News

Forbes: How Companies Can Improve Security Without More Vendor Support

As cybersecurity talent shortages persist, many organizations are bolstering their defenses with unified identity strategies and managed detection and response services. These external partnerships can help ease staffing gaps and accelerate threat detection, but they also create a risk of overreliance when internal teams lose visibility or control. Strengthening long-term resilience requires leaders to rethink how much of their security strategy can be delegated and how much must remain inside the organization.

Sustainable cybersecurity depends on more than tools or vendor expertise—it calls for stronger internal muscle, clearer accountability and intentional investment in people, processes and architecture. Below, members of Forbes Technology Council highlight strategic shifts that can help organizations build security from within and avoid placing mission-critical defenses entirely in the hands of outside partners.

Adopt A Zero-Trust Framework

As a SASE vendor, we advise businesses to adopt a zero-trust framework that integrates identity, network and cloud security into a unified architecture. This reduces vendor dependency by consolidating controls, automating threat response and enabling in-house teams to manage security holistically. – Etay Maor, Cato Networks

Champion A ‘Security-First’ Culture

Leaders must champion a companywide “security-first” culture. This strategic shift moves accountability from a siloed IT team or external vendor to every employee. It involves embedding security awareness and responsibility into all roles and processes, from product development (shifting security left) to finance and HR. This approach makes security a shared business enabler. – Priyadarshni Natarajan, Walmart

Maintain Ownership Of Core Risk Decisions

Organizations can outsource security activity, but they cannot outsource full context or liability. Third-party partners can execute on your defense strategy, but the organization has to maintain ownership of the “what,” “why” and “how” of risk. Organizations need to maintain ownership of their core decision-making while carefully selecting and curating partners to help them execute. – John Linkous, Phalanx Security

Embed Cyber Thinking Across All Departments

Stop treating cybersecurity as a tool to be bought. Instead, treat it as a muscle you build. Leaders should embed cyber thinking into every team, not just IT. Invest in internal threat simulations, cross-train analysts in business teams, and reward secure decision-making. This builds resilience that no external vendor alone can provide. – Rahul Wankhede, Humana

Upskill Teams And Align Defenses To Your Risk Profile

Business leaders should prioritize building in-house cybersecurity capabilities by upskilling teams, implementing zero-trust architectures and embedding security into every business process. This approach reduces dependency on external vendors while creating resilient, proactive defenses aligned with the organization’s unique risk profile. – Balasubramani Murugesan, Digit7

Assess Exploitability And Impact With Ground-Truth Data

Use your own ground-truth data (IdP, EDR, cloud, CI/CD) to score exploitability and impact per asset and user in near-real time, then drive detections, access and response off those scores. Vendors (IdP, EDR, MDR) become interchangeable sensors and actuators that feed and follow your model. The result is vendor-portable decisions, higher signal-to-noise, and faster, auditable risk reduction. – Michael Roytman, Empirical Security

Invest In Continuous Data Activity Monitoring

Many organizations are missing the continuous data activity monitoring element of their security strategy. AI is becoming the new insider threat. However, an ongoing monitoring solution can detect anomalies—whether malicious or simple mistakes—quickly and protect organizations, no matter who is accessing their data, including inside and outside users or AI agents. – Todd Moore, Thales Group

Automate Repetitive Tasks To Elevate Cybersecurity Work

Business leaders should work with their department heads to identify the repetitive tasks that could be automated to increase efficiency. Automation isn’t about replacing developers or security analysts. Instead, it’s about freeing up time from mundane, routine work to allocate to strategic, higher-value thinking in the realms of cybersecurity, finance, marketing and R&D. – Matthew Polega, Mark43

Make Your Data Unusable If Breached

Shift from perimeter defense to making data itself unusable if breached. Encryption alone won’t cut it—quantum computing will easily crack today’s encryption. Fragment and scatter data across multiple locations instead. Even if your systems are breached, attackers get meaningless fragments with no way to reconstruct anything. It’s architectural resilience that doesn’t depend on vendors staying one step ahead. – Greg Salvato, TouchPoint One

