Managing Across: Turning Trust Into Momentum

Joanna McDaniel Burkey
April 7, 2026

In the first two articles in this series, we explored the role of internal influencers in shaping cybersecurity outcomes. First, we examined how to identify the people across the enterprise who quietly influence execution and decision-making. Then we discussed how trust with those stakeholders must be built intentionally and patiently, long before it is needed.

The natural question that follows is what becomes possible once those relationships are in place?

For CISOs, trusted relationships are not simply a matter of goodwill or internal networking. They create something much more valuable: visibility, context, and awareness across the organization. Security leaders often talk about the importance of threat intelligence. Trusted relationships create something just as valuable—organizational intelligence.

Organizational intelligence enables CISOs to identify risks earlier, understand operational realities more clearly, and align cybersecurity strategy with the broader enterprise goals.

Relationships Create Early Visibility

One of the most practical benefits of trusted relationships is time. Internal influencers are often aware of upcoming initiatives long before they become formal projects. A product leader may be considering a new feature that involves sensitive customer data. An engineering team may be planning a platform shift in architecture. A business unit might be exploring a new vendor, market expansion, or platform migration.

When cybersecurity learns about these developments only after they are formally announced, the options available to security teams are often limited. Controls must be added quickly, concerns raised late, and the security organization may be perceived as slowing down decisions that have already been made.

Trusted relationships change this dynamic. When internal influencers feel comfortable sharing what they are hearing and seeing, CISOs gain early visibility into changes that may affect risk posture. This allows security teams to participate earlier in solution design, rather than reacting after the fact. This is where the “yes and…” conversations happen, rather than the late-stage “no”.

Early visibility does not just improve security outcomes; it also enhances overall organizational performance. It also helps the broader organization move faster and more confidently.

Influencers Surface Hidden Friction

Relationships also do more than reveal upcoming initiatives. They can provide insight into how the security program itself is experienced across the enterprise.

Even the most thoughtfully designed security controls can create friction in practice. Tools may be technically compliant but difficult to use; processes may unintentionally slow teams down as they deliver products or services. Employees may develop informal workarounds when official processes feel too cumbersome, leading to the dreaded “intentional but non-malicious” insider threat.

These signals are rarely visible through dashboards or formal reporting structures. They tend to surface only through conversations with the people closest to the work. Trusted influencers provide this perspective. They can explain where controls create unnecessary friction, where policies are misunderstood, or where security tools are not being adopted as intended.

For CISOs, this feedback is invaluable. It creates opportunities to refine controls, improve usability, and strengthen the security program without lowering standards. A security program is most effective when it reflects how work actually happens across the enterprise, not just how processes are designed on paper.

Alignment Opportunities Appear in Unexpected Places

Strong relationships also help CISOs see where cybersecurity and business priorities naturally intersect.

In many organizations, security is often framed primarily in terms of risk reduction or compliance. While these are important objectives, trusted relationships often reveal opportunities where cybersecurity can directly support other business goals.

With the still-growing awareness of cybersecurity as a general risk across the global business economy, it’s now more common for enterprises to face challenges where the CISO can be part of the solution. For example, a product leader may seek ways to strengthen customer trust. A sales organization may need stronger security credibility when pursuing enterprise customers. Engineering leaders may be seeking safer ways to deploy code and manage production environments. When CISOs have relationships across these functions, they can proactively identify moments of alignment and bring the necessary help to the table. Security becomes not just a set of requirements to manage, but a capability that helps other leaders solve real problems.

Imagine a scenario where a product is close to beta, and the cybersecurity team learns about risky design decisions made in the deployment architecture. Pushing the beta back due to “internal cybersecurity process concerns” doesn’t have nearly the positive impact as “we can help this product be something more resilient and reliable for the customer”. This reframing changes the conversation. Cybersecurity moves from being something the organization must accommodate to something that actively supports the success of the business.

Relationships Strengthen Strategic Awareness

Organizations rarely remain static. Over time, strategies shift, markets evolve, and leadership priorities change. This results in the emergence of new product lines, reorganized teams, new geographies, potential acquisitions… all enterprise-level shifts that can be incredibly disruptive to established ways of working.

Trusted internal influencers often see these developments earlier than most. They hear about proposed changes in early discussions, long before those changes appear in formal plans. For CISOs, this awareness is extremely valuable. It enables security leaders to adjust priorities, anticipate emerging risks, and implement controls that align with the organization’s evolving strategy.

In this sense, trusted relationships act as a distributed sensor network across the enterprise. They provide ongoing insight into how the organization is changing and where security attention may soon be required. This is the essence of organizational intelligence.

Trust Creates Momentum Inside Teams

Finally, trusted relationships create something that no security policy can mandate: momentum.

When internal influencers understand the purpose of security initiatives and trust the security organization’s intent, they often become informal advocates within their teams. They explain why certain controls matter and help their colleagues navigate new processes. They reinforce the importance of security practices through their own behavior.

This kind of reinforcement carries far beyond the CISO’s direct reach. Security becomes part of how teams think about building products, serving customers, and managing risk.

Momentum of this kind cannot be forced. It emerges when people trust both the goals and the judgment of the security organization. And while it cannot be forced, once this type of momentum is present, it enables a degree of impact across the enterprise that would have previously been unimaginable. No longer is the security strategy reach limited by the size of the cybersecurity organization, but instead that reach magnifies across the full enterprise surface.

Organizational Intelligence as a Security Capability

Across this series, we have explored three related ideas. First, CISOs must learn to identify the internal influencers who shape outcomes across the enterprise. Second, they must invest in building trust with those stakeholders long before urgent decisions arise. And finally, they must learn how to translate those relationships into stronger security outcomes.

Controls, technologies, and policies will always remain essential components of cybersecurity. But the effectiveness of those tools ultimately depends on how well they are understood, supported, and implemented across the organization.

The most effective CISOs, therefore, cultivate two complementary forms of awareness. They invest in threat intelligence to understand the external risks facing their organization. And they cultivate organizational intelligence through trusted relationships that reveal how the enterprise actually operates. 

Together, these two forms of insight allow security leaders to make better decisions, move earlier, and build cybersecurity programs that are both resilient and effective.