As generative AI (GenAI) rapidly transforms the digital landscape, it also accelerates the spread and impact of disinformation, posing a significant, complex, and largely unmanaged risk for organizations.
Disinformation attacks now span internal and external surfaces, leveraging deepfakes, malicious narratives, and impersonation tactics to target employees, customers, and executives.
The consequences range from direct cybersecurity breaches to reputational damage, financial manipulation, and erosion of stakeholder trust.
According to a recent Gartner survey, 36% of organizations have already experienced social engineering attacks involving deepfakes in video calls with employees.
This alarming statistic highlights the urgency for security leaders to rethink their approach: disinformation is no longer a fringe issue, but a core business risk