Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Trust, friction, and ROI: A CISO’s take on making security work for the business
    Cybersecurity

    Trust, friction, and ROI: A CISO’s take on making security work for the business

    adminBy adminApril 2, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Trust, friction, and ROI: A CISO's take on making security work for the business
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In this Help Net Security interview, John O’Rourke, CISO at PPG, talks about what it means for security to drive business value. He explains how mature security programs reduce friction in sales cycles and M&A processes, and how trust is built over time.

    O’Rourke also addresses how buyer sophistication has raised the bar for suppliers, why less-regulated industries lag behind their more-regulated counterparts, and which companies will benefit from foundational security investments. The interview covers five questions on cybersecurity strategy, ROI, and the cost of deferring security work.

    security as business strategy

    “Security as a revenue enabler” risks becoming the next hollow buzzword. What is the concrete, measurable version of that idea, and what is the watered-down version executives should be skeptical of?

    The measurable version of “security as a revenue enabler” is when security removes friction from growth in ways you can track. For example, faster due diligence cycles in mergers and acquisitions (M&A) and sales cycles when customers are purchasing your product. At PPG, we have built a cross functional framework and team for M&A with a heavy focus on cybersecurity. This allows us to assess potential companies utilizing a repeatable framework for integration while reducing the cybersecurity risk.

    In general, a mature cybersecurity program has standard documentation and processes which will allow responses and controls with minimal effort. This leads to reduced time to close or fewer stalled sales deals. There are several available frameworks that cyber organizations should be measuring themselves against, such as the National Institute of Standard and Technology (NIST) and certifications from International Standards Organization (ISO), Systems and Organizations Controls (SOC2), or if you are in a regulated industry, Cyber Maturity Model Certification (CMMC).

    Security is not “creating revenue” directly, however, investment in this area prevents security from being responsible for delayed or lost revenue. A few examples of how security reduces friction within PPG include automated joiner and leaver processes, increased self service access with appropriate guardrails within identity and access management, and improved audit readiness that enables business initiatives to move forward without delay.

    How do you quantify trust? Security teams are often asked to prove ROI, but the value of not losing a customer’s confidence is notoriously hard to put in a spreadsheet. What frameworks work?

    Across teams and especially in the cybersecurity space, trust is definitely not tracked in a spreadsheet and not defined by a “checkbox.” It takes a lot more effort to build trust than it takes to lose trust. Whether utilizing an official framework or not, there are ways to look at translating specific events into probable financial loss or downtime affecting the revenue or reputation of a company. Ultimately, ROI is minimizing the extent of these events, allowing the company to make revenue uninterrupted and continuing to build trust.

    Buyers are more sophisticated about security than they were five years ago. How has that changed the conversation, and are there ways it has made the sales process harder rather than easier?

    From a security organization perspective, this question is best viewed through two lenses. First, security vendors continuously introduce new features, acquire new capabilities, and rebrand solutions. This ongoing consolidation and expansion often result in shifting terminology and overlapping functionality. As a result, purchasing decisions cannot be treated as point solutions. Each investment requires a rigorous review of architecture alignment, operational processes, and governance implications. Tools must be deeply validated to ensure they deliver the intended functionality, integrate cleanly across the enterprise, and provide coverage without introducing unnecessary complexity or risk.

    Second, from a customer point of view, interest in a supplier’s cybersecurity governance has gained more interest through assessments and questionnaires. Cybersecurity questionnaires from customers are more common than ever and can be extensive.

    PPG wants to protect our supply chain and therefore has the same interest in our vendor’s cybersecurity posture. The upside is that the maturity and awareness of cybersecurity is progressing amongst the private sector, however the industry must move towards some sort of standardization in program assessments. Program maturity does not always equal guaranteed protection, but a program with real operational maturity will stand out among customers and will help reduce exposure.

    Industries like fintech, healthtech, and defense contracting have always treated security as a licensing requirement. Are there lessons from those sectors that less-regulated industries are still failing to apply?

    Industries that are more regulated often have certifications or requirements that must be met to operate. These certifications or requirements lead to baseline controls being implemented with reviews that validate the implementation of the controls. Less regulated sectors often defer security until after revenue growth, which leads to fragile architectures, identity sprawl and technical debt that becomes prohibitively expensive to unwind later.

    Threat actors are opportunistic and don’t discriminate by sector, therefore cybersecurity maturity between industries is not sustainable. Security controls and architecture must be considered as early as possible during enterprise architecture discussions. Security programs must align themselves to frameworks where they can consistently assess and validate their program.

    Five years from now, which companies will look back and recognize that their investment in security was one of the smartest growth decisions they made, and which ones will have treated it as a cost center and paid for it?

    Companies that have invested heavily in foundational security are better positioned to embrace and adjust to the technological landscapes, enabling business continuity while maintaining consistent levels of protection. These organizations invest not only in protections, but they understand the importance of digital trust for growth initiatives.

    Companies treating security as a “cost center” are the ones that are doing just enough to pass audits, deferring foundational work and not establishing an adaptable cyber program. These organizations will face significant incident recovery times, increased expense from regulatory exposures, reduction of trust and increased friction. As AI continues to evolve, the companies that have invested in foundational controls will be in a better position to enable AI with reduced friction and less security investment. Those that did not will find themselves spending more, moving slower and exposing themselves to higher risk.

    Business CISOs friction making ROI Security Trust Work
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThis 10-port docking station dropped from $150 to $25, making it the perfect time to upgrade your workspace
    Next Article Tokenomics: Why IT leaders need to pay attention to AI tokens
    admin
    • Website

    Related Posts

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Search Ad Growth Slows As Social & Video Gain Faster

    April 16, 2026

    I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (824)
    • Tech Tools & Mobile / Apps (1,608)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Search Ad Growth Slows As Social & Video Gain Faster

    April 16, 2026

    I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything

    April 16, 2026
    Most Popular
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    • I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything
    • Cisco says critical Webex Services flaw requires customer action
    • This one chart exposes how far Pixel has fallen behind in mobile gaming
    • NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software
    • Google AI director outlines new content playbook
    • This 55-Inch LG OLED TV Is Nearly Half Off Right Now
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.