Live Webinar | 26 June 2025 9AM PT
From Black Box to Boardroom: Operationalizing Trust in AI Governance
February 17, 2023

CISOs share top security predictions for 2023

Security, especially in the current digital environment, is ever-changing - primarily because of the rising threats and attacks taking place across the world. According to Flashpoint, there were 4146 reported data breaches globally in 2022. The United States was the most targeted country for data breaches. There was a significant increase in hacktivism resulting from the Russia-Ukraine war.

So, the question that arises is, will 2023 be any different?' Cybersecurity leaders and Chief Information Security Officers (CISOs) are arguably the most knowledgeable people to comment on the changing security landscape. So we thought, what better way to predict what to expect in the field of cyber threats and security risk management in 2023 than to ask some experts and CISOs?

Let's take a look at the cybersecurity predictions for 2023, according to CISOs.

What are the security predictions for 2023?

Every year, certain cybersecurity trends largely influence the cybersecurity plan an organization tends to take. These can range from technological to people-centric, depending on the overall security landscape. However, it is the responsibility of a CISO to maintain and update the security landscape of the organization - according to these trends.

Andrew Obadiaru, Cobalt

We were able to pinpoint several areas where CISOs believe enterprises' main priorities will lie in 2023. The list of security predictions is as follows:

Security prediction no. 1: Greater focus on the basics of cybersecurity

Kevin Cross, Dell Technologies

While discussing the security predictions for 2023, Kevin Cross from Dell Technologies emphasized on the fundamentals of cybersecurity. It is commonly known that threat actors use basic vulnerabilities, including weak passwords, using open networks, or sharing unnecessary information, to breach the organization's networks. Hence, cybersecurity hygiene is critical to the cybersecurity and information security of an organization.

The shortage of cybersecurity professionals in the industry accentuates the lack of cybersecurity hygiene. Organizations simply do not have enough people to overlook their security systems, resulting in an overall gap in the cybersecurity of the organization.

Brian Spanswick, Cohesity

One way to reduce the threats is to strengthen your basic yet fundamental defenses and train your employees to protect the system against social engineering attacks. Creating a balance between basic learning and technical implementation is integral in 2023, according to CISOs.

Security prediction no. 2: Integrating technological and human aspects in cybersecurity

According to Verizon, 82% of the organizations that reported a security breach in 2022 insinuated that it was caused due to a human element. Considering these statistics, it can be concluded that the people aspect of cybersecurity is considerably overlooked.

Yogesh Badwe, Druva

But how? Let's take the example of a phishing email. As reported by Verizon, 2.9% of the employees still fall for phishing emails, thereby compromising the data of millions of users. This enables cybercriminals to use the lack of employee training as a method to gain entry into the organization's database. Cyberattacks on Okta, SolarWinds, and Mariott are some examples of using phishing emails as initial vectors.

The human aspect of cybersecurity is a little complicated as it is unpredictable. As the work landscape keeps changing from office to remote and hybrid, the security consciousness of the employee must change too.

Bec McKeown, Director of Human Science

Security prediction no. 3: Taking a risk-first approach to security

According to CISOs worldwide, one of the latest security trends organizations need to adopt is taking a proactive approach towards cybersecurity.

Bret Arsenault

The goal of CISOs will be to give the board as well as all business units visibility into their assets that contribute to their attack surface and corresponding threats and vulnerabilities. CISOs will leverage these insights to understand their risk posture better, continuously rank threat likelihood and business effect to decide where to concentrate resources and build and manage controls that are pertinent to their organization.

Building an incident response plan to tackle the consequences of a data breach is integral but not necessarily the need of the hour. Organizations need to build their product and software with the assumption that, sooner or later, they are going to be breached. This not only instills advanced organizational security understanding but keeps organizations up-to-date on their security posture.

What are the best practices for security risk management for CISOs in 2023?

Now that we have discussed the key security predictions for 2023, let's uncover the best ways to prepare for security risk management in 2023.

The following are some of the steps that security professionals have revealed they are taking to prepare their systems to protect against threats and limit damage in the event of a data breach.

1. Increasing investment in cybersecurity

Mike Beck, Darktrace

The Deloitte survey found that 54% of organizations with US$5 billion or more in revenue are spending more than US$250 million annually on cybersecurity while 71% of the organizations with US$500 million to US$5 billion in revenue are spending less than US$250 million annually on security risk management.

Prices of most goods and services are rising, and so is the cost of cybersecurity. CISO and the board of directors are finally considering cybersecurity as an investment rather than as an expense.

