How is the surge of GenAI adoption (either by the business or individual employees) impacting CISO burnout risk?

119 views3 Comments
Sort By:
Oldest
Board Member, Advisor, Executive Coach in Software4 months ago
If shadow IT is happening because of new GenAI tools, it's because you're not innovating fast enough. You need to run towards the riskiest things to shape the path of risk. If you're the first mover on the newest things, you can chart the path and shape where the users go. Partner with those who are experimenting and use them as your canaries in the coal mine. If you don't innovate, you risk falling behind and generating more business risk.

1
CISO/CPO & Adjunct Law Professor in Finance (non-banking)4 months ago
As a privacy officer, I have to figure out what kind of liability we may be exposed to based on these new tools. It's crucial to have proper policies and procedures in place and to educate employees about what they should and shouldn't do with GenAI.

1
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Global Chief Cybersecurity Strategist & CISO in Healthcare and Biotech4 months ago
The surge of GenAI adoption can be quite overwhelming for CISOs. The amount of work it can do and the data it can handle is vast. However, it's important to remember that we've been using a variation of GenAI for a long time, in firewall analysis and SIM products, for instance. The new version is just a little faster and handles more data.

The key concern is that GenAI is taking over more of the basic analyst work and some of the basic writing and reporting. It's pushing us towards critical thinking and away from day-to-day tasks. This shift can be beneficial, but it's also important to remember that GenAI should be used to create a template, not to replace human thought and analysis.

We're also seeing a shift in the field towards hiring people who can think outside the box and use these databases creatively. This means that traditional qualifications like a four-year degree or a CISM may not be as important as they once were.

1

Content you might like

Yes, and it is always followed22%

Yes, but it is rarely followed54%

Some departments do, but not across the business14%

No9%

View Results
1.8k views2 Upvotes
VP of Global IT and Cybersecurity in Manufacturing6 years ago
Have clear business requirements up front, make sure the proposal includes items such as scope, timeline, cost, resources.
Read More Comments
22.1k views3 Upvotes28 Comments
1 view

Yes, visibility for protecting key employees and executives on social media is part of our cybersecurity budget.56%

No, we do not have a solution or visibility to protect key employees on social media.38%

No, but we plan to budget for key employee and executive protection in the future.5%

View Results
1.5k views2 Upvotes
Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment