CISOs Strengthen Resilience Amid Geopolitical Tensions by Focusing on Identity-Centric Security Fundamentals
As geopolitical tensions and operational disruptions reshape the threat landscape in the Middle East, Chief Information Security Officers (CISOs) are facing unprecedented challenges. The pressure to maintain operational resilience in an increasingly uncertain environment is mounting. Mortada Ayad, Vice President of Sales for META at Delinea, emphasizes that identity-centric security has become essential in modern cyber defense. He outlines practical steps that CISOs can take to reduce risk, reinforce access controls, and lead effectively during periods of heightened disruption and evolving cyber threats.
The Current Landscape for CISOs
In the Middle East, CISOs are navigating a complex environment marked by regional tensions and service disruptions. The rapid shift to remote work has stressed business continuity plans, forcing organizations to adapt quickly. Cybercriminals are exploiting these vulnerabilities, with reports of scammers impersonating airline support accounts to target stranded travelers and attempts to access bank accounts. This highlights the urgency for CISOs to safeguard systems and data while maintaining operational resilience.
The challenge for CISOs extends beyond technical aspects; they are also managing personal stress as global events unfold. During such turbulent times, clarity is vital. The most effective strategy is to focus on proven fundamentals rather than succumbing to fearmongering.
Lessons from the Pandemic
The early months of 2020 served as a significant stress test for organizations worldwide. Companies rapidly transitioned entire workforces from traditional office settings to remote environments. This shift exposed weaknesses in conventional security models, which were designed around a defined corporate network perimeter. As employees began accessing systems from various locations, that perimeter effectively disappeared.
This transition accelerated the adoption of a more flexible security model. Organizations started rethinking access management, privilege allocation, and suspicious activity detection. Security strategies increasingly prioritized user identity over physical location, a trend that remains highly relevant today. The key lesson from this period is that resilience now hinges on identity-centric security rather than location-based security.
Identity as the New Perimeter
Periods of disruption create favorable conditions for cybercriminals, as individuals tend to act quickly and verify less. In urgent situations, such as rebooking flights or accessing financial services, messages appearing to come from trusted organizations are more likely to be believed. Social engineering continues to be a primary entry point for attacks, with the goal of obtaining valid credentials. Once attackers gain access to a legitimate identity, they can explore systems, escalate privileges, and move laterally across networks, often indistinguishable from real employees.
For CISOs, this underscores the importance of tightening identity controls rather than chasing every emerging threat. Strong multi-factor authentication (MFA) remains one of the most effective defenses. According to the Microsoft Digital Defense Report, MFA can block over 99% of automated account compromise attacks. However, attackers are adapting their tactics, leading to a rise in “MFA bombing” attacks, where users receive repeated authentication requests until they approve one out of frustration or confusion.
While MFA is crucial, it cannot serve as the sole line of defense. Implementing least-privilege access is equally important, ensuring employees only have access to the systems necessary for their roles. During disruptions, organizations may grant broader permissions to maintain operations, a tendency that attackers exploit.
Another effective control is the elimination of standing administrative privileges wherever feasible. Organizations can adopt a just-in-time access model, granting elevated access only when necessary and for a limited duration. This approach significantly reduces the potential impact if an account is compromised.
Immediate Steps for Enhanced Defense
While identity security forms the backbone of resilience, several practical measures can deliver immediate benefits. Employee awareness remains a critical first layer of defense. Even well-trained professionals can make mistakes under pressure, especially when attackers exploit urgency and fear. Regular reminders about brand impersonation can help prevent many attacks from gaining traction. Organizations should encourage employees and customers to verify official communication channels before sharing credentials or personal information.
Clear communication with leadership is also essential. During turbulent times, boards often look to CISOs for reassurance. They require calm, evidence-based updates rather than dramatic forecasts. Security leaders who frame discussions around operational resilience help boards understand the direct connection between cybersecurity and business continuity. Transparency about monitoring efforts and hardened defenses fosters confidence during uncertain times.
Navigating a Noisy Threat Landscape
It is easy to assume that geopolitical escalations or technological advancements are creating entirely new forms of cyber risk. However, most attacks still rely on established methods such as phishing, credential theft, privilege escalation, and lateral movement. The core techniques remain unchanged; what varies during periods of disruption is the intensity of these threats.
For CISOs across the Gulf Cooperation Council (GCC), the most effective response is to resist the urge to chase every emerging threat narrative. Instead, they should focus on controls that consistently reduce risk. Strengthening identity security, tightening privileged access, monitoring unusual behavior, and reinforcing employee awareness can deliver immediate defensive value, often leveraging existing capabilities. In uncertain times, steady leadership and disciplined execution of these fundamentals provide the strongest foundation for cyber resilience.
Source: www.intelligentciso.com
Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.


