{"id":15419,"date":"2026-01-07T07:07:19","date_gmt":"2026-01-07T07:07:19","guid":{"rendered":"https:\/\/newestek.com\/?p=15419"},"modified":"2026-01-07T07:07:19","modified_gmt":"2026-01-07T07:07:19","slug":"8-things-cisos-cant-afford-to-get-wrong-in-2026","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15419","title":{"rendered":"8 things CISOs can\u2019t afford to get wrong in 2026"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Cybersecurity leaders have a lot to consider when trying to keep their organizations safe. But some things stand out more than others \u2014 or might be under the radar.<\/p>\n<p>As a new year dawns, here are some things CISOs should avoid falling short on in 2026.<\/p>\n<h2 class=\"wp-block-heading\" id=\"get-complacent-about-identity-controls-in-the-face-of-rising-ai-agents\">Get complacent about identity controls in the face of rising AI agents<\/h2>\n<p>The deployment of AI agents is growing rapidly, as enterprises look to take advantage of the automation and efficiency they offer. The global AI agents market size was estimated at $5.40 billion in 2024 and is projected to reach $50.31 billion by 2030, according to Grand View Research.<\/p>\n<p>The increased use of <a href=\"https:\/\/www.csoonline.com\/article\/4047974\/agentic-ai-a-cisos-security-nightmare-in-the-making.html\">AI agents presents a cybersecurity challenge<\/a> for enterprises, especially <a href=\"https:\/\/www.csoonline.com\/article\/4089732\/rethinking-identity-for-the-ai-era-cisos-must-build-trust-at-machine-speed.html\">in terms of identity controls<\/a>. Potential threats include identity spoofing and over-permissioned access. Cyber criminals can exploit agents through\u00a0prompt injection\u00a0or\u00a0malicious instructions\u00a0to bypass controls and gain unauthorized access to systems and applications.<\/p>\n<p>\u201cGet identity \u2014 including AI agents \u2014 right and you control who can do what at machine speed,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/morgan-adamski-501094240\/\">Morgan Adamski<\/a>, deputy leader for cyber, data, and tech risk at consulting firm PwC.<\/p>\n<p>\u201cAdversaries increasingly log in, not break in, and AI agents are now making real changes to systems and data,\u201d Adamski says. \u201cWhat leaders can\u2019t afford to miss is treating every human, workload, and agent as a managed identity, setting them up with their own accounts, phishing-resistant MFA [multi-factor authentication], minimum access for only as long as needed, passwords\/keys that change automatically, and monitoring for odd permission changes or hijacked sessions.\u201d<\/p>\n<p>Enterprises need to build AI-agent governance into everyday workflows,<\/p>\n<p>so that teams can move quickly without losing control, Adamski says. For example, require hardware-backed MFA for administrators, expire elevated privileges by default, and register each new agent as an application with its own policies.<em><\/p>\n<p><\/em><\/p>\n<p>\u201cIdentity and access controls for AI agents and AI platforms are one of the most important areas of concern for CISOs,\u201d says <a href=\"https:\/\/isg-one.com\/about-us\/people\/jason-stading\">Jason Stading<\/a>, director at global technology research and advisory firm ISG. \u201cRight now, permissions and access rights for AI are a black box in many areas. We will see a major push over the next couple of years for tools and methods for more transparency and control in this area specifically.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"ignore-increasingly-complex-supply-chains\">Ignore increasingly complex supply chains<\/h2>\n<p>Supply chains have been a growing area of risk for enterprises, given the rise of digital business and the growing complexity of supply chains in today\u2019s global business market.<\/p>\n<p>This area is particularly important for companies in the manufacturing, retail, and logistics sectors. \u201cIn 2026, CISOs who overlook cybersecurity in complex supply chains and manufacturing environments risk catastrophic consequences,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/gregory-zelo\/\">Greg Zelo<\/a>, CTO of AMFT, a provider of metal products and components.<\/p>\n<p>\u201cModern manufacturing is no longer confined to a single plant; it\u2019s a web of interconnected suppliers, IoT [internet of things]-enabled machinery, and cloud-driven production systems,\u201d Zelo says. \u201cThis complexity creates an expansive attack surface where one weak link can cripple entire operations.