Changing the CISO’s mindset on automation

Issue 1 2022 Information Security

Accepting automation in cybersecurity is a critical part of an organisation’s defence in today’s threat landscape. By default, most security teams are risk averse, adopting the mentality that things simply can’t be allowed to go wrong.

Yet, too often, this desire for complete control exposes the business to other significant risks, as they neglect new solutions and face overwhelming workloads as a result. In fact, the pace that today’s cyber criminals work at means CISOs need to do away with this old-fashioned approach – it’s time for a complete change of mindset.

The age of cyber automation is here

Despite the increasing number of daily alerts and threats, too many organisations are still relying on manual processes and controls to manage their security measures and are ignoring the fact automation is now a vital part of modern cybersecurity. They’re failing to recognise just how much machine learning and artificial intelligence (AI) can transform threat monitoring through real-time issue detection and intelligently automated responses.

Offloading a degree of responsibility to machines may seem daunting, but it’s no longer something CISOs can ignore. The sheer number of cybercriminals now making the leap to automation means a shift in mindset is essential to keep up and stay protected.

I’ve identified three key reasons why CISOs are reluctant to give up control to automation:

1. They believe existing measures are enough

Far too many organisations assume their existing cybersecurity measures are protecting them effectively from everyday threats. According to our research, 76% of CISOs rate their organisations’ IT strategy as excellent or good at protecting against cybersecurity threats. But 84% also say their organisation has suffered data loss or a security incident in the last two years. Clearly, something’s not adding up between the CISO’s strategy perceptions and the reality of what’s happening.

2. They have difficulties overcoming the trust barrier

Trust is also a key barrier when it comes to automation because, before they can give control over to automated processes, CISOs need to be sure that:

• Machines making decisions and taking control of security measures won’t make mistakes or interfere with operations.

• They can trust a third-party provider to help them adopt AI successfully.

• Other vendors involved are able to understand the intricacies of their organisation and cybersecurity.

3. They see it as an ‘all-in’ decision

Many CISOs get hung up on the idea that, if they’re going to embrace automation, they’re giving total control to AI. But it’s a myth that automation has to be implemented without human intervention. Generally, every organisation has different requirements and faces industry-specific threats, which means that:

• Automation must be adjusted to create an effective partnership between machine-assisted and human-led decision making.

• From there, AI learns over time from the human so it can deliver better and more intelligent decision making.

• Only then, potentially, will it reach a point where humans no longer need to be involved.

AI can be a game changer in cybersecurity

Letting these barriers hold your organisation back is effectively giving cybercriminals an advantage. With so many modern cyber-attacks now heavily automated, enterprises need to adopt more automation to level the playing field. AI-powered automation can help identify relevant intelligence from the sea of incoming data that threatens to overwhelm the security department, as well as taking on more mundane security tasks.

This frees up staff to focus on urgent and high priority threats, something that’s especially important considering the shortage of cyber skills affecting so many organisations. Then, when a new threat is identified, automation can implement updates and patching to protect networks faster than an attack can spread, minimising any potential impact.

AI can go further, too, predicting malicious behaviours so organisations can proactively prepare for new threats. And, despite popular belief, deploying automation doesn’t require a ‘rip-and-replace’ of existing security investments. Instead, automated solutions can be integrated with the technologies already in place, to optimise capabilities and identify gaps in defences.

Introducing automation is a hard undertaking to tackle alone

The sheer scale and pace of today’s cyber threats means security teams are already pushed to their limits. So, it’s critical CISOs recognise that there are new ways to use automation to gain complete control over their organisation’s security and that the risk of falling behind in the struggle against cyberattacks must outweigh any fear of change. It’s a significant challenge though.

Bringing in a like-minded partner to manage your day-to-day security can unlock your CISO’s time and energies to look again at your cybersecurity strategy and to focus on giving your company an edge. Then, as their use of automation increases, organisations won’t have the burden of managing time-consuming, repetitive tasks, so they can take a more proactive stance towards tackling unpredictable threats.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.