Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025

WestJet Faces Cyberattack Disrupting Operations

June 14, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » How Security Teams Can Turn Hype Into Opportunity
Cyber Risk

How Security Teams Can Turn Hype Into Opportunity

Staff WriterBy Staff WriterJune 9, 2025No Comments6 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


GARTNER SECURITY & RISK MANAGEMENT SUMMIT — Washington, DC — Hype can be a detriment or an opportunity to improve one’s security posture, according to the opening keynote at Gartner’s Security & Risk Management Summit today.

The keynote, entitled “Harness the Hype: Turning Disruption Into Cybersecurity Opportunity,” was hosted by Gartner distinguished vice president analysts Leigh McMullen and Katell Thielemann. The talk concerned the waves of hype that can take over the cyber industry, either through optimism for emerging technologies like AI or preoccupation with certain threats and risks.

McMullen referenced major changes to the public sector in the past six months, involving executive orders, budget cuts, major shifts in policy, tariffs, and more. As he said, “Even if you’re not in public service, then the government is still probably one of your biggest customers.” Sea change and uncertainty can lead organizations to look for new solutions, where hype also plays a role.

And hype is, without a doubt, on display at Gartner’s Security & Risk Management Summit this week. For example, AI continues to be a major focus on the conference circuit; agentic AI is the focus of many sessions at the show — some of which run concurrently with each other.

Related:Next-Gen Developers Are a Cybersecurity Powder Keg

McMullen and Thielemann, through the keynote, aimed to explain how organizations can utilize hype to bolster their security programs while preventing it from derailing objectives.

Utilizing Hype for Cybersecurity Good

The presenters offered a number of stats to elaborate on how hype plays into the security ecosystem today.

Thielemann pointed out how 74% of CEOs believe generative AI (GenAI) is the technology that will most significantly impact their industries over the next three years, while 84% plan to increase their AI investments this year. Meanwhile, 85% of CEOs think cybersecurity is critical to growth, and 87% of tech leaders are increasing their cybersecurity funding.

“Across the C-suite and the board, I think our surveys are all pointing in the same direction: cyber incidents are now hitting the bottom line,” McMullen said.

He added that, while executives are paying more attention to cybersecurity, hype can also lead to hasty decisions where folks are investing too much, too fast on unproven technology. “New tech is coming, whether we’re ready for it or not,” he said.

Thielemann described a situation where a CEO calls the security team in because a competitor got hit by ransomware and is still disrupted weeks later. The CEO wants to know if something like that can happen at her company.

Related:F5 Acquires Agentic AI Security Startup Fletch

“You have her undivided attention, but you also have a couple of choices. You could go in a direction of fear, uncertainty, and doubt. Start slipping her brochures on new ransomware protection tools hoping to get more budget, but ultimately that destroys your credibility as a trusted adviser [if the tools fail],” Thielemann said. “Or, you could show [the CEO] how your cybersecurity team has already made targeted investments that not only support the enterprise today but also future-proof for new product lines and automation.”

Getting Ahead of the Hype Cycle

To avoid hype pitfalls, such as those that might be created following a competitor’s ransomware attack, McMullen and Thielemann advocated for “mission-aligned transparency” using protection level agreements (PLAs), which are formal commitments between security teams and executives defining the amount of money an enterprise is willing to spend to achieve a desired level of cybersecurity protection.

The presenters also recommended using what they dubbed “outcome-driven metrics” (ODMs), which define the organization’s current level of security protection or exposure, as part of this process. ODMs are used to express your current protection level and start a conversation regarding whether to invest more in a specific kind of protection or accept more risk to save money.

Related:Vishing Crew Targets Salesforce Data

For instance, ODFs could be used to express that, say, only 20% of critical physical systems that impact production have effective procedures to remain operational in case of a ransomware attack, and less than half had gone through a ransomware simulation. That would start a conversation about the level of exposure organizational leadership is comfortable with, and what level of protection they would be willing to fund.

“You can walk through the options and say, if you want to increase the 20% of critical systems with ransomware recovery procedures to 70%, that will cost $1 million. If you want to increase to 80%, that will cost $1.5 million,” Thielemann said. “This has just become a fact-based conversation rather than a fear-fueled debate.”

The AI Security Hype Machine

The keynote focused substantially on fervor surrounding generative and agentic AI, pointing out that security teams can’t ignore AI even if they’re tired and jaded by it, as every industry and sector is racing toward using it. Organizations are using LLM-powered AI for everything from bank detection fraud and medical imaging analysis to customer service automation and product development and beyond.

In order to, as McMullen put it, “enable these ambitions safely and securely,” security teams must cultivate AI literacy for themselves and their teams, experiment with AI in cybersecurity, and protect ongoing applications of the technology at the organization.

“We must play with AI ourselves to become AI literate so that we can understand exactly how LLMs work and what happens when a user asks a question and discover the many ways and places that the prompt or answer can be tampered with to better understand how to protect our organizations’ AI investments,” McMullen said. “We can also learn when to use which AI techniques and when to not be using AI at all.”

Security vendors currently use LLMs in a number of ways, such as for automated threat hunting and vulnerability remediation.

On the security and compliance side, McMullen and Thielemann expressed that because many employees likely have the technology embedded in their work already, it’s important to take this opportunity to track what each tool is being used for, whether the tool is critical and irreplaceable, the number of users, and the data risks. Rather than stamping out all tools that utilize the technology, teams can offer policy flexibility to allow the organization to take “intelligent risks” while working to ensure the proper channels are followed in the future.

In cases where the organization is developing new AI tools themselves, security teams will need to adapt their incident response procedures for new types of alerts involving content inaccuracies and intellectual property risks.

McMullen also spoke to chief information security officers (CISOs) directly, saying, “Unlike any other role, you have to protect the enterprise’s investment in AI while protecting the organization from AI, which you are not going to be able to do without AI.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCyberattack Strikes Main Distributor for Whole Foods
Next Article Stolen Ticketmaster Data from Snowflake Attacks Back on Sale!
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Why CISOs Must Align Business Objectives & Cybersecurity

June 13, 2025

When Bad Guys Let Their Guard Down

June 12, 2025

Agentic AI Takes Over Gartner’s SRM Summit

June 11, 2025
Leave A Reply Cancel Reply

Latest Posts

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 20250 Views

WestJet Faces Cyberattack Disrupting Operations

June 14, 20250 Views

Outage Unrelated to Security: Your Data Remains Safe!

June 13, 20250 Views

Google Links Major Cloud Outage to API Management Glitch

June 13, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025

WestJet Faces Cyberattack Disrupting Operations

June 14, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.