
Hacking Digital 2: How to make the CDO role a success
The tenure of a Chief Digital Officer (CDO) is relatively short due to a variety of factors. To avoid costly mistakes, design the role around the four key actions below - but...
by Michael D. Watkins, Ralf Weissbeck Published November 12, 2024 in Brain Circuits • 3 min read
Before you start worrying about how to leverage AI, make sure you have a solid foundation of basic, up-to-date security controls and procedures in place. This includes the required use of multi-factor authentication (MFA), upgrades of software and systems to the latest vendor-supported versions, and rapid implementation of security patches.
AI tools excel in rapidly processing vast amounts of data and detecting patterns but can miss the details or context of certain activities. Humans can bridge this gap with their ability to understand nuance, intuition, and context. The optimal defense mechanism is thus a harmonious fusion of AI and human expertise. In this hybrid model, AI systems manage vast datasets, rapid scans, and initial responses, while human experts oversee these processes, providing essential context, judgment, and decision-making.
In the cyber realm, threats continuously evolve and adapt. To stay a step ahead, it’s not enough to deploy AI tools and then leave them. The tools need to grow and learn continuously. Regularly updating and training AI models with the latest threat intelligence is imperative. By exposing them to new attack patterns, strategies, and vulnerabilities, AI systems can be primed to recognize and counter emerging threats swiftly and effectively.
Cybersecurity isn’t just about building digital walls and alarms. It’s crucial to remember the ethical aspects of using data. You need to establish robust policies that prioritize user privacy, guaranteeing that your AI systems handle data with total confidentiality.
Just as transparency is necessary for other key business processes, it is critical to the successful operation of the cybersecurity function, so make sure that users and stakeholders understand how the organization’s AI tools work and make decisions.
Aligning AI operations with broader ethical considerations ensures that companies don’t compromise on principles while pursuing security.
As cyber threats become more sophisticated through AI, the tools you use to counteract them must also evolve. The good news is that AI is also shaping the future of cybersecurity, offering enhanced capabilities to strengthen company defense mechanisms. But it’s no longer enough to respond to threats as they occur: be proactive, get informed, and stay on the front foot.
Professor of Leadership and Organizational Change at IMD
Michael D Watkins is Professor of Leadership and Organizational Change at IMD, and author of The First 90 Days, Master Your Next Move, Predictable Surprises, and 12 other books on leadership and negotiation. His book, The Six Disciplines of Strategic Thinking, explores how executives can learn to think strategically and lead their organizations into the future. A Thinkers 50-ranked management influencer and recognized expert in his field, his work features in HBR Guides and HBR’s 10 Must Reads on leadership, teams, strategic initiatives, and new managers. Over the past 20 years, he has used his First 90 Days® methodology to help leaders make successful transitions, both in his teaching at IMD, INSEAD, and Harvard Business School, where he gained his PhD in decision sciences, as well as through his private consultancy practice Genesis Advisers. At IMD, he directs the First 90 Days open program for leaders taking on challenging new roles and co-directs the Transition to Business Leadership (TBL) executive program for future enterprise leaders, as well as the Program for Executive Development.
Former Group Chief Information Officer and member of the Executive Committee at The Adecco Group.
Ralf Weissbeck is the former CIO of The Adecco Group. He co-led the recovery of the 2022 Akka Technologies ransomware attack. He also led the recovery of the 2017 Maersk ransomware attack that shut down 49,000 devices and 7000 servers and destroyed 1000 applications.
2 hours ago • by Michael R. Wade, Didier Bonnet, Tomoko Yokoi, Nikolaus Obwegeser in Brain Circuits
The tenure of a Chief Digital Officer (CDO) is relatively short due to a variety of factors. To avoid costly mistakes, design the role around the four key actions below - but...
October 7, 2025 • by Susanne May in Brain Circuits
PE firms are waking up to the fact that all the financial engineering in the world can’t substitute for non-working leadership. Check whether you are investing sufficiently in leadership scalability, and consult...
October 2, 2025 • by Michael R. Wade, Didier Bonnet, Tomoko Yokoi, Nikolaus Obwegeser in Brain Circuits
Credibility is difficult to build and easy to lose for any leader, especially newly appointed digital leaders. Here are some concrete actions and insights that will help you on the journey....
October 1, 2025 • by Howard H. Yu in Brain Circuits
AI’s transformative potential requires more than technical readiness – it demands workforce readiness. Consult the checklist to gauge whether your employees are learning by doing, and follow the three steps to begin...
Explore first person business intelligence from top minds curated for a global executive audience