Authority vs Influence: Why Cyber Leaders Need Both, and Why Authority Matters More
- Kirk M. Anderson, MBA, CISSP, CISM, PMP

- Nov 7
- 6 min read

Influence without authority isn't leadership. It's lobbying. And when a breach hits at 2 AM, you can't lobby a compromised system back to safety.
Yet across cybersecurity, a dangerous myth persists: that CISOs should focus on influence over authority, on persuasion over mandate. It sounds progressive. It's actually a trap that leaves cyber leaders exposed, accountable without power, and responsible without resources.
Here's the truth that needs saying: what many cyber leaders call "influence" is actually just input. And input can be ignored.
The Illusion of Influence
Let's be precise about terms, because the confusion here is costly:
Input means you provide facts, recommendations, and scenarios. You're consulted. You attend meetings. You present to the board or executive leadership.
Authority means you can make decisions, allocate budget, enforce controls, and escalate with binding effect.
Influence means your input consistently shapes or determines outcomes, but this only happens when paired with authority.
Without authority, you don't have influence. You have high-quality input. And the difference matters enormously when risk, budget, and business continuity are on the line.
The illusion is pervasive: decision-makers ask for your view, creating the appearance of consultation, but they retain full discretion and may choose a different path. You gain credibility, get invited to the table, and feel heard but you cannot bind or enforce outcomes.
You may invest months building relationships and delivering well-constructed risk cases; yet, when decisions are sub-optimal or delayed, you may still bear blame. The title "CISO" creates expectations of accountability, even when you lack authority to act.
This is the trap: advice without authority is responsibility without power.
When Input Masquerading as Influence Becomes a Federal Case
Consider the SolarWinds CISO, sued by the SEC for allegedly misleading disclosures about cyber risk. The key finding wasn't incompetence. I t was structural: internal controls and escalation paths were deficient. The CISO had knowledge but apparently lacked the authority to mandate remediation or compel timely disclosure.
That gap between knowing and acting became a federal case.
Or Uber's former CSO, convicted of obstruction after the 2016 breach. The case revealed a cyber leader operating in a gray zone of advising, providing input, but without clear authority over incident response and disclosure decisions. When accountability arrived, the lack of formal mandate offered no protection.
Both cases share a pattern: cyber leaders were held accountable for outcomes they couldn't fully control. They provided input and probably thought they had influenced the decision. They may have been consulted. But they lacked the authority to convert that input into binding action.
And in court, input provides no defense.
When cyber risk becomes business risk and regulatory risk, authority and governance define who has the ability to act and therefore who will ultimately be held accountable. The question isn't whether you were persuasive. It's whether you could act.
Authority Enables Action; Input Enables Nothing
Here's why authority remains indispensable:
1. Authority provides the structural mandate to act
When you hold authority, you're empowered to make or escalate decisions, allocate budget, or enforce controls to influence outcomes. You can convert input into action. Without it, you remain an adviser, regardless of how credible or persuasive you are.
In a governance discussion, you may present risk data and speak to the board. But unless you have a mandate to shut down an insecure system, pause a business process, or reallocate funds. Your role remains advisory. The decision or influence lies elsewhere.
Studies show many CISOs remain in a "reporting" role rather than a "decision-making" role, often lacking control over the resources needed to implement necessary changes. This matters because risk doesn't wait: when an exploit or third-party vulnerability is discovered, the clock ticks. If you have authority, you can act decisively; if not, you must persuade someone else. The persuasion may succeed or it may not.
2. Authority enables transformation; input enables delay
Your broader role as cyber leader isn't just incident response. It's shaping capability, driving transformation, enabling growth. Being persuasive helps you "sell" a budget proposal. Authority gives you the power to execute and embed.
Consider Zero Trust architecture. Input lets you recommend it. Authority gives you a seat at the capital-allocation table and rights to redirect funds when priorities shift.
For compliance and regulatory obligations, regulators increasingly expect clear governance, measurable controls, and quickly actionable decisions. If you lack authority to mandate remediation, your compliance posture becomes fragile.
Without authority, transformation stalls in "pilot mode" or remains a series of recommendations rather than embedded capability. You move from "we should do this" to "we're still discussing this" indefinitely.
But Authority Alone Isn't Enough: Why Real Influence Still Matters
To be clear: I'm not arguing against influence. The most effective cyber leaders combine authority and influence. Here's how:
Authority gives the mandate. Influence gives the buy-in.
A CISO with authority but no influence may impose controls that the business resists, resulting in poor adoption, workarounds, or culture clash. A CISO with input but no authority may be liked and consultative but when risk is realized, they're powerless to act.
The ideal: you have the mandate, and you use genuine influence built on business acumen, credibility, and relationships to secure funding, align stakeholders, communicate risk in business terms, and drive adoption.
Real influence matters especially in the "soft" aspects: translating cyber risk into business impact, engaging operational leaders, securing enterprise culture change, gaining board trust. These shape the speed and success of execution once the mandate exists.
But influence cannot exist in a vacuum. It requires authority as its foundation. Otherwise, it's just persuasive input which is valuable, but rarely sufficient.
What Cyber Leaders Should Do
For senior cyber leaders wondering if they have enough authority, ask these questions:
Can you halt a project mid-flight if you discover unacceptable risk? If not, you're an adviser.
Can you reallocate budget without three approval layers? If not, you're a cost center administrator.
When you escalate to the board, do they treat it as information or as a decision trigger? If it's information only, you lack mandate.
If a breach occurs tomorrow, will you be blamed for outcomes you couldn't control? If yes, your accountability exceeds your authority which is a liability position.
To build real authority, not just input:
Clarify your mandate in the organizational structure. Ensure your role includes decision rights, not just advisory rights: budget control, vendor approval, risk acceptance authority, escalation paths. Confirm your reporting line gives you a seat at the strategy table. Seek formal documentation. An org chart or charter that outlines your sphere of authority.
Build genuine influence through business language and credible data. Once you have authority, you need influence to execute effectively. Use business-aligned metrics: downtime cost, regulatory exposure, customer churn, third-party risk. Develop relationships across the enterprise. Communicate risks as business risks with financial impact, not as "IT problems."
Use governance to institutionalize authority. Implement a cyber-governance framework so your authority isn't personality-dependent but embedded in process. Ensure escalated risks are formally tracked, board-reported, and decisions documented. Build your cyber risk agenda into enterprise risk and audit so you're integrated, not siloed.
Challenge the "input trap." If you're consulted often but lack decision rights, ask: "What will be done with my recommendation? Who decides? What's the timeline?" Track instances where your input was ignored, changed or delayed. Use these to make the case for stronger mandate and to highlight potential future liability.
The Stakes Are Too High for Advisory Roles
The cybersecurity landscape doesn't reward consultative CISOs. It exposes them. Regulators are filing charges. Boards are replacing leaders. Breaches are career-ending.
If you're building what you think is influence without securing authority, you're building on sand. You're providing input that may be valued but can be ignored or your message can be altered. And when the breach comes, no one will ask how persuasive you were. They'll ask why you couldn't stop it. If your answer is "I didn't have the authority," you've already lost.
Get the mandate first. Then use your influence to execute it. Because in cybersecurity leadership, authority is what turns influence into outcome. And in a world of rising threats, regulatory scrutiny, and business-impact risk, outcome is what matters.
Input, no matter how expert, is not enough. Authority backed by genuine influence. That's the foundation of effective cyber leadership.



Comments