Build Cross-Functional ‘Cyber Fusion’ Teams

Shift from outsourced defense to shared accountability. Build internal “cyber fusion” teams where security, IT and business units co-own risk decisions. External MDRs are force multipliers, but resilience comes when every employee becomes part of the detection fabric. – Sai Krishna Manohar Cheemakurthi, U.S. Bank

Shift To Orchestrating Trust And Shared Responsibility

Leaders should shift from outsourcing security to orchestrating trust. Instead of buying more tools or services, build a culture where every team treats identity and detection as shared responsibilities. When employees become the first layer of defense and technology becomes the enabler, security transforms from a vendor-delivered service into an organizationwide instinct. – Nishant Sonkar, Cisco

Build Internal Security Context And Control With AI

Business leaders should shift from outsourcing detection to building internal context and control. External vendors can monitor threats, but only the organization understands its unique people, processes and risk signals. Investing in AI that learns internal communication and behavior patterns strengthens defenses from within, turning identity, not infrastructure, into the new security perimeter. – Mike Britton, Abnormal AI

View Compliance As A Lever For Zero-Trust Architecture

It’s a mindset shift: Stop viewing compliance mandates as painful checklists or tasks to simply outsource. Instead, see them as strategic levers to fund and advance your internal zero-trust architecture. The technical controls in frameworks like CMMC are the very building blocks of ZTA. Architecting this way builds true organizational resilience and strengthens your overall security posture. – Neil Lampton, TIAG

Assume Every Endpoint Is Compromised

Adopt a “breached-by-default” design. Assume every endpoint and vendor token is compromised and implement least privilege with short TTLs, identity rate limits, per-app kill-switches and blast-radius SLOs (contained in under 15 minutes). Build a tiny resilience engineering team and use MDR to audit, not defend. – Margarita Simonova, ILoveMyQA

Take Full Advantage Of Native Platform Security Features

Modern organizations leveraging cloud platforms such as AWS, GCP or Azure should be aware of the foundational security capabilities that are already integrated into these environments. The strategic shift that leaders should make is to fully utilize and configure these native security features before engaging additional third-party tools or vendors. – Metin Kortak, Rhymetec

Create Cyber Resilience Hubs To Train Teams

Business leaders should create cyber resilience hubs that unite internal expertise, automation and shared intelligence frameworks. Training teams in AI-driven detection, threat simulation and response builds lasting in-house capabilities. This reduces vendor dependency while fostering a culture of proactive defense and continuous improvement. – Nicola Sfondrini, PWC

Invest In Internal Threat Modeling

It is critical for enterprises to identify vulnerabilities during system design rather than treating security as an afterthought. While relying on vendors can be beneficial for their research capabilities, 100% dependence is not recommended. I suggest investing in building internal threat modeling expertise to ensure better alignment with your enterprise-specific architecture. – Vasanth Mudavatu, Dell Technologies

Empower Teams To Build More Resilient Systems

Put money into making your systems more resilient against cyberattacks, not just protecting them. Give your internal teams the tools they need to do threat modeling, automate response playbooks and build zero-trust principles into the design of your products. External MDRs can help with capacity, but the best way to stay safe is to build up your own intelligence and keep learning. – Jyoti Shah, ADP

Establish An In-House Cyber Storytelling Council

Replace outsourced alerting with in-house narrative. Establish a cyber storytelling council—security engineers, data analysts and HR—to translate incidents into business lessons within hours. Each story updates policy, training and design patterns. Turning breaches into cultural code creates adaptive immunity that vendors can’t replicate, making security a living discipline rather than a rented service. – Jagadish Gokavarapu, Wissen Infotech

Original Story: https://www.forbes.com/councils/forbestechcouncil/2025/12/08/how-companies-can-improve-security-without-more-vendor-support/