\u201d<\/p>\n<p>Recent incidents underscore the stakes, Zelo says. For example, in September 2025, <a href=\"https:\/\/www.csoonline.com\/article\/4065991\/dont-drink-or-drive-say-cyberattackers.html\">Jaguar Land Rover suffered a supply chain cyberattack<\/a> that halted production across the UK, Slovakia, India, and Brazil for weeks, costing an estimated $2.5 billion, he says. \u201cThe breach rippled through hundreds of suppliers, triggering layoffs and bankruptcies,\u201d he adds. \u201cThis wasn\u2019t just an IT failure; it was an operational crisis that exposed how deeply interdependent global manufacturing has become.\u201d<\/p>\n<p>Attackers <a href=\"https:\/\/www.csoonline.com\/article\/3595787\/ot-security-becoming-a-mainstream-concern.html\">increasingly target operational technology (OT) systems<\/a> that control robotics, assembly lines, and quality checks because halting production forces companies to pay ransoms quickly, Zelo says.<\/p>\n<p>\u201cBeyond financial losses, the risks extend to intellectual property theft, regulatory penalties, and national security concerns,\u201d Zelo says. \u201cFor CISOs, the lesson is clear: Traditional perimeter defenses are obsolete. Securing complex supply chains requires <a href=\"https:\/\/www.csoonline.com\/article\/564201\/what-is-zero-trust-a-model-for-more-effective-security.html\">zero-trust architectures<\/a> across IT and OT environments, continuous monitoring of third-party risk, including firmware and software updates, rapid patching and segmentation to isolate critical systems, [and] incident response drills involving suppliers and contractors.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Downplay escalating geopolitical tensions<strong><\/strong><\/h2>\n<p>It\u2019s easy to imagine CISOs being so laser focused on protecting their organizations from external and internal threats that they take their eyes off geopolitical tensions. Or maybe they dismiss them as being irrelevant to the cybersecurity issues at hand for their organizations. Either way, it\u2019s a big mistake.<\/p>\n<p>\u201cBuilding systemic scenarios into organizational cyber resiliency plans is very important,\u201d ISG\u2019s Stading says. \u201cThis should include global developments and geopolitical friction that may affect the business.\u201d<\/p>\n<p>There is also an increasing push for industry-specific threat intelligence to give enterprises tailored indicators of compromise that might affect their business and their assets, Stading says. \u201cSome of this can stem from potential advanced, persistent threats from malicious nation-states.\u201d<\/p>\n<p>The increasing intersection of cybersecurity and geopolitics is a reality, says <a href=\"https:\/\/www.northdoor.co.uk\/about-us\/management-team\/aj-thompson\/\">AJ Thompson<\/a>, chief commercial officer at IT consultancy Northdoor.<\/p>\n<p>\u201cCyber attacks via nation-state actors are part of much larger conflicts that target critical infrastructure and global supply chains,\u201d he says. \u201cFailure to incorporate geopolitical intelligence into threat modeling disproportionately exposes organizations to high-impact state-sponsored cyberattacks.\u201d<\/p>\n<p>In addition, unintended involvement in such events can also have severe regulatory and reputational consequences, Thompson notes.<\/p>\n<h2 class=\"wp-block-heading\" id=\"be-lax-about-organizational-cloud-use\">Be lax about organizational cloud use<\/h2>\n<p>As use of cloud services continues to increase, so do the <a href=\"https:\/\/www.csoonline.com\/article\/555213\/top-cloud-security-threats.html\">security and privacy risks associated with the cloud<\/a>. If CISOs neglect this area of cybersecurity they risk exposing their organizations to attacks.<\/p>\n<p>\u201cThis is important for both cloud services and AI tools, which are often cross-pollinated with each other,\u201d Stading says. \u201cAppropriate and modern security awareness and training tied to roles and responsibilities is key, and it needs to factor in usage of AI tools and technologies that are so prevalent in the workplace now.\u201d<\/p>\n<p>There is often a lack of training and education for cloud administrators and engineers around proper cloud security practices and procedures, Stading says. \u201cTool adoption and usage is also a key area many cloud teams are trying to improve,\u201d he says. \u201cMany organizations have invested in security tooling for clouds that is underutilized.