When companies believe they can start a security program by hiring a few security engineers, they confuse motion with progress.
This anti-pattern describes organizations that try to establish cybersecurity by hiring one or two security practitioners — often engineers or architects — while deliberately postponing or avoiding proper security leadership.
The underlying assumption is simple and widespread:
"Let's get some security experts in first. We can figure out leadership and structure later. They will bring enough for what we need right now if we focus on seniors."
In reality, this reverses cause and effect.
Cybersecurity execution without cybersecurity leadership does not create momentum — it creates drift.
This anti-pattern is rarely driven by negligence. It is driven by a misunderstanding of how working security programs actually emerge.
Typical drivers include:
What gets underestimated is that technical expertise — no matter how senior — does not automatically translate into the ability to define priorities across the business, balance competing risks, structure a long-term security program, or communicate trade-offs to executives. These are not extensions of technical skill. They are a different discipline.
Without CISO-leadership, domain expertise has no organizing principle.
The most obvious symptom. There is no CISO in place, no concrete plan to hire one, and often a strong belief that "someone else" can provide the initial security leadership — based on intuition, previous job experience, or general seniority. Security is implicitly treated as manageable without dedicated leadership, confidently underestimating its complexity.
Early security hires are selected by "senior tech leaders" or HR without cybersecurity leadership expertise. Decisions are based on gut feeling, familiar profiles, buzzwords, ChatGPT, or past exposure ("this worked at my last company"). The assumption is that describing current problems to candidates will naturally produce the right strategic outcomes — even though the evaluators themselves lack the framework to assess what "right" actually means.
Security practitioners are hired and immediately start working. Tools are introduced, initiatives launch, and early wins may even appear. But without an articulated security strategy, operating model, or long-term roadmap, activity replaces alignment. Over time, it becomes increasingly unclear what is being worked on, why it matters, how decisions are made, or whether the organization is actually becoming safer.
Security engineers are implicitly expected to define strategy, prioritize risks, justify investments, and align stakeholders. They operate far outside their mandate and authority, leading to frustration, role confusion, and slow or stalled progress.
A recent incident suddenly defines the entire security agenda. A single event — often unrepresentative — ends up steering long-term hiring and investment decisions, as if it captured the full risk landscape of the company. All of a sudden, phishing becomes the biggest threat. Or ransomware. Or lack of MFA. Or customer data access. Or third-party integrations — each, at different times, treated as the defining security challenge.
Over time, senior leaders start to feel that security lacks structure, coherence, and clear ownership. Questions around priorities, progress, and accountability become harder to answer. Communication feels fragmented. Eventually, the realization emerges — often implicitly — that the organization needs more system, clearer leadership, and someone to own the problem end to end.
Security activity increases, but protection does not. Initiatives, tools, and controls accumulate without forming a coherent system. Activity is repeatedly mistaken for progress — and over time, the organization assumes it must be secure simply because "so much has already been done."
Salaries are paid, tools are bought, licenses renewed, consultants engaged. The longer this continues, the harder it becomes to question effectiveness. Security spend itself becomes the justification for security confidence — even when no one can clearly explain how risk is actually being reduced.
As months and years pass, the existence of a small security team and visible activity creates institutional belief: "We've had security for a while now." This makes course correction increasingly difficult. When incidents happen, they feel surprising — not because they were unpredictable, but because the organization confused effort with outcome.
Escaping this anti-pattern requires resisting the urge to "just start hiring".
It requires establishing security leadership before scaling execution.
In some organizations, this means hiring a CISO earlier than planned.
In others, it means pausing execution until leadership is in place.
Both are leadership decisions.
Hiring security practitioners without leadership doesn't accelerate security — it institutionalizes delay.