{"id":15406,"date":"2026-01-05T07:03:08","date_gmt":"2026-01-05T07:03:08","guid":{"rendered":"https:\/\/newestek.com\/?p=15406"},"modified":"2026-01-05T07:03:08","modified_gmt":"2026-01-05T07:03:08","slug":"cybersecurity-leaders-resolutions-for-2026","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15406","title":{"rendered":"Cybersecurity leaders\u2019 resolutions for 2026"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>As the AI-hype dust settles, CISOs have a lot to focus on 2026. From ongoing struggles such as ensuring teams are not burning out to current and future concerns, which includes finding effective business cases for AI, focusing on spotting a breach before it happens to planning for looming fear of breaking quantum encryption, CISOs from different industries share what is top of their agenda for 2026.<\/p>\n<h2 class=\"wp-block-heading\" id=\"1-prioritize-resilience-over-reactive-security\">1. Prioritize resilience over reactive security<\/h2>\n<p>Emphasis on resilience and architectural discipline, particularly as organizations face even greater reliance on cloud infrastructure, is part of Fortitude Re CISO <a href=\"https:\/\/www.linkedin.com\/in\/elliottfranklin\/\">Elliott Franklin<\/a>\u2019s resolutions. \u201cOur approach will focus on well-structured project management and intentional design,\u201d he says.<\/p>\n<p>Any new initiative will start with a clear architectural plan and a deep understanding of end-to-end dependencies and potential points of failure. \u201cBy taking a thoughtful, engineering-driven approach \u2014 rather than reacting to outages or disruptions \u2014 we aim to strengthen the stability, scalability, and reliability of our systems,\u201d he says. \u201cThis foundation enables the business to move with confidence, knowing our technology and security investments are built to endure and evolve.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"2-ai-will-dominate-the-agenda\">2. AI will dominate the agenda<\/h2>\n<p>Standard Chartered group CISO Cezary Piekarski expects his agenda to be dominated by AI in two ways: defining both the threat landscape and defensive architecture.<\/p>\n<p>\u201cSpeed is essential when mitigating attacks so leveraging AI and orchestration tools allows us to quickly automate detection and streamline incident response,\u201d Piekarski says. \u201cThis reduces dwell time significantly and accelerates remediation, ensuring that threats are contained before they escalate.\u201d<\/p>\n<p>As new attack surfaces emerge with AI-driven applications and systems, Piekarski\u2019s priorities will focus on defending and hardening the environment against AI-enabled threats and tactics. \u201cIt\u2019s harnessing the opportunities of AI across the cyber stack and enabling the bank to use AI securely and safely.\u201d<\/p>\n<p>Qiagen CISO <a href=\"https:\/\/www.linkedin.com\/in\/dr-daniel-schatz\/\">Daniel Schatz<\/a> expects artificial intelligence to remain a core theme across 2026 \u201cin terms of using AI to improve security controls and operations, and ensuring AI is securely integrated into products.\u201d<\/p>\n<p>He expects a notable escalation in the sophistication and scale of generative AI enabled threats.<\/p>\n<p>\u201cWhat we have observed so far are largely handcrafted AI-supported campaigns, but they will likely evolve into more automated and industrialized social-engineering operations, following the same pattern seen with most emerging threats,\u201d Schatz says. \u201cWith generative AI becoming ubiquitous, technologies that help organizations understand, manage, and secure the AI attack surface will quickly rise in importance. It\u2019s critical that the industry embeds appropriate security controls from the start, so we avoid repeating the mistakes seen during the early days of web development.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"3-achieve-visibility-and-control-especially-with-ai\">3. Achieve visibility and control, especially with AI<\/h2>\n<p>The priority for <a href=\"https:\/\/www.linkedin.com\/in\/conalg\/\">Conal Gallagher,<\/a> Flexera\u2019s CIO and CISO, is balancing productivity with protecting intellectual property as Flexera teams use AI tools and chatbots. \u201cWe\u2019re working to standardize trusted, enterprise-grade AI solutions, while putting controls in place to prevent data leakage from unsanctioned tools.\u201d<\/p>\n<p>In practice, SaaS management and discovery tools will be used to get a handle on shadow IT and unsanctioned AI usage. Automation for compliance and reporting will be important as customer and regulatory requirements around ESG and security continue to grow, along with threat intelligence feeds and vulnerability management solutions that help Gallagher and the team stay ahead of what\u2019s happening in the wild.