\u201d<\/p>\n<p>The traditional security perimeter no longer exists, \u201c<a href=\"https:\/\/www.csoonline.com\/article\/4009247\/5-multicloud-security-challenges-and-how-to-address-them.html\">especially with multicloud adoption<\/a>,\u201d Thompson says. \u201cOrganizations relying on reactive cloud security often miss sophisticated threats.\u201d<\/p>\n<p>Proactive <a href=\"https:\/\/www.csoonline.com\/article\/657138\/how-to-choose-the-best-cloud-security-posture-management-tools.html\">cloud security posture management (CSPM)<\/a> and clear user security guidelines are critical steps toward the prevention of costly breaches and operational disruptions, Thompson says. \u201cSafe user practices must be instilled continuously in order to minimize risks from human error in complex cloud environments,\u201d he says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"overlook-growing-compliance-burdens\">Overlook growing compliance burdens<\/h2>\n<p>Some companies, particular in heavily regulated industries such as financial services and healthcare, have long faced the need to comply with data security and privacy regulations such as the <a href=\"https:\/\/www.csoonline.com\/article\/570125\/glba-explained-what-the-graham-leach-bailey-act-means-for-privacy-and-it-security.html\">Gramm-Leach-Bliley Act (GLBA)<\/a> and <a href=\"https:\/\/www.csoonline.com\/article\/570241\/hipaa-explained-definition-compliance-and-violations.html\">Health Insurance Portability and Accountability Act (HIPAA)<\/a>.<\/p>\n<p>But these days, just about every type of business has to comply with a growing number of data privacy and protection laws around the world. Overlooking or underestimating these regulations could lead to fines and other repercussions.<\/p>\n<p>\u201cIt\u2019s true that heavily regulated organizations take on a lot of extra overhead for compliance activities, and compliance fatigue is not unheard of,\u201d Stading says. \u201cBecause the CISO role has evolved over the past few years to take on more accountability and responsibility for compliance, CISOs really cannot afford to overlook or undervalue compliance efforts.\u201d<\/p>\n<p>CISOs at global enterprises in particular need to be up on the latest developments. \u201cThe regulatory landscape for cybersecurity in the UK and Europe is escalating rapidly,\u201d Northdoor\u2019s Thompson says. \u201cFrameworks such as the GDPR [General Data Protection Regulation] and DORA [<a href=\"https:\/\/www.csoonline.com\/article\/570091\/eus-dora-regulation-explained-new-risk-management-requirements-for-financial-firms.html\">Digital Operational Resilience Act<\/a>]\u00a0are setting new benchmarks that require organizations to demonstrate not only documented controls, but also empirically verifiable cybersecurity effectiveness.\u201d<\/p>\n<p>Regulators will want to see robust evidence that cybersecurity and <a href=\"https:\/\/www.csoonline.com\/article\/2111061\/cyber-resilience-a-business-imperative-cisos-must-get-right.html\">operational resilience<\/a> are deeply embedded within all layers of business processes, rather than handled as a compliance checkbox, Thompson says.<\/p>\n<p>\u201cEqually important is the management of <a href=\"https:\/\/www.csoonline.com\/article\/4012147\/third-party-risk-management-how-to-avoid-compliance-disaster.html\">third-party risk<\/a>, for which regulators increasingly hold organizations accountable,\u201d Thompson says. \u201cAs supply chains become more complex and distributed, vulnerabilities from external providers represent serious compliance and security liabilities. Failure to integrate these regulatory expectations into security strategies proactively risks not just heavy financial penalties, but also operational disruption and lasting reputational harm.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"underestimate-ai-chatbots-and-the-legal-exposure-they-create\">Underestimate AI chatbots and the legal exposure they create<\/h2>\n<p>AI chatbots are an emerging risk for data privacy, says Daniel Woods, principal researcher at Coalition, a cybersecurity insurance provider. In Coalition\u2019s analysis of nearly 200 privacy-related claims and scans of 5,000 business websites, 5% of claims targeted chatbot technologies, he says.<\/p>\n<p>\u201cThese claims alleged unlawful interception of customer conversations under state wiretap laws enacted long before such AI tools existed,\u201d Woods says. \u201cAll the chatbot-related claims followed the same template, stating that the chat\u2019s opening message should have disclosed that the conversation was being recorded.