Why Leaders Must Stop Framing Cybersecurity as a Tech Problem
Ask yourself this question: why are hackers often more effective at collaboration than the organisations they're targeting? This was something I did a week ago via a poll, and you can see the results here.
Recent cyberattacks on major UK retailers like Marks & Spencer, the Co-op, and Harrods by the infamous "Scattered Spider" group underline a harsh reality in cybersecurity. Hackers have mastered the art of collaboration. They share tools, tactics, and information seamlessly, with a single, aligned goal of exploiting vulnerabilities. Meanwhile, businesses often flounder in silos, stuck in a cycle of reactive IT measures and outdated perceptions of cyber risks.
But the lesson from these breaches isn’t just about better tech tools or infrastructure. It’s something much deeper and more structural that leadership must address. The real vulnerability isn’t some open port or misconfigured setting – it’s the absence of governing clarity and trust at the leadership level. And unless that changes, the cycle of high-profile breaches will continue.
The Structural Gap in Cybersecurity
The traditional boardroom narrative positions cybersecurity as an IT or compliance issue. Leadership often views it as a box to be checked or a technical challenge to be overcome. But every significant breach reveals the same critical pattern: cyberattacks are not just about technical failures. They're a wake-up call to leadership governance.
I wrote about this recently, drawing upon Maslow's Hierarchy of Needs.
You see, the gap lies at the intersection of legal, operational, financial, and reputational consequences. Governance must transcend the boundaries of "Where is our infrastructure weak?" to answer the more profound and pivotal question, "Where are we structurally exposed to consequences?"
When trust breaks down internally or between organisations, collaboration stalls. And in cybersecurity, stalled collaboration is an open invitation for hackers to exploit the gaps. To move forward, we must redefine cyber-resilience—as not just a technical pursuit but a structural and relational one.
Humans Don’t Trust by Default But We Must Build It Anyway.
Here’s a psychological truth about trust that business leaders need to grasp: humans rarely trust unconditionally. Instead, trust operates as conditional cooperation—it’s earned gradually through credible signals like transparency, shared goals, and consistent behavior.
This is particularly evident in high-stakes environments like cybersecurity, where trust is inherently fragile. Whether it’s managing inter-organisational risks or sharing critical threat intelligence, trust becomes strategic, negotiated, and essential for success. Without it, collaboration crumbles under fear of exposure or competitive tension.
Key Barriers to Trust in Cybersecurity:
Yet, trust can be built. It’s not automatic, but it can be cultivated through deliberate efforts and shared systems.
Collaboration Models That Work in Cybersecurity
Achieving trust in cybersecurity often requires combining robust frameworks with strong human relationships. Here are some that are working today for fostering collaboration across industries and organisations. Each model has trade-offs, but all recognise a central truth: trust doesn’t emerge on its own—it’s built through structure, consistency, and shared incentive.
1. Information Sharing & Analysis Centers (ISACs)
These industry-specific groups, such as FS-ISAC for financial services, provide secure forums for threat intelligence sharing.
2. Traffic Light Protocol (TLP)
A standardised method to label intelligence for ethical sharing. Information is categorized as:
Why It Works: Clear guidelines reduce uncertainty around data handling, making sharing more predictable and secure.
3. Anonymised Sharing & Reciprocity Mechanisms
Techniques like anonymised breach stories lower the stakes for organisations reluctant to disclose vulnerabilities. Coupled with reciprocal expectations (e.g., "give to get"), trust accelerates as the fear of exploitation diminishes. Secure, anonymised data-sharing tools allow companies to participate without risking attribution.
Why It Works: Reduces the fear of exposure. Promotes openness in sharing breach or vulnerability information.
4. Neutral Third-Party Intermediaries
Neutral bodies like government agencies, certifying organisations, or Information Sharing and Analysis Organisations (ISAOs) extend collaborative efforts beyond traditional industry silos, creating space for broader dialogue. They provide a buffer for trust-building and can facilitate collaboration while reducing risks.
Governance bodies like the Cybersecurity Information Sharing Act (CISA) in the U.S. or ENISA in the EU provide protective frameworks:
5. Cultural Shifts Toward Shared Responsibility
Companies that embed cyber-resilience as a shared value, rather than a competitive edge, lower barriers to trust and exhibit greater openness. Beyond frameworks, fostering human-to-human trust is equally important:
6. Zero Trust Architecture (ZTA)
Built on the principle of "never trust, always verify," ZTA frameworks can guide conditional and controlled data sharing between organizations.