<\/p>\n<p>\u201cThe common thread is visibility and control; we need to know what\u2019s in our environment, how it\u2019s being used, and that we can respond quickly when things change,\u201d he tells CSO.<\/p>\n<h2 class=\"wp-block-heading\" id=\"4-manage-human-and-non-human-identities\">4. Manage human and non-human identities<\/h2>\n<p>Schatz is focused on managing human and <a href=\"https:\/\/www.csoonline.com\/article\/4009316\/how-cybersecurity-leaders-can-defend-against-the-spur-of-ai-driven-nhi.html\">non-human identities<\/a>. He expects technologies that enable effective identity management will continue to be critical. \u201cHuman identities remain challenging to protect, and non-human identities are only beginning to grow in scale with the emergence of agentic AI,\u201d he says.<\/p>\n<p>With a similar plan, Franklin is prioritizing identity and privilege management \u2014 across both human and non-human identities.<\/p>\n<p>\u201cIt\u2019s [about] ensuring that service accounts, APIs, and automation tools are governed with the same rigor as user accounts,\u201d Franklin says. \u201cAs automation grows, effectively managing these digital identities will be critical to maintaining trust, traceability, and control in complex environments.\u201d<\/p>\n<p>The goal is to strengthen the organization\u2019s overall resilience while enabling productivity and collaboration.<\/p>\n<h2 class=\"wp-block-heading\" id=\"5-build-security-into-agentic-ai-products\">5. Build security into agentic AI products<\/h2>\n<p>Some are prioritizing building security directly into agentic AI products to mitigate sophisticated attacks. \u201cWe\u2019re moving beyond simply trying to stop AI risks to engineering security directly into our agentic solutions, ensuring the secure path to innovation is the fastest path for our teams,\u201d Qualtrics CSO <a href=\"https:\/\/www.linkedin.com\/in\/assafkeren\/\">Assaf Keren<\/a> says.<\/p>\n<p>Keren will be utilizing AI to strengthen security capabilities, automate and accelerate internal functions like SOC triage and control testing.<\/p>\n<h2 class=\"wp-block-heading\" id=\"6-link-security-with-trust\">6. Link security with trust<\/h2>\n<p>For Keren, 2026 is also about making security a visible trust signal, not just a back-office function. He\u2019s looking to transform security into a proactive, transparent partnership with their customers.<\/p>\n<p>\u201cCustomers are making purchasing decisions based on how organizations handle data and AI. Treating security as a go-to-market advantage, not just risk mitigation,\u201d he tells CSO.<\/p>\n<p>This means getting certified with FedRAMP High, ISO 42001 for AI, being transparent about security practices, and making security posture a visible part of the value proposition. \u201cOrganizations that can credibly demonstrate robust security and responsible AI practices will win customers who are increasingly making decisions based on trust.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"7-develop-a-quantum-readiness-plan\">7. Develop a quantum readiness plan<\/h2>\n<p>\u201cQuantum computing poses significant cyber risks by\u202fpotentially breaking current encryption methods, impacting data security, and enabling new attack vectors,\u201d says Piekarski.<\/p>\n<p>With this in mind, Piekarski and the team are actively preparing for what lies ahead and that means quantum threats. \u201cIn 2026, we\u2019ll continue progress on our multi-year, resilient cryptography preparedness strategy to meet the challenges of the emerging threat and address associated risks,\u201d he says.<\/p>\n<p>Jon France, CISO, ISC2, urges CISOs to prepare for post-quantum cryptography. This involves reviewing their own organization and systems and then turning to their vendors and partners about their readiness.<\/p>\n<p>\u201cThe roadmap includes a cryptographic inventory and then asking [vendors] \u2018what are you doing on quantum and what\u2019s your roadmap?\u2019 There will be some things you\u2019ll have to sunset, probably earlier than you thought, so you have to plan around that,\u201d he says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"8-protect-people-not-just-systems\">8. Protect people, not just systems<\/h2>\n<p>In 2026 and beyond, security strategies will need to consider workforce resilience, not only tools, controls, and compliance as stress and skills transformation permanently reshape the cyber workforce.