Changing the CISO’s mindset on automation

Issue 1 2022 Information Security

Accepting automation in cybersecurity is a critical part of an organisation’s defence in today’s threat landscape. By default, most security teams are risk averse, adopting the mentality that things simply can’t be allowed to go wrong.

Yet, too often, this desire for complete control exposes the business to other significant risks, as they neglect new solutions and face overwhelming workloads as a result. In fact, the pace that today’s cyber criminals work at means CISOs need to do away with this old-fashioned approach – it’s time for a complete change of mindset.

The age of cyber automation is here

Despite the increasing number of daily alerts and threats, too many organisations are still relying on manual processes and controls to manage their security measures and are ignoring the fact automation is now a vital part of modern cybersecurity. They’re failing to recognise just how much machine learning and artificial intelligence (AI) can transform threat monitoring through real-time issue detection and intelligently automated responses.

Offloading a degree of responsibility to machines may seem daunting, but it’s no longer something CISOs can ignore. The sheer number of cybercriminals now making the leap to automation means a shift in mindset is essential to keep up and stay protected.

I’ve identified three key reasons why CISOs are reluctant to give up control to automation:

1. They believe existing measures are enough

Far too many organisations assume their existing cybersecurity measures are protecting them effectively from everyday threats. According to our research, 76% of CISOs rate their organisations’ IT strategy as excellent or good at protecting against cybersecurity threats. But 84% also say their organisation has suffered data loss or a security incident in the last two years. Clearly, something’s not adding up between the CISO’s strategy perceptions and the reality of what’s happening.

2. They have difficulties overcoming the trust barrier

Trust is also a key barrier when it comes to automation because, before they can give control over to automated processes, CISOs need to be sure that:

• Machines making decisions and taking control of security measures won’t make mistakes or interfere with operations.

• They can trust a third-party provider to help them adopt AI successfully.

• Other vendors involved are able to understand the intricacies of their organisation and cybersecurity.

3. They see it as an ‘all-in’ decision

Many CISOs get hung up on the idea that, if they’re going to embrace automation, they’re giving total control to AI. But it’s a myth that automation has to be implemented without human intervention. Generally, every organisation has different requirements and faces industry-specific threats, which means that:

• Automation must be adjusted to create an effective partnership between machine-assisted and human-led decision making.

• From there, AI learns over time from the human so it can deliver better and more intelligent decision making.

• Only then, potentially, will it reach a point where humans no longer need to be involved.

AI can be a game changer in cybersecurity

Letting these barriers hold your organisation back is effectively giving cybercriminals an advantage. With so many modern cyber-attacks now heavily automated, enterprises need to adopt more automation to level the playing field. AI-powered automation can help identify relevant intelligence from the sea of incoming data that threatens to overwhelm the security department, as well as taking on more mundane security tasks.

This frees up staff to focus on urgent and high priority threats, something that’s especially important considering the shortage of cyber skills affecting so many organisations. Then, when a new threat is identified, automation can implement updates and patching to protect networks faster than an attack can spread, minimising any potential impact.

AI can go further, too, predicting malicious behaviours so organisations can proactively prepare for new threats. And, despite popular belief, deploying automation doesn’t require a ‘rip-and-replace’ of existing security investments. Instead, automated solutions can be integrated with the technologies already in place, to optimise capabilities and identify gaps in defences.

Introducing automation is a hard undertaking to tackle alone

The sheer scale and pace of today’s cyber threats means security teams are already pushed to their limits. So, it’s critical CISOs recognise that there are new ways to use automation to gain complete control over their organisation’s security and that the risk of falling behind in the struggle against cyberattacks must outweigh any fear of change. It’s a significant challenge though.

Bringing in a like-minded partner to manage your day-to-day security can unlock your CISO’s time and energies to look again at your cybersecurity strategy and to focus on giving your company an edge. Then, as their use of automation increases, organisations won’t have the burden of managing time-consuming, repetitive tasks, so they can take a more proactive stance towards tackling unpredictable threats.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.