Changing the CISO’s mindset on automation

Issue 1 2022 Information Security

Accepting automation in cybersecurity is a critical part of an organisation’s defence in today’s threat landscape. By default, most security teams are risk averse, adopting the mentality that things simply can’t be allowed to go wrong.

Yet, too often, this desire for complete control exposes the business to other significant risks, as they neglect new solutions and face overwhelming workloads as a result. In fact, the pace that today’s cyber criminals work at means CISOs need to do away with this old-fashioned approach – it’s time for a complete change of mindset.

The age of cyber automation is here

Despite the increasing number of daily alerts and threats, too many organisations are still relying on manual processes and controls to manage their security measures and are ignoring the fact automation is now a vital part of modern cybersecurity. They’re failing to recognise just how much machine learning and artificial intelligence (AI) can transform threat monitoring through real-time issue detection and intelligently automated responses.

Offloading a degree of responsibility to machines may seem daunting, but it’s no longer something CISOs can ignore. The sheer number of cybercriminals now making the leap to automation means a shift in mindset is essential to keep up and stay protected.

I’ve identified three key reasons why CISOs are reluctant to give up control to automation:

1. They believe existing measures are enough

Far too many organisations assume their existing cybersecurity measures are protecting them effectively from everyday threats. According to our research, 76% of CISOs rate their organisations’ IT strategy as excellent or good at protecting against cybersecurity threats. But 84% also say their organisation has suffered data loss or a security incident in the last two years. Clearly, something’s not adding up between the CISO’s strategy perceptions and the reality of what’s happening.

2. They have difficulties overcoming the trust barrier

Trust is also a key barrier when it comes to automation because, before they can give control over to automated processes, CISOs need to be sure that:

• Machines making decisions and taking control of security measures won’t make mistakes or interfere with operations.

• They can trust a third-party provider to help them adopt AI successfully.

• Other vendors involved are able to understand the intricacies of their organisation and cybersecurity.

3. They see it as an ‘all-in’ decision

Many CISOs get hung up on the idea that, if they’re going to embrace automation, they’re giving total control to AI. But it’s a myth that automation has to be implemented without human intervention. Generally, every organisation has different requirements and faces industry-specific threats, which means that:

• Automation must be adjusted to create an effective partnership between machine-assisted and human-led decision making.

• From there, AI learns over time from the human so it can deliver better and more intelligent decision making.

• Only then, potentially, will it reach a point where humans no longer need to be involved.

AI can be a game changer in cybersecurity

Letting these barriers hold your organisation back is effectively giving cybercriminals an advantage. With so many modern cyber-attacks now heavily automated, enterprises need to adopt more automation to level the playing field. AI-powered automation can help identify relevant intelligence from the sea of incoming data that threatens to overwhelm the security department, as well as taking on more mundane security tasks.

This frees up staff to focus on urgent and high priority threats, something that’s especially important considering the shortage of cyber skills affecting so many organisations. Then, when a new threat is identified, automation can implement updates and patching to protect networks faster than an attack can spread, minimising any potential impact.

AI can go further, too, predicting malicious behaviours so organisations can proactively prepare for new threats. And, despite popular belief, deploying automation doesn’t require a ‘rip-and-replace’ of existing security investments. Instead, automated solutions can be integrated with the technologies already in place, to optimise capabilities and identify gaps in defences.

Introducing automation is a hard undertaking to tackle alone

The sheer scale and pace of today’s cyber threats means security teams are already pushed to their limits. So, it’s critical CISOs recognise that there are new ways to use automation to gain complete control over their organisation’s security and that the risk of falling behind in the struggle against cyberattacks must outweigh any fear of change. It’s a significant challenge though.

Bringing in a like-minded partner to manage your day-to-day security can unlock your CISO’s time and energies to look again at your cybersecurity strategy and to focus on giving your company an edge. Then, as their use of automation increases, organisations won’t have the burden of managing time-consuming, repetitive tasks, so they can take a more proactive stance towards tackling unpredictable threats.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
NEC XON disrupts sophisticated cyberattack
Information Security
NEC XON recently showcased its advanced cyberthreat detection and response capabilities by successfully thwarting a human-operated ransomware attack targeting a major service provider.

Read more...
What’s your cyber game plan?
Information Security
“Medium-sized businesses are often the easiest target for cyber criminals, because they are just digital enough to be vulnerable, but not mature enough to be fully protected," says Warren Bonheim, MD of Zinia.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.