<\/p>\n<p>With burnout an ever-present problem, AI changing skills and jobs, and economic conditions putting pressure on budgets, CISOs must look after the wellbeing of their teams as much as the technology.<\/p>\n<p>\u201cLooking after the team while leveraging the team but without killing them is on our agenda,\u201d says France.<\/p>\n<h2 class=\"wp-block-heading\" id=\"9-spot-breaches-early\">9. Spot breaches early<\/h2>\n<p>As cloud systems expand and supply chains stretch further, the old idea of total prevention is fading fast. CISOs will be under increasing pressure to prioritize detection and response in their security program.<\/p>\n<p>\u201cThe strongest security programs won\u2019t be the ones that stop every breach, they\u2019ll be the ones that spot them first,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/jan-bee\/\">Jan Bee<\/a>, TeamViewer\u2019s CISO.<\/p>\n<p>Bee believes that instead of building a fortress around the organization, CISOs will need to favor visibility and speed. \u201cIn the age of agentic AI and hyperconnected SaaS, that speed will be everything,\u201d says Bee. \u201cThe organizations that can see trouble coming in seconds will stay ahead of even the most heavily defended but slow-to-react peers.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"10-get-ahead-of-the-threat-curve\">10. Get ahead of the threat curve<\/h2>\n<p>\u201cOrganizations tend to move at a somewhat slower pace, so looking ahead at the developing threat landscape and pre-positioning appropriately is essential as we close the year\u2019s budgeting cycle,\u201d says Schatz.<\/p>\n<p>On his agenda is reviewing established sources such as the WEF Cybersecurity Outlook, the ENISA Threat Landscape and the ISF Threat Horizon.<\/p>\n<p>\u201cIt helps to set expectations and allows for more realistic planning of risk controls over the next 12-36 months,\u201d he tells CSO.<\/p>\n<h2 class=\"wp-block-heading\" id=\"11-close-the-communications-gap\">11. Close the communications gap<\/h2>\n<p>CISOs, boards and IT leaders must align around a shared language of resilience \u2014 which treats security as a business priority not simply a technical measure.<\/p>\n<p>Many boards still view security as a compliance or cost issue, while CISOs talk in terms of risk and continuity, according to Bee. \u201cThat communication gap creates blind spots that attackers can exploit,\u201d he says. \u201cAs cyber risk becomes inseparable from business risk, boards and CISOs will be forced to collaborate more closely, translating technical threats into financial, reputational, and operational impacts that executives can act on.\u201d<\/p>\n<p>CISOs should focus on storytelling, not just reporting. \u201cThis means connecting threat intelligence to business outcomes in clear, strategic terms.\u201d<\/p>\n<p>Boards, in turn, need to treat cyber resilience as a competitive advantage, not a line item. \u201cThe companies that close the cultural gap between security and strategy will be the ones that recover faster, and inspire greater investor confidence when incidents inevitably occur,\u201d Bee says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"12-deliver-outcomes-not-vibes\">12. Deliver outcomes, not vibes<\/h2>\n<p>\u201cIn 2026, execution will matter more than experimentation,\u201d says Gallagher.<\/p>\n<p>In practice, he will be adopting a disciplined approach that emphasizes transparency, governance, and measurable outcomes across the security program. \u201cEvery initiative will be measured by its ability to tie spend to ROI and tangible risk reduction,\u201d he tells CSO.<\/p>\n<p>AI initiatives, in particular, are likely to come under real scrutiny to show outcomes and effective business use cases as the excitement and buzz of 2025 settles.<\/p>\n<p>\u201cIt feels like 2026 is about making AI a business engine, not a science project,\u201d he says.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As the AI-hype dust settles, CISOs have a lot to focus on 2026. From ongoing struggles such as ensuring teams are not burning out to current and future concerns, which includes finding effective business cases for AI, focusing on spotting a breach before it happens to planning for looming fear of breaking quantum encryption, CISOs from different industries share what is top of their agenda&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15406\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15406","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15406"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15406\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}