Changing the CISO’s mindset on automation

Issue 1 2022 Information Security

Accepting automation in cybersecurity is a critical part of an organisation’s defence in today’s threat landscape. By default, most security teams are risk averse, adopting the mentality that things simply can’t be allowed to go wrong.

Yet, too often, this desire for complete control exposes the business to other significant risks, as they neglect new solutions and face overwhelming workloads as a result. In fact, the pace that today’s cyber criminals work at means CISOs need to do away with this old-fashioned approach – it’s time for a complete change of mindset.

The age of cyber automation is here

Despite the increasing number of daily alerts and threats, too many organisations are still relying on manual processes and controls to manage their security measures and are ignoring the fact automation is now a vital part of modern cybersecurity. They’re failing to recognise just how much machine learning and artificial intelligence (AI) can transform threat monitoring through real-time issue detection and intelligently automated responses.

Offloading a degree of responsibility to machines may seem daunting, but it’s no longer something CISOs can ignore. The sheer number of cybercriminals now making the leap to automation means a shift in mindset is essential to keep up and stay protected.

I’ve identified three key reasons why CISOs are reluctant to give up control to automation:

1. They believe existing measures are enough

Far too many organisations assume their existing cybersecurity measures are protecting them effectively from everyday threats. According to our research, 76% of CISOs rate their organisations’ IT strategy as excellent or good at protecting against cybersecurity threats. But 84% also say their organisation has suffered data loss or a security incident in the last two years. Clearly, something’s not adding up between the CISO’s strategy perceptions and the reality of what’s happening.

2. They have difficulties overcoming the trust barrier

Trust is also a key barrier when it comes to automation because, before they can give control over to automated processes, CISOs need to be sure that:

• Machines making decisions and taking control of security measures won’t make mistakes or interfere with operations.

• They can trust a third-party provider to help them adopt AI successfully.

• Other vendors involved are able to understand the intricacies of their organisation and cybersecurity.

3. They see it as an ‘all-in’ decision

Many CISOs get hung up on the idea that, if they’re going to embrace automation, they’re giving total control to AI. But it’s a myth that automation has to be implemented without human intervention. Generally, every organisation has different requirements and faces industry-specific threats, which means that:

• Automation must be adjusted to create an effective partnership between machine-assisted and human-led decision making.

• From there, AI learns over time from the human so it can deliver better and more intelligent decision making.

• Only then, potentially, will it reach a point where humans no longer need to be involved.

AI can be a game changer in cybersecurity

Letting these barriers hold your organisation back is effectively giving cybercriminals an advantage. With so many modern cyber-attacks now heavily automated, enterprises need to adopt more automation to level the playing field. AI-powered automation can help identify relevant intelligence from the sea of incoming data that threatens to overwhelm the security department, as well as taking on more mundane security tasks.

This frees up staff to focus on urgent and high priority threats, something that’s especially important considering the shortage of cyber skills affecting so many organisations. Then, when a new threat is identified, automation can implement updates and patching to protect networks faster than an attack can spread, minimising any potential impact.

AI can go further, too, predicting malicious behaviours so organisations can proactively prepare for new threats. And, despite popular belief, deploying automation doesn’t require a ‘rip-and-replace’ of existing security investments. Instead, automated solutions can be integrated with the technologies already in place, to optimise capabilities and identify gaps in defences.

Introducing automation is a hard undertaking to tackle alone

The sheer scale and pace of today’s cyber threats means security teams are already pushed to their limits. So, it’s critical CISOs recognise that there are new ways to use automation to gain complete control over their organisation’s security and that the risk of falling behind in the struggle against cyberattacks must outweigh any fear of change. It’s a significant challenge though.

Bringing in a like-minded partner to manage your day-to-day security can unlock your CISO’s time and energies to look again at your cybersecurity strategy and to focus on giving your company an edge. Then, as their use of automation increases, organisations won’t have the burden of managing time-consuming, repetitive tasks, so they can take a more proactive stance towards tackling unpredictable threats.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.