{"id":358844,"date":"2025-09-04T14:36:10","date_gmt":"2025-09-04T09:06:10","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=358844"},"modified":"2025-09-04T14:36:10","modified_gmt":"2025-09-04T09:06:10","slug":"chros-must-shift-to-a-more-active-role-in-making-cyber-resilience-a-foundational-priority","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/chros-must-shift-to-a-more-active-role-in-making-cyber-resilience-a-foundational-priority\/","title":{"rendered":"CHROs Must Shift to a More Active Role in Making Cyber Resilience a Foundational Priority"},"content":{"rendered":"<div class=\"globalsite cmp-globalsite-columncontrol aem-GridColumn aem-GridColumn--default--12\">\n<section class=\"column-control  grid-norm no-top-bottom \">\n<div class=\"row       xs-flex-direction-column sm-flex-direction-column\">\n<div class=\"col-lg-9 col-md-8 col-sm-12 col-xs-12 \">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"globalsite cmp-globalsite-heading aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"grid-norm  rmg-t32 mg-b16 margin-top-bottom\">\n<p class=\"h2 default headingRuleDefault\"><strong><span style=\"font-family: georgia, palatino, serif; font-size: 14pt;\">Gartner Identifies Four Actions for CHROs to Strengthen Digital Security<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm  margin-top-bottom mg-t16\"><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">As more HR functions implement <\/span>AI and automated technologies<span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">, security incidents are becoming more common and harmful, so CHROs must take steps to strengthen digital security, according to Gartner, Inc., a business and technology insights company.<\/span><\/p>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"globalsite cmp-globalsite-columncontrol aem-GridColumn aem-GridColumn--default--12\">\n<section class=\"column-control  grid-norm no-top-bottom \">\n<div class=\"row       xs-flex-direction-column sm-flex-direction-column\">\n<div class=\"col-lg-9 col-md-8 col-sm-12 col-xs-12 \">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm  margin-top-bottom mg-t16 rmg-b32\"><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">\u201cWith organizations opting for more automation within their HR systems to contain HR costs, cyber resilience and protection of sensitive personal data across the entire talent life cycle must become foundational priorities,\u201d said\u00a0<strong>Emi Chiba, Senior Principal Analyst in the\u00a0Gartner HR Practice.<\/strong> \u201cFor example, a candidate data breach that compromises personally identifiable\u00a0information (PII) creates legal risk, negatively impacts employer brand and diminishes employee trust in an AI-supported hiring process.\u201d<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Gartner has identified four actions for CHROs to take that will help strengthen data protection and\u00a0build trust\u00a0in automated HR systems.<\/span><\/p>\n<\/article>\n<\/div>\n<div class=\"globalsite cmp-globalsite-heading aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"grid-norm  rmg-t32 mg-b16 margin-top-bottom\">\n<h3 class=\"h4 default headingRuleDefault\"><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Make Cyber and Data Security a Strategic Imperative in HR Automation<\/span><\/strong><\/h3>\n<\/div>\n<\/div>\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm  margin-top-bottom mg-t16 rmg-b32\"><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">\u201cCHROs often take more of a passive role in making technology investment decisions, however when data breaches occur, there are massive implications on talent, including the risk to the employment brand and IP theft,\u201d said Chiba. \u201cMany CHROs do not have strong digital awareness and are struggling to lead and influence AI and digital transformation.\u201d<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">To excel as digitally effective CHROs in this era of HR automation, it\u2019s imperative that they view technology not just as an enabler but embed it into their strategy and execution. This requires CHROs to strengthen their digital and cyber fluency, engage proactively with IT leaders, and embed security considerations into every phase of HR technology planning to safeguard talent and organizational reputation.\u00a0<\/span><\/p>\n<\/article>\n<\/div>\n<div class=\"globalsite cmp-globalsite-heading aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"grid-norm  rmg-t32 mg-b16 margin-top-bottom\">\n<h3 class=\"h4 default headingRuleDefault\"><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Partner With Identity and Access Management Teams to Identify and Audit Threats Proactively<\/span><\/strong><\/h3>\n<\/div>\n<\/div>\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm  margin-top-bottom mg-t16 rmg-b32\"><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">According to a May 2025 Gartner survey of 300 cybersecurity leaders, only 43% of companies conduct regular audits and reviews on public\u00a0generative AI (GenAI)\u00a0tools to ensure compliance with cybersecurity policies.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">To increase cyber resilience, CHROs must work with IT, cybersecurity, and vendor management leaders to build security into their organization\u2019s systems and monitor them regularly. CHROs should collaborate with IT leaders to adopt security architecture practices. This includes working together to define the business needs and reviewing existing and planned product security capabilities.<\/span><\/p>\n<\/article>\n<\/div>\n<div class=\"globalsite cmp-globalsite-heading aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"grid-norm  rmg-t32 mg-b16 margin-top-bottom\">\n<h3 class=\"h4 default headingRuleDefault\"><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Establish Comprehensive Third-Party Risk Management for HR Technology<\/span><\/strong><\/h3>\n<\/div>\n<\/div>\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm  margin-top-bottom mg-t16 rmg-b32\"><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">\u201cSecurity incidents, such as a candidate data breach, underscore the importance of a strong partnership between IT and HR when outsourcing HR tasks to a third-party vendor,\u201d said Chiba.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">CHROs must play an active role in establishing and operationalizing ongoing third-party risk management. To do this, CHROs must not only closely partner with IT leaders, but also procurement and legal teams to assess vendor security postures, review audit reports, and ensure that data-handling practices meet enterprise standards.\u00a0<\/span><\/p>\n<\/article>\n<\/div>\n<div class=\"globalsite cmp-globalsite-heading aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"grid-norm  rmg-t32 mg-b16 margin-top-bottom\">\n<h3 class=\"h4 default headingRuleDefault\"><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Strengthen Culture to Promote Security<\/span><\/strong><\/h3>\n<\/div>\n<\/div>\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm  margin-top-bottom mg-t16 rmg-b32\"><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">A data breach may signal deeper issues within the organization, beyond just weak technical controls. While security reviews can often feel like a barrier to speed, they need to be viewed as an essential checkpoint.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">CHROs need to foster a culture where raising security flags and taking the time to slow down and assess risks is encouraged and not seen as a bottleneck. A key factor in fostering this culture is creating psychological safety amongst employees; employees who feel psychologically safe are more capable of communicating candidly about anticipated issues and solving problems creatively.<\/span><\/p>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Gartner Identifies Four Actions for CHROs to Strengthen Digital Security As more HR functions implement AI and automated technologies, security incidents are becoming more common and harmful, so CHROs must take steps to strengthen digital security, according to Gartner, Inc., a business and technology insights company. \u201cWith organizations opting for more automation within their HR [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14083],"tags":[],"class_list":{"0":"post-358844","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-technology-industry-news"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/358844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=358844"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/358844\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=358844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=358844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=358844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}