to say that by 2028 AI will have closed the skills gap. However, and this is the critical point, the Gartner prediction refers to “entry-level skills”. That begs some big questions about the security workforce as a whole. What skills will be needed to address the next wave of AI-enabled threats? Will AI tools mitigate those too? Or will we just see the bar raised in future?

Not to leave those questions hanging, I believe the answers are “We don’t know yet”, “Not entirely” and “Yes”.

While it would be reassuring to think that AI will close the skills gap, I think it’s more accurate to predict that it will change it. The bottom line for organisations of all kinds is that finding the right people to mount an effective defence will be challenging for the foreseeable future.

CISOs are realistic about the threats facing their organisations. Asked about their top priorities, only 18% had the goal of “avoiding breaches at all times”. Most of the responses were more pragmatic than optimistic, with 17% voting for “balancing risk against business objectives” and 20% for “building resilience”. In other words, few CISOs believe they’re in a war that will be over anytime soon. The majority are settling in for a long campaign. 

The top priority for 31% of CISOs is “building a security brand”, reflecting their belief that effective cybersecurity is now a major factor in competitive advantage.

This is a significant finding reflecting a shift in attitudes from a “do enough” compliance culture to a business environment in which being seen to “do more” has become a critical measure of business viability and being a business enablement powerhouse.

Few CISOs in the survey believe organisations are doing enough today, however. Most believe that the majority of organisations do not fully understand the risks of being breached and, as a result, are not as well defended as they could be.

While they also understand that many of the decisions organisations make will be a trade-off between business benefit and security risk, CISOs have serious concerns that some may start taking risks that will compromise their customers’ long-term privacy or security for the sake of short-term savings. 

As for AI, while CISOs are currently split about its use, this is more a matter of timing than any deeply held conviction. 

Nearly eight in ten (78%) are already using AI in their security teams and of the rest only 3% say they will never use it. Does it outperform some of their security professionals in certain cyber processes? Yes, according to 44%, while most of the rest (47%) believe that it will eventually replace team members when the technology improves. This is not a view shared by ethical hackers, who believe that while AI adoption will increase, it will never replace human ingenuity. 

The picture may be more nuanced. As we saw earlier, there’s no doubt that AI will replace low-level security roles with certain operational type characteristics. What happens further up the skills hierarchy is less clear. 

Even with the benefits of AI from a hiring perspective, the jury is still out on AI’s long term potential. 58% of CISOs argue that the risks of AI outweigh the benefits. CISOs are scrambling to put defensive measures in place to prepare, with 95% of CISOs having already implemented AI-based defensive measures, including crowdsourcing and pen testing. 

In a sense this part of the debate is academic. The AI train is rolling and like it or not most CISOs are already onboard.  

Nick McKenzie is Chief Information officer and Chief Security Officer at Bugcrowd

Image: Jacob Wackerhausen 

You Might Also Read:

Helping CISOs Embrace Artificial Intelligence


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« UK vs. US: The Artificial Intelligence Landscapes Compared
Chinese Hackers Exploit Cisco Vulnerability To Deliver Malware »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

FoxGuard

FoxGuard

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.