The Leadership Mindset Shift
The Scattered Spider Group breaches reminded us that hackers don’t just collaborate effectively; they’re ruthlessly aligned in their purpose.
Ironically, their playbook teaches enterprises a valuable lesson about the importance of trust and unified goals to counter global cyber threats.
For executives, CISOs, and boards of directors, addressing exposure isn’t just about rolling out technical controls; it’s about leading at the edge of consequence. Leaders must spearhead cultural shifts where cybersecurity is reframed as a governance priority, not an IT silo. This involves fostering a structure where trust and collaboration are embedded into every layer.
To End
I believe that by empowering more IT leaders and their execs to adopt models of conditional trust and secure collaboration, organisations can turn the tide on cyber threats. From facilitating interoperability with trusted frameworks to helping develop human-centric governance strategies, we’re here to help you lead the way.
The question isn’t whether to share or not. It’s how to share securely while staying agile and resilient. Isolation is riskier than collaboration when facing a common enemy.
Now I want to hear from you
Tell me your thoughts on this. What have you seen work? Let me know in the comments.
Or, if you're a leader responsible for cyber, drop me a DM or book a call and we can discuss or go through tools and strategies that build trust, secure data, and foster next-level collaboration across industries.
Because real resilience starts at the leadership level. Together, we can lead with trust and protect what matters most.
About Jane Frankland MBE
Jane Frankland MBE is an award-winning cybersecurity leader, author, and women’s change agent. Her authority is referenced by Wiki, LinkedIn, and UNESCO. She built her own global penetration testing firm in the late 90s, has worked as a Managing Director at Accenture, and contributed to numerous industry initiatives, including CREST, Cyber Essentials, and Women4Cyber. Through her IN Security Movement, 441 women have received scholarships, a value of almost USD $800,000. She regularly shares her thought leadership and leader-developer skills with forward -thinking companies and governments, and has been featured in the Sunday Times, The Financial Times, The Guardian, Forbes and the BBC. To find out more, visit https://jane-frankland.com
Founder of EnH group of Organizations
1moJane Frankland MBE ✨ Brilliant insights Jane. Cyber resilience starts with leadership mindset not just tech upgrades or compliance checklists.
Founder of Singularity Systems and Cybersecurity Insiders. Technologist and Futurist, Thinkers360 Thought Leader (9 Fields) and CSI Group Founder. Manage The Intelligence Community and The DHS/Global Threat LI Groups.
2moThis is a powerfully articulated breakdown of the true root issue: governance clarity and trust gaps at the leadership level. You're absolutely right—cybersecurity today is less about firewalls and more about decision-making structures, information sharing cultures, and executive alignment. What stood out most is the framing of Scattered Spider as a mirror to corporate dysfunction. Hackers collaborate because they must. Enterprises often don't because they won't. Your call to shift from reactive IT measures to trust-based strategic governance hits the mark. We don’t just need better tools—we need better coordination, shared frameworks like TLP, and neutral convening bodies. You outlined all of this beautifully. Trust is no longer soft—it’s infrastructure. Thanks Jane Frankland MBE ✨
Cybersecurity and Data Privacy | Cybersecurity Content Creation and Strategy
2moA bit late in this discussion but here's my bit Jane. I think we lack stories around organizations responsibly and openly sharing actionable intelligence on what went wrong, what worked well, what are the lessons learned for the community at large. Only two stories come to mind: the British Library and the Irish NHS. Both organizations were praised for their transparency. On an individual level, it was Troy Hunt. Now the question is, how can we foster more organizations to come out and speak? How can we demonstrate the ROI of doing so?
Chief Information Security Officer | Chief Information Officer | Consultant | Zero Trust Architect | Digital Transformation | IT/Cloud Infrastructure | Collaborative Servant Leader | Strategic Planner | AI | EQ | Singer
2moJane, thank you for the timely article. "Companies that embed cyber-resilience as a shared value, rather than a competitive edge, lower barriers to trust and exhibit greater openness." The Information sharing that you emphasize in this article should be incorporated into organizations' Incident Response Plans (https://www.linkedin.com/pulse/incident-response-from-chaos-confidence-andrew-aken-phd-cissp-7qckc/) along with the parameters regarding what needs to be shared and in which venues.