homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. 4 Trends That Will Define the CISO's Role in 2024
James Lyne
James Lyne

4 Trends That Will Define the CISO's Role in 2024

These are the topics most prevalent in countless discussions with security leaders and experts.

April 3, 2024

Considering the macro landscape of cybersecurity, choosing topics to focus on for an industry paper is always challenging, particularly given the massive number of threat, business, regulatory, and technology trends with which security leaders are contending. It can be tempting to pick the most salacious, sublime, or ridiculous trends. Instead, my focus for the paper, "SANS CISO Primer: 4 Cyber Trends That Will Move the Needle in 2024," has been on the topics most prevalent in discussions with security leaders and experts. Note that a few of the trends covered in this paper have a new lease on life after years of theoretical discussion.

For the past 20 years, I’ve watched as threats, malware, and attacker tactics evolve as innovation paved the way for a substantial increase in sophistication and scale. I vividly remember the days of seeing only a few hundred pieces of new malicious code a day, many of them hand-crafted. That’s a wildly different picture than the tactics, scale, and opportunities of today’s threat landscape.

Cyber criminals today operate crimeware-as-a-service (CRaaS) platforms, reducing the barrier to entry and enabling effective compromise tactics to be more rapidly deployed. We’ve seen criminal groups running affiliate programs and even bug bounties to help them better secure their crime platforms. The LockBit gang, which recently experienced law enforcement action, had over 14,000 “customers” using its platform to generate ransomware and extortion campaigns. Remarkably, one criminal gang offered a million dollars to those able to find defects or “doxing” to protect the security, integrity, and trust of its platform used for fraud and extortion. Given the innovation being leveraged and the accessibility of these platforms, it’s no wonder the scale of mainstream threats has increased so substantially – even more so due to competition between multiple CRaaS products from different criminal groups.

The packaging of these services and growing opportunities for attackers will lead to even more changes in 2024. Expect to see the much-loved ransomware tactic continue to evolve. Over the last year, many campaigns featured not just ransom, but extortion, in which criminals steal data from companies and threaten publication if they are not paid. This shift appears to be in response to more organizations having effective backup and restoration strategies in place for when ransomware strikes. By threatening extortion, criminals enhance the viability of this attack model once more. In some cases, the stolen data has also been made available for sale to other gangs – introducing horizontal and vertical fraud opportunities for the gangs and creating a much more difficult situation for security leaders to contain. In 2024, I would not be surprised to see threat actors not bothering to encrypt the data and simply focusing on the extortion part of the threat. This model enables them to profit without the pesky difficulties of encrypting files and disrupting serious infrastructure, such as a hospital. Much like security leaders, cyber criminals are always looking for opportunities to optimize their business.

While CRaaS and evolving ransomware trends present challenges for every organization, there is also plenty to consider in the more esoteric and high-end threat space as well. The Microsoft breach in the Storm-0558 attack demonstrates the impact of persistent, focused, and high-end attackers that target even a highly security-conscious organization.

All of us are generating more data and growing our digital infrastructure, and as we do so, we create more surface area and opportunity for attackers. However, over the years the industry has improved many technologies and enhanced various security architectures and models. In this way, security enhancements are acting as a counter-balance of sorts against cyber criminals. Still it is clear that our future will be more target-rich than ever for our adversaries.

Against this backdrop, there are four trends playing out that warrant the attention of security leadership, not only to guard against evolving threats, but also to position their organization to take advantage of vast opportunities for growth and success.

While I give a high-level overview of these trends here, the full white paper we've put together includes actionable best practices for CISOs for each of these focus areas. Download it here.

Generative AI

Whether you consider its impact to cybersecurity, business, broader technology, or society at large, AI is clearly going to be disruptive in the years to come. Almost every security leader I have spoken with this year is managing the balance of embracing this new technology and managing its risk – even as it continues to change in shape and size. This will clearly be a topic of much discussion in the coming years.

Most security leaders I have talked to also have at least introduced a rudimentary AI policy with some basic guardrails, but they are now looking at training to help them balance security and privacy while they embrace the benefits that AI brings.

