top of page
eileen260

Top 3 Traits for CISOs in the New Era of Cybersecurity


The cybersecurity landscape has transformed over the past decade. Today’s Chief Information Security Officer (CISO) must be more adaptable and skilled than ever, balancing technological acumen, cost-conscious decision-making, and, perhaps most importantly, trust-building across the organization.


Reflecting on my own experiences — from navigating the fallout of a nation-state cyberattack at Sony Pictures Entertainment to guiding new technology leaders — I can say that the modern CISO role is more dynamic and challenging than ever before.


In this era, three traits have become indispensable: resilience under pressure, the ability to communicate and foster trust, and a forward-looking approach to technology adoption.

1. Resilience Under Pressure

It’s no secret that the cybersecurity field is high stakes. A CISO is often the last line of defense against threats that, if successful, cripples an organization’s operations.

In the case of Sony Pictures Entertainment, where I led the recovery of IT operations after a nation-state attack, resilience was not only beneficial — it was essential. Every day brought unique, urgent challenges that needed to be solved quickly and decisively.


The ability to stay calm and resourceful in high-stakes situations defines resilience. During a cyber crisis, CISOs must maintain a clear mind to assess the situation accurately, decide on priorities, and communicate objectives effectively. The challenge is managing stress while leading a team, ensuring that the collective response is cohesive and efficient.

Building a resilient mindset often involves practicing stress-management techniques, whether through mentorship, training, or personal habits. For a CISO, these strategies make or break the intended outcome, figuratively and literally. Moreover, resilience extends beyond crisis situations; it also involves learning from each incident and adapting. Each breach or attempted attack provides data, offering insights into vulnerabilities and response efficiency. A CISO with true resilience doesn’t just recover from attacks — they learn, refine, and fortify defenses for the future.

2. Building Trust Through Communication and Collaboration

CISOs once operated behind the scenes, interacting primarily with IT teams. Today, however, they must be as much diplomat as defender, bridging gaps across departments and communicating risks, strategies, and outcomes in ways that resonate with everyone from technical staff to board members.

A successful cybersecurity strategy requires collaboration across the enterprise. This includes IT, HR, legal, and even marketing — virtually every department has a stake in data security and resilience. However, building these bridges requires a CISO who can communicate complex security concepts in business language and can relate to the concerns of each team. Through multiple global enterprises, I’ve experienced how critical cross-functional trust is during crises. After a cyber incident, we needed every department to participate actively in our investigation and recovery.


This collaboration was possible only because we had already established open lines of communication and trust. By addressing concerns transparently and explaining security requirements in ways that made sense for each team.


Having a culture where cybersecurity wasn’t an afterthought but an integral part of our collective mission requires time and a strategic approach that will differ between companies.


Furthermore, effective communication is essential not only during crisis situations but also in daily operations.


Educating and engaging with non-technical stakeholders — board members, C-suite executives, and frontline employees alike — about their role in cybersecurity can reduce risks and build a sense of shared responsibility. In my experience, relating security as safeguards including personal security builds interest and goodwill.


People are more likely to embrace cybersecurity practices if they see how these practices protect them, their family, and the organization, rather than perceiving them as organization policy or operational hurdles.


3. A Forward-Looking Approach to Technology and Threat Landscape

Cybersecurity is a constantly evolving field. New threats emerge daily, and new technologies must be considered and vetted carefully.


Today’s CISO needs a forward-looking approach — one that balances agility with caution. In my years of overseeing security programs, I’ve seen the rapid adoption of cloud, IoT, and AI technologies. While these innovations offer immense benefits, they also bring new vulnerabilities and risks.


A CISO in the new era cannot just react to these developments; they anticipate them, staying informed and proactive in threat detection and prevention.


A forward-looking CISO stays updated on the latest security trends and technologies but also maintains a clear view of the organization’s long-term strategy.


This means considering scalability, cost-effectiveness, and compatibility with existing systems when assessing new technologies. Part of this role is knowing when and how to integrate new solutions, ensuring they enhance rather than complicate business and technology operations.


Additionally, CISOs today must be risk-oriented rather than fear-driven. For instance, instead of dismissing new technologies because they pose additional risks, the forward-looking CISO takes a balanced approach. They assess these risks in the context of the organization’s goals and find ways to manage and mitigate them effectively.


In this role, it's important to remember that security technology is only effective when it’s understood, accepted, and maintained by the broader organization.


To this end, fostering innovation within cybersecurity teams is critical. A CISO needs to encourage team members to explore new tools, frameworks, and methodologies while ensuring that these innovations align with organizational objectives.


A forward-looking approach requires not just a technical understanding but strategic foresight — an ability to envision how today’s decisions will impact the company’s security posture in the future.


Nurturing the Next Generation of Cybersecurity Leaders

While resilience, communication, and forward-thinking define a strong CISO, the greatest value any CISO can leave is a robust team.


The next generation of cybersecurity professionals will be dealing with an increasingly sophisticated threat landscape, and it’s the responsibility of today’s CISOs to mentor and develop these future leaders.


Building a culture of mentorship involves identifying and nurturing talent, providing opportunities for growth, and encouraging and empowering autonomy.


I’ve been fortunate to see mentees grow into formidable leaders. Developing leadership qualities in others not only strengthens the immediate team but also prepares the organization for the future.


As cybersecurity threats continue to escalate, the role of the CISO is bound to evolve further. By fostering resilience, building trust, and maintaining a forward-looking approach, we can build a security strategy that not only protects the organization and positions it for growth.


Empowering and mentoring the next generation is the ultimate measure of success — ensuring that our defenses are strong today and sustainable for tomorrow.


This, I believe, is the true mark of a CISO who understands the demands of the modern cybersecurity landscape.


Contributed by David Lin

CISO | GIA (Gemological Institute of America)











David is a seasoned technology and information security leader with 30 years of experience building global infosec programs that emphasize governance, security culture, and team excellence. As a board member of the National Technology Security Coalition, he fosters collaboration between the U.S. government and the cybersecurity industry. Passionate about community service, David volunteers with ISSA Los Angeles, ISC2 Los Angeles, and local organizations supporting animals and those in need.


*If you'd like to learn more, please email technologyadvisors@MR2Solutions.com

41 views0 comments

Recent Posts

See All

Kommentare


bottom of page