Ryan Davis, NS1

It is important to remember that an organization's security is hacked, it loses money not only on dealing with the attack but also on lost business. The CISO must ensure that the business is up and functioning in the least possible time after a cyberattack. A cybersecurity incident should not stop the organization's development plans.

That said, are CISOs only thinking of increasing investment in cybersecurity as a by-product of ensuring compliance with frameworks? No, another trigger for increased investment is to create an advanced technological infrastructure to build secure products upfront.

Anne Marie Zettlemoyer, CyCognito

Cyber organizations are focusing on developing products that are more in line with the higher security standards as it doesn't look like the threat actors are going to slow down in 2023. As per Rick Holland, CISO at Digital Shadows, it is the duty of the CISOs to understand the company's strategic objectives for next year and look for ways to minimize risk and enable business initiatives.

2. Creating a culture of security

Robb Reck, Red Canary

It is no longer an option but a necessity for every organization to develop cybersecurity awareness among its employees to reduce vulnerabilities. By providing security training and conducting phishing tests, the organization can ensure that the employees are aware of the threats lurking on the internet and are well prepared to fight against them. They should be informed about the latest security threats in the industry to know the pitfalls if they come across one.

Bernard Brantley, Corelight

A security-first work culture ensures that every employee focuses on the security risk management aspect before taking any action. Even while using the company laptop or mobile phone for personal use, the employees should keep in mind the security protocols. Josh Yavor, Tessian rightly said, Attackers don't respect work-life boundaries.

One of the most accepted practices these days for cybersecurity is implementing the zero-trust architecture. A zero-trust architecture takes the principle of least privilege to the next level, allowing granting access to data, networks, applications, and services only to authenticated users. If employees don't need access to certain information to fulfill their responsibilities, they are denied access - which goes a long way in ensuring no one has unauthorized access to information.

Christopher Prewitt, CTO

3. Managing third-party risks

When multiple organizations share data, the risk inherited is also being shared. There should be a barrier between the two organizations to filter out any suspicious data/code. It is not always possible to monitor third-party risks at a micro level, but you should consider the threat exposure management before sharing your data/network with third parties.

Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains, a three-fold increase from 2021.

The security of these external networks is directly proportional to the security of your organization, meaning that a breach in any of the partners can lead to a breach in your firm.

Organizations can have minimum requirements before they share digital data with other organizations. For example, if the partner organization's software is not updated, the sharing should be flagged/prohibited.

Koos Lodewijkx, IBM

Conclusion

CISOs are best placed to understand the state of the markets now and in the future. Therefore, we combined some of the best practices that an organization should follow with the security predictions to stay protected. CISOs analyze the threats and prepare the systems for the upcoming year. A CISO cannot afford to lose the visibility of the organization's digital systems.
If you want to know more about cyber compliance for your organization, reach out to us here.

The source for this article is VentureBeat.

Liked the post? Share on:
Table of contents
Join our community
Join our community and be the first to know about updates!
Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Join our community and be the first to know about updates!

Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

HIPAA
Compliance Essentials
Understanding HIPAA violations: Types, prevention, and best practices
HIPAA
PHI vs PII: Essential comparisons, compliance differences, and a focused checklist
GDPR
Risk Management
Best GDPR Compliance Automation Software in 2025: Features, Pricing, Pros & Cons

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

See what a real security- first GRC platform looks like

Ready to see what security-first GRC really looks like?

Focus on the traveler experience. We’ll handle the regulations.

Get Scrut. Achieve and maintain compliance without the busywork.

Choose risk-first compliance that’s always on, built for you, and never in your way.

Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?

Join the thousands of companies automating their compliance with Scrut.

The right partner makes all the difference. Let’s grow together.

Make your business easy to trust, put security transparency front and center.

Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.

Your GRC team, multiplied and AI-backed.

Modern compliance for the evolving education landscape.

Ready to simplify healthcare compliance?

Don’t let compliance turn into a bottleneck in your SaaS growth.

Find the right compliance frameworks for your business in minutes

Ready to see what security-first GRC really looks like?

Real-time visibility into every asset

Ready to simplify fintech compliance?

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Tag, classify, and monitor assets in real time—without the manual overhead.

Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.

Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.

Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.

Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.

Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.

Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.

Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.

Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.

Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.

Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.

Scrut ensures access permissions are correct, up-to-date, and fully compliant.

Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?

Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.

Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.

Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.

Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!

Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.

Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!

Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.

Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.

Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.

Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.

Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.

Book a Demo
Book a Demo
Join the Scrut Partner Network
Join the Scrut Partner Network