Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    His house burned down. He used the insurance money to build PopSockets.

    March 4, 2026

    Google isn’t waiting for a settlement — the 30 percent Android app store fee is dead

    March 4, 2026

    I am using the Google Pixel 10a and it’s a pretty misunderstood phone – in a good way

    March 4, 2026
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Tech News
    • Blog
    • How-To Guides
    • AI & Software
    Facebook
    GeekBlog
    Home»AI & Software»Burnout, budgets and breaches – how can CISOs keep up?
    AI & Software

    Burnout, budgets and breaches – how can CISOs keep up?

    Michael ComaousBy Michael ComaousAugust 1, 20255 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Abstract image of cyber security in action.
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Cyber-attacks continue to dominate headlines, disrupting operations and putting sensitive data at risk. In the wake of the AI boom, threats are growing more complex. The endless game between attacker and defender is intensifying, and defenders know the stakes are high. Operational, financial, and reputational damage can be severe when an attack succeeds.

    At the same time, security teams face a widening skills gap, growing threat complexity and tighter budgets. It’s a perfect storm for burnout. In fact, 79% of cybersecurity professionals reported that escalating threats are impacting their mental health, highlighting the need for an empathetic approach to these challenges.

    Richard Cassidy

    Social Links Navigation

    Prevention as the shield, resilience as the backbone

    Historically, organizations have measured cybersecurity success by how well they prevent attacks. But with 90% of IT and security leaders reporting cyber incidents in the past year alone, it’s clear that prevention alone is no longer enough.


    You may like

    It’s time to shift the focus towards recovery, transparency, and resilience. Resilience shouldn’t be seen as a fallback – it needs to become the frontline. This shift in mindset not only better prepares organizations for inevitable breaches but also reduces pressure on teams by redefining what success looks like.

    When teams are judged on their ability to recover and minimize disruption (not just prevent attacks), they’re empowered to focus on what matters; early detection, rapid response, and recovery planning. This reduces burnout and builds stronger long-term security posture.

    We must also accept a hard truth; breaches will happen. Rather than fueling a culture of blame, we need to equip teams to respond effectively and confidently.

    Securing the security team with transparency

    As ever, collaboration in a crisis is critical. Security teams working closely with backup, resilience and recovery functions are better able to absorb shocks. When the business is confident in its ability to restore operations, security professionals face less pressure and uncertainty.

    This is also true for communication, especially post-breach. Organizations need to be transparent about how they’re containing the incident and what’s being done to prevent recurrence. Trust drives everything and must be built into architecture, communication, and response, from user behavior to board confidence.

    Shared risk, shared responsibility

    As seen with the recent retail cyber-attacks in the UK, the implications of a cyber breach can be business critical. Yet many CISOs still struggle to get alignment at board level. Over three-quarters (77%) of UK CISOs feel that their IT budget is not completely reflected by their board’s objectives for cybersecurity.

    To make matters worse, this is heightened when it comes to regulatory pressures. New legislation like DORA and the upcoming Cyber Security and Resilience Bill is turning up the heat, with over half (58%) of CISOs feeling the pressure as a direct result.

    There is also an element of the blame game going on, with everyone keen to avoid responsibility for an inevitable cyber breach. It’s much easier to point fingers at the IT team than to look at the wider implications or causes of a cyber-attack. Even something as simple as a phishing email can cause widespread problems and is something that individual employees must be aware of. Security is everyone’s business – the attack surface isn’t just focused on IT, it’s every team, tool, and workflow.

    This critical gap jeopardizes not only an organizations’ security posture but also their ability to meet evolving regulatory demands. CISOs, boards, and other stakeholders must work together to ensure that cyber resilience priorities are clearly defined, adequately funded, and effectively implemented to meet the evolving regulatory landscape.

    The weight of responsibility for cyber security shouldn’t just lie on the security team’s shoulders. Cyber resilience is business resilience and security leaders, boards and stakeholders all have a part to play.

    Building teams that thrive

    To build and retain a capable cybersecurity team amid the widening skills gap, CISOs must lead a shift in both mindset and strategy. By embedding resilience into the core of cyber strategy, CISOs can reduce the relentless pressure to be perfect and create a healthier, more sustainable working environment.

    But resilience isn’t built in isolation. To truly address burnout and retention, CISOs need C-suite support and cultural change. Cybersecurity must be treated as a shared business-critical priority, not just an IT function. This means aligning investment with board expectations, embedding security into daily operations and ensuring every employee understands their role.

    With regulatory pressure rising and the threat landscape evolving, resilience isn’t just a technical necessity, it’s a strategic imperative. CISOs who champion collaboration, drive cultural change, and lead with empathy will be best positioned to build security teams that are not only effective but built to last.

    We list the best employee recognition software.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    breaches budgets Burnout CISOs
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous ArticleHow to Scan Files for Malware Before You Download Them
    Next Article I tried iOS 26, and my biggest issue has nothing to do with Liquid Glass
    Michael Comaous
    • Website

    Michael Comaous is a dedicated professional with a passion for technology, innovation, and creative problem-solving. Over the years, he has built experience across multiple industries, combining strategic thinking with hands-on expertise to deliver meaningful results. Michael is known for his curiosity, attention to detail, and ability to explain complex topics in a clear and approachable way. Whether he’s working on new projects, writing, or collaborating with others, he brings energy and a forward-thinking mindset to everything he does.

    Related Posts

    3 Mins Read

    Discord confirms 70,000 government IDs exposed in customer support data breach

    3 Mins Read

    AWS launches Quick Suite to challenge Microsoft and Google in the AI workspace race

    7 Mins Read

    How tech leaders can grow teams sustainably without the burnout

    4 Mins Read

    These CFOs are devoting 25% of their AI budgets to agentic AI

    2 Mins Read

    Today’s NYT Wordle Hints, Answer and Help for Aug. 9 #1512

    2 Mins Read

    Google Gemini struggles to write code, calls itself “a disgrace to my species”

    Top Posts

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025564 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Stay In Touch
    • Facebook

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025564 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Our Picks

    His house burned down. He used the insurance money to build PopSockets.

    March 4, 2026

    Google isn’t waiting for a settlement — the 30 percent Android app store fee is dead

    March 4, 2026

    I am using the Google Pixel 10a and it’s a pretty misunderstood phone – in a good way

    March 4, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 GeekBlog

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.