Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why CISOs Should Focus on Data, Supply Chain Risk, and Team Culture
Cybersecurity

Why CISOs Should Focus on Data, Supply Chain Risk, and Team Culture

Robert WoodBy Robert WoodDecember 31, 2022Updated:March 20, 20234 Mins Read
Facebook Twitter LinkedIn Email
Why CISOs Should Focus on Data, Supply Chain Risk, and Team Culture
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

It’s staggering the number of things happening in cybersecurity right now: From new regulatory requirements, to supply chain attacks to vendor segments – all continuously evolving as new things emerge.

As a security leader, you know you can’t do everything. Even if you had more budget than you wanted, there’s still a matter of people being able to do the work. Focus, therefore, is critical. This article will explore three key areas CISOs should focus on today.

Data

Security teams are increasingly generating and consuming more and more data. The traditional SIEM (security information and event management) model is workable for logs, but what about everything else?

As security teams, we need to be thinking about our data like other business functions do. As part of that process, we need to be bringing data platforms, engineering rigor, and analysis techniques that mimic the way a modern fintech or marketing team might operate.

Yes, cybersecurity is an incredibly technical field, but in many ways, it hasn’t yet made the shift to approach its problems from a data and engineering mindset. Data needs to be a first-class citizen for security teams in the future.

Supply Chain Risk

Attacks in supply chains have been on the rise over the past few years. Looking back to the Solar Winds breach and the infamous log4shell exploit, we see two devastating and wide-reaching issues that affected two very different parts of our supply chain: a product and an open-source library. This is quite different from the kind of supply chain risk that many third-party risk management (TPRM) programs seek to manage. Those programs try to account for third-party organizations’ breach potential themselves, such as the recent Uber and Gemini breaches, which were directly related to the companies’ third-party partners.

This means security teams need to expand the way they think about supply chain risk. There is so much happening in this space that a single approach won’t work for all organizations. Security leaders need to find a scope that works for their team. Consider the following dimensions in this process:

  • Open-source libraries and where/how they’re being used; this may incorporate some kind of workaround software bills of materials (SBOMs)
  • Containers: where they come from, are they trusted, and are they secure
  • Third-party organizations and potentially their own respective supply chains
  • COTS (commercial-off-the-shelf) products or cloud services used throughout an organization and where they came from
  • Data centers or infrastructure-as-a-service providers and what is running in these environments

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Team Culture

The continued emphasis on security teams positioning themselves as a business enabler is important to success. This isn’t just the job of one person or a small group in a security team. It requires a more wholesale shift in team culture which is driven by values and soft skills.

The individuals that make up your team need to continue to invest in skills like communication, negotiation, empathizing, and critical thinking. This, coupled with strong values driving the culture, will make a significant impact on the way the team works. When a team is more effective the technical impacts of their work will likely have a positive correlation.

This change and the tone start from the top. It is set and led by example from security leaders.

Concluding Thoughts

There is so much for security leaders to be thinking about and there are always new tools and new things that can cause unwanted distractions. However, I’m advocating for some foundational thinking and work for security teams. This will set your organization up for a stronger future.

By focusing on how you’re using data, what your supply chains look like, and improving the team culture that ultimately drives all of your work, you can have lasting impacts.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

CISO Cloud Cybersecurity data featured risk supply chain
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More

June 25, 2025

Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale

June 25, 2025

Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance

June 24, 2025

AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country

June 24, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More
  • Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale
  • Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance
  • AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country
  • Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.