Keven Knight at Talion argues that the CISO’s role needs to be strengthened if they want to optimise their cyber-security

There is a moment most CISOs recognise immediately.
It comes after the incident briefing, after the containment update, after the technical details have been absorbed and the room goes quiet. The questions slow, the language becomes careful, and then, inevitably, attention turns in one direction.
How did this happen?
In that moment, accountability feels absolute. The expectation is clear. The assumption is unspoken but widely shared. If cyber risk materialised, security must have owned it.
This is the paradox at the heart of modern cyber governance.
CISOs are being held accountable for risks they did not create, decisions they did not approve, and trade-offs they were never empowered to challenge. Not occasionally, but systemically, and not because organisations are careless, but because governance has failed to keep pace with how risk is created.
Cyber failures today are rarely the result of technical ignorance or inattentive teams. They are created upstream, in commercial pressure, accelerated transformation, procurement shortcuts, architectural compromises, and leadership decisions made in rooms where cyber risk is acknowledged but rarely weighted.
Yet when consequences surface, accountability flows in only one direction.
Cyber-security ownership
In many organisations, the language of cyber ownership has expanded far faster than the reality of authority. Security leaders are told they own cyber risk, yet lack meaningful control over architecture, vendor selection, delivery timelines, budgets, or strategic veto points. They are expected to assure outcomes without being allowed to influence the decisions that shape them.
Ownership becomes narrative rather than operational.
It reassures boards that accountability exists. It simplifies complex organisational risk into a single role. It creates the appearance of control without requiring meaningful change to how decisions are made.
However, accountability without authority does not create resilience; It creates exposure.
Over time, this imbalance reshapes behaviour. When authority is limited and responsibility is absolute, escalation becomes risky. Challenge becomes political, silence becomes safer than dissent. Optimism is rewarded over realism, and reassurance becomes a substitute for governance.
This is how resilience quietly erodes.
The paradox is reinforced by how organisations talk about cyber risk. Reports are delivered, metrics improve, dashboards signal progress. From a distance, everything appears under control. Yet these artefacts often measure activity inside the security function, not the decisions that introduced exposure elsewhere. Visibility is mistaken for influence. Reporting is mistaken for ownership.
When incidents occur, this distortion becomes more visible. Scrutiny collapses toward execution. Questions focus on detection gaps, control failures, and response speed. These matter, but they are incomplete. The decisions that shaped exposure are treated as background context rather than primary cause. Boards are often surprised by incidents because they believe risk is being managed. In reality, risk was being absorbed.
This is why organisations can experience repeated incidents despite continual investment. They improve response inside a system that continues to generate exposure. Each failure is treated as an anomaly rather than a predictable outcome of how authority and accountability are misaligned.
For CISOs, the human cost is significant. Unlike many executive roles, the CISO carries personal exposure that extends beyond performance metrics. A serious incident can damage credibility, shorten tenure, and in some environments invite regulatory or personal scrutiny.
Over time, this creates a persistent state of defensive leadership. Energy is spent anticipating blame rather than shaping outcomes.
When experienced security leaders step away, organisations often interpret it as a talent problem.
Yet,it is an accountability problem. Each departure removes institutional memory, weakens continuity, and silences voices most capable of naming uncomfortable truths. The system resets, but the structure remains unchanged.
Aligning authority and accountability
For business leaders wanting to overcome to get ahead of these challenges, it is vital they recognize this pattern and intervene against it.
They must recognize that security cannot be isolated from authority, it must be distributed evenly and consciously. Decision-makers should own the risks they approve, while security leaders must be involved early enough to shape outcomes, not just explain them later. Authority follows responsibility rather than being assigned after failure.
This is not about granting veto power or slowing progress. It is about making progress survivable. When authority and accountability are aligned, something fundamental changes. Reporting surfaces tension instead of smoothing it over, incidents become opportunities for learning rather than blame. Security leaders are positioned as stewards within a system that understands their own responsibilities.
Responsibility without authority is not leadership, it is exposure masquerading as control. Until business leaders confront that reality honestly, cyber governance will remain performative and resilience fragile.
The reckoning is not coming; it is already here.
Keven Knight is CEO at Talion
Main image courtesy of iStockPhoto.com and ATHVisions

© 2025, Lyonsdown Limited. Business Reporter® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543