• About
  • Subscribe
  • Contact
Tuesday, February 3, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Gartner reveals five behaviours of effective CISOs

FutureCISO Editors by FutureCISO Editors
August 31, 2023

Photo by Pixabay from Pexels

Share on FacebookShare on Twitter

A Gartner survey of chief information security officers (CISOs) revealed that 69% of top-performing CISOs dedicate recurring time on their calendars for personal and professional development. Only 36% of bottom-performing CISOs do so.

"As the CISO role continues to rapidly evolve, it becomes even more critical for security and risk leaders to protect time for professional development," said Chiara Girardi, senior principal of research at Gartner. "Developing new skills and knowledge as the role changes is essential to effectively serve as a strategic advisor to the business – the new CISO paradigm."

The data was collected from 2020 through 2023 as part of a Gartner benchmarking survey of 227 CISOs. Respondents were measured on key areas of CISO effectiveness, with those scoring in the top one-third ranked as "top performers."

Five key behaviours

The research identified five key behaviours that significantly differentiate top-performing CISOs from bottom-performers. On average, each of these behaviours is at least 1.5 times as prevalent in top performers than in bottom performers (see Figure 1).

Fig. 1: Effective CISOs’ top five game-changing behaviours

Source: Gartner (August 2023)

For example, the survey found that 77% of top-performing CISOs initiate conversations in the enterprise on evolving national and international security norms, such as hacking back and threat attribution. This is compared with just half of the bottom performers who do so.

Girardi concedes that no organisation can be fully protected against every cyber threat.

Chiara Girardi

"The most effective CISOs stay apprised of existing and emerging risks so they can provide leadership with context around the most significant threats facing the business, to influence investments and risk decisions accordingly."

Chiara Girardi

Additionally, 63% of top-performing CISOs proactively engage in securing emerging technologies like artificial intelligence (AI), machine learning (ML) and blockchain, compared with just 38% of bottom-performing CISOs.

Related:  CISO alert: AI code vulnerabilities on the rise

Girardi posits that as AI adoption proliferates, CISOs are already behind the curve in assessing its risk impact. "Threat actors are always one step ahead, so CISOs must be more proactive in understanding the security impact of technologies like generative AI and communicating those risks with senior business leadership," she continued.

Top-performing CISOs proactively engage with senior decision-makers across the business, such as by building relationships outside the context of projects (65%) and by collaborating to define enterprise risk appetite (67%).

Gartner says the most effective CISOs regularly meet with three times as many non-IT stakeholders compared to IT stakeholders, such as heads of sales, heads of marketing and business unit leaders.

Girardi believes that non-IT functions are key partners that can take technology and cybersecurity decisions outside of IT.

"By setting aside dedicated time to build relationships with senior business decision-makers across the enterprise, CISOs can cultivate an environment where decision-makers understand and care about cybersecurity, as well as consider cybersecurity implications in their decision making," she concluded.

Tags: CISOGartnerSecurity and risk management
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Commvault unveils unified data vault for enhanced S3 Data Protection
  • AI activity surges 91%, exposing security gaps"
  • Digital identities at risk with legacy PKI
  • 75% of security incidents now identity-related
  • Visibility confidence plummets as identity-related attacks dominate

Categories

  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl