* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/) * When are CEOs Going to Re... # When are CEOs Going to Rebuke Cybersecurity's Failure to Protect? [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2014%2F09%2Fceos-going-rebuke-cybersecuritys-failure-protect%2F) [](https://twitter.com/share?text=When+are+CEOs+Going+to+Rebuke+Cybersecurity%E2%80%99s+Failure+to+Protect%3F&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2014%2F09%2Fceos-going-rebuke-cybersecuritys-failure-protect%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2014%2F09%2Fceos-going-rebuke-cybersecuritys-failure-protect%2F&title=When+are+CEOs+Going+to+Rebuke+Cybersecurity%E2%80%99s+Failure+to+Protect%3F&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2014/09/ceos-going-rebuke-cybersecuritys-failure-protect/&ts=markdown) \[\](mailto:?subject=When are CEOs Going to Rebuke Cybersecurity’s Failure to Protect?) Link copied By [Tim Treat](https://www.paloaltonetworks.com/blog/author/tim-treat/?ts=markdown "Posts by Tim Treat") Sep 23, 2014 3 minutes [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [C-Suite](https://www.paloaltonetworks.com/blog/tag/c-suite/?ts=markdown) [enterprise security platform](https://www.paloaltonetworks.com/blog/tag/enterprise-security-platform/?ts=markdown) A revolution is in the air. The cybersecurity community and leaders continue to bicker about compliance, certifications and reactive "magical analytics" that do little more than provide a false sense of security. Yet, CEOs and business leaders get to take on all the risk and accountability when they finally learn about an intrusion. Fingers point all directions as failures hit the news and "Monday morning quarterbacks" fault everyone except the cybersecurity community. With all the finger pointing, I think one thing sometimes gets lost in the shuffle: why aren't C-level executives demanding more from the cybersecurity technology community? Today, legacy and stagnant vendors continue to propagate an idea that 15-year-old technology provides protection. With every new breach and headline, will we finally see CEOs push back and demand a modern layered approach that renews cybersecurity's responsibility to prevent intrusions? Today, each time an intrusion happens, the cybersecurity community points to the compromised company or organization saying they neglected to follow some standard or measure of compliance.. But since all the risk and accountability resides on the shoulders of CEOs and executives, they should get more involved in the decisions their organization is making concerning protection and demand more from the cybersecurity industry. [We've talked a lot about how cybersecurity finally gets a seat at the boardroom table](https://www.paloaltonetworks.com/blog/2014/01/security-budgets-get-c-suites-attention/?ts=markdown), but in many cases, this type of C-level feedback is only starting to happen. As an example, network operations and security operations funding lines remain disjointed in ways that help the attackers. There are any number of reasons for disjointed funding, and your team will spend precious resources and time trying to force integration of your IT operations and security portfolio. But those line-by-line budget battles often mean they spend less time protecting your organization and more time trying to connect complex pieces together. With everyone rushing to get budgets approved, what ends up happening is plans come together to purchase new firewalls or any number of "best of breed" appliances that check a box for compliance. Unfortunately, this approach is a fool's game, and in that rush to budget, leaders continue to listen to "best of breed," "flavors" and "trends" that only feed [a self-licking ice cream cone](https://www.paloaltonetworks.com/blog/2014/08/transforming-cybersecurity-expensive-self-licking-ice-cream-cone/?ts=markdown) approach to cybersecurity. Give Palo Alto Networks a chance, and we will deliver results. Our Enterprise Security Platform is modern and has the [innovative pivots](https://www.paloaltonetworks.com/blog/2014/09/learn-protecting-artificially-intelligent-cars/?ts=markdown) that change the game for protecting an enterprise. The capabilities we include out-of-the-box provide your team unmatched visibility and control that improves security. All we ask for is an evaluation opportunity on your network. Our platform is agile and flexible -- we can perform a proof-of-concept in your organization without affecting business continuity. The proof-of-concept costs you nothing but time. Yet, it provides a glimpse into a new generation of capabilities that will help converge disjointed network operations and security operations teams. Through it, your team will: * Realize unprecedented cohesion, agility and control that provide better protection and support to business lines. * See how our platform reduces dangerous blind spots where attackers dwell. * See how our platform extends protection and visibility across all network traffic, cloud infrastructure, endpoints, data centers and mobile devices. There is a reason we are the fastest growing cybersecurity company in history and we want to build a relationship with CEOs, CFOs, business line executives, CIOs, CISOs, Network Operations Directors, Security Operations Directors, Incident Response Directors, Intelligence Directors, Managers, Administrators and Analysts. We know what is at stake and our approach will empower your people. Fill out a sales contact request form [here](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) and see what's possible. *** ** * ** *** ## Related Blogs ### [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### CISOs Must Incorporate Regional Laws and Regulations into Cyber Strategy](https://www.paloaltonetworks.com/blog/2018/06/cisos-must-incorporate-regional-laws-regulations-cyber-strategy/) ### [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### CISOs Must Address the Cybersecurity Skills Gap and Increase Cyber Awareness](https://www.paloaltonetworks.com/blog/2018/06/cisos-must-address-cybersecurity-skills-gap-increase-cyber-awareness/) ### [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### CISOs Must Embrace the DevOps Philosophy](https://www.paloaltonetworks.com/blog/2018/05/cisos-must-embrace-embrace-devops-philosophy/) ### [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [#### Building Strategies to Make Sure Cybersecurity Is Everybody's Business](https://www.paloaltonetworks.com/blog/2016/07/cso-building-strategies-to-make-sure-cybersecurity-is-everybodys-business/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [CIO/CISO](https://www.paloaltonetworks.com/blog/category/ciociso/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### A CIO's First Principles Reference Guide for Securing AI by Design](https://www.paloaltonetworks.com/blog/2025/11/cios-first-principles-reference-guide-securing-ai-design/) ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) [#### AI, Quantum Computing and Other Emerging Risks](https://www.paloaltonetworks.com/blog/2025/10/ai-quantum-computing-emerging-risks/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language