Zero Trust Implementation

Zero trust principles and design have been considered for a long time, but the continued evolution of threat models and risk has brought them back to the forefront for 2024. I have heard many reasons for zero trust receiving renewed attention – supply chain attacks, ransomware effectiveness, or just the developing scale of data exfiltration followed by extortion – but I suspect this is also due to changes in our technology stacks that make many of these principles more implementable.

Even so, achieving zero trust requires a considerable amount of skilled work. To illustrate, years ago I watched several organizations attempt to implement zero trust but found themselves obstructing the business, as they could not meaningfully update policies with sufficient velocity and granularity. You need to be ready to realize the benefits with the right capacity and skills.

Cloud Security

OK, I’ll admit it. We’ve been talking about cloud for a long time, and I find myself a little surprised to be talking about it as a major focus of security leaders in 2024. But the facts are the facts. I have talked to many security leaders who have major cloud security projects planned for this year. Also, one only needs to look at the number of cloud security incidents to recognize it as a priority.

In fact, many CISOs have told me they are rushing to build their organizations’ cloud security capabilities. Since the accelerated deployment during the pandemic, they had been trying to use general security practitioners and DevOps folks to achieve a robust cloud security program. But subsequently they have realized that cloud security is a specialist skillset that requires specialist roles.

Cybersecurity Complexity and Capacity Development

There has never been such complexity and volume of risk to manage as businesses inevitably grow their technology footprint and attackers continue to scale their efforts. But we also live in a time of unprecedented cyber defense capabilities – remarkable tools and so much data. Indeed, when I jump in to review data breaches of organizations, it is not uncommon to find a huge percentage of the functionality available to them is not leveraged. It is no surprise, therefore, that a major theme in discussion with security leaders in 2024 is how they develop their cyber capability over time. 

I’ve seen security leaders focusing more on job roles and skills mapping, defining clearer job grades for the litany of specialties required for the modern security team. Indeed, I’ve worked with some organizations that are mapping SANS training curricula and requisite skills to their defined job roles so that they can develop detailed talent development programs. This area of focus offers perhaps the greatest opportunity for organizational maturity.

There are many topics I could have picked to discuss, but these four cybersecurity trends rise to the top as a result of countless conversations with esteemed CISOs. There is no shortage of hype with which to contend, and security leaders have their focus pulled in a great number of directions. I trust that you will find my selections for this year thought-provoking, and that you will be able to go back to your team after reading this paper and add a highlight or priority to produce better risk management and security outcomes.

Remember, many of us share the same challenges. Even though our environments and businesses are different, there is a great deal to be said for sharing our lessons learned – that is, what works and what doesn’t. Consider participating in forums like the SANS CISO Network so that we can work together to more rapidly adapt to the threat and technology challenges of the moment. 

I wish you a breach-free year and hope that you get an edge on these disruptive trends.

Download the full whitepaper here and get actionable guidance and best practices for harnessing the benefits that these four cybersecurity trends can bring to your organization.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Recommended Training

  • LDR519: Cybersecurity Risk Management and Compliance
  • LDR520: Cloud Security for Leaders™
  • LDR512: Security Leadership Essentials for Managers™

Tags:
  • Cybersecurity Insights

Related Content

Blog
Cybersecurity Insights
February 19, 2025
The Ultimate List of SANS Cheat Sheets
Need help cutting through the noise? SANS has a massive list of Cheat Sheets available for quick reference.
SANS_social_88x82.jpg
SANS Institute
read more
Blog
340x340_-_Blog_-_Why_SANS_infographic_-_Day_1_(2).jpg
Cybersecurity Insights
April 1, 2024
4 Key Cybersecurity Trends to Watch in 2024
This infographic shows four major trends that will give CISOs the opportunity to empower their organizations and security teams in 2024.
SANS_social_88x82.jpg
SANS Institute
read more
Blog
370x200_SANS_Partnerships_Blog_Teaser.jpg
Cybersecurity Insights
September 16, 2021
Partnering within cyber: SANS and the Cyber Resilience Centre for South East England
SANS is founding partner of the SECRC and sat down to have a chat with Chris White, Head of Cyber and Innovation at the SECRC
SANS_social_88x82.jpg
SANS Institute
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn
OSZAR »