CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero-tolerance-for-failure mindsets, according to analysts from Gartner.
To begin the journey toward “augmented cybersecurity,” Gartner’s label for a cybersecurity function that has elevated response and recovery to equal status with prevention, CISOs should prioritize three areas of activity: building cyber fault tolerance in the business, streamlining to a minimum effective cyber toolset, and building a resilient cyber workforce.
Cyber fault tolerance
The analysts recommend that CISOs work to build cyber fault tolerance into their business by focusing first on two areas of business activity where preventative cybersecurity measures are very visibly underperforming: generative AI (GenAI) and the use of third parties.
For a rapidly evolving technology like genAI, it is impossible to prevent all attacks at all times. The ability to adapt to, respond to, and recover from inevitable issues is critical for organizations to explore GenAI successfully. Therefore, effective CISOs are complementing their prevention-oriented guidance for genAI with effective response and recovery playbooks.
Regarding third-party cybersecurity risk management, no matter the cybersecurity function’s best efforts, organizations will continue to work with risky third parties. Cybersecurity’s real impact lies not in asking more due diligence questions, but in ensuring the business has documented and tested third-party-specific business continuity plans in place.
“CISOs should be guiding the sponsors of third-party partners to create a formal third-party contingency plan, including things like an exit strategy, alternative suppliers list, and incident response playbooks,” said Christopher Mixter, VP Analyst at Gartner. “CISOs tabletop everything else. It’s time to bring tabletop exercises to third-party cyber risk management.”
Minimum effective toolset
One of the places where the zero-tolerance-for-failure mindset is most embedded is cybersecurity’s approach to technology.
“CISOs keep old gear past its sell-by date while also rushing to add new tools without fully understanding the added cost and management complexity they bring,” said Dennis Xu, VP Analyst at Gartner. “CISOs must break the cycle of gear acquisition syndrome that inhibits their ability to thrive by embracing an ethos of adopting the fewest number of tools required to observe, defend and respond to exploitations of the organization’s exposures.”
To achieve this, CISOs should Identify redundancies and gaps by mapping their toolset to their controls framework. They also should build technology PoCs around deployment risks, not just feature functionality. And lastly, they have to pursue GenAI augmentations to existing tools aggressively.
Build a resilient cyber workforce
“CISOs and their teams often have a heroism mindset,” said Mixter. “They feel they must avoid bad outcomes at all costs, even at the expense of their health. They need innovation, experimentation, and engagement from their people more than ever, but the way they ask their people to operate often has the opposite effect.”
To create a resilient cyber workforce, CISOs must treat resilience as a true competency, and build it in their people in the same way they build technical and other competencies. They should make it easy for employees to get the support they need: This includes building self-care into employee workflows, like counseling and decompression exercises during active incidents.
CISOs should also share failure or learning stories, and be the first to share examples of times they fell short of their objectives and what they learned from those experiences.
Lastly, they should reengineer work to reduce burnout and engage employees to understand where they experience friction in their work, reduce bottlenecks, and leverage automation to free people up to focus their energy on activities that truly demand it.
“The industry has made incredible strides on the prevention side of things, but response and recovery remain under-developed muscles, because of the industry’s zero tolerance for failure mindset,” said Mixter. “In an era where successful cyberattacks are increasing in volume and impact despite preventative cyber investments, organizations must augment their approach to elevate response and recovery to equal status with prevention.”