\u201d<\/p>\n<p>The claims alleged violation of the decades-old Florida Security of Communications Act, Woods says. About 5% of websites deployed chatbot technologies, which equates to the same percentage of web privacy claims that focused on chatbots, he notes.<\/p>\n<p>\u201cChatbot use was particularly common in the IT and financial industries, with 9% and 6% of sites in these industries using chatbots, respectively,\u201d Woods adds. There will likely be an increase in usage of these chatbots and therefore, a potential increase in future claims, he contends.<\/p>\n<p>\u201cThe risk of getting chatbots wrong is that these systems can be easily manipulated with tactics like prompt injection, which has been documented dozens of times leaking customer data,\u201d Woods says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"neglect-to-secure-the-cloud\">Neglect to secure the cloud<\/h2>\n<p>By now, nearly every business relies on cloud services to support at least some of their operations. Neglecting the security of these services is asking for trouble.<\/p>\n<p>\u201cCloud and SaaS will keep expanding \u2014 so pre-wire \u2018golden\u2019 landing zones with guardrails for identity, encryption, logging, and egress, and use policy-as-code so the compliant configuration is the default,\u201d PwC\u2019s Adamski says.<\/p>\n<p>CISOs need to use tools to continuously inventory assets, spot misconfigurations, flag anomalous behavior, and auto-remediate where prudent, Adamski adds.<\/p>\n<p>\u201cThe act of firefighting alerts coming in from everywhere won\u2019t keep up with multicloud sprawl and identity-centric attacks,\u201d Adamski says. Modernize the security operations center with automation and AI to reduce the noise and correlate signals across cloud services.<\/p>\n<h2 class=\"wp-block-heading\" id=\"forget-about-the-human-factor\">Forget about the human factor<\/h2>\n<p>With so many cybersecurity tools and services in place, it\u2019s easy to sometimes forget about the human side of cybersecurity. That can lead to all kinds of things going wrong.<\/p>\n<p>\u201cIn my experience, the proximate cause of security breaches is usually human error,\u201d says <a href=\"https:\/\/www.cm.law\/people\/beth-fulkerson\/\">Beth Fulkerson<\/a>, technology and cybersecurity partner at law firm CM Law. \u201cUsually someone falls for a scam and opens the door [to] malicious code.\u201d<\/p>\n<p>It\u2019s human nature to want to react to a message or open a document, and this is what gets users into trouble. \u201cThe primary solution is not more tech, but more training to help employees feel comfortable pushing back on requests for access to their machines or for information,\u201d Fulkerson says.<\/p>\n<p>An example of human error would be if someone fails to remember that a printer or fax machine is on a network, and does not install security protections or doesn\u2019t remove it from the network, Fulkerson says.<\/p>\n<p>\u201cAnother issue is failure to properly use the security technology available or already in place,\u201d Fulkerson says. The most recent litigation she worked on involved a defendant that claimed it was using file integrity management software as required by the Payment Card Industry Data Security Standard (<a href=\"https:\/\/www.csoonline.com\/article\/569591\/pci-dss-explained-requirements-fines-and-steps-to-compliance.html\">PCI DSS<\/a>), but either didn\u2019t set the alerts up or failed to heed the alerts.<\/p>\n<p>\u201cIt doesn\u2019t matter if a company has tremendous security software if they do not set it up correctly and maintain it,\u201d Fulkerson says.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity leaders have a lot to consider when trying to keep their organizations safe. But some things stand out more than others \u2014 or might be under the radar. As a new year dawns, here are some things CISOs should avoid falling short on in 2026. Get complacent about identity controls in the face of rising AI agents The deployment of AI agents is growing&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15419\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15419","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15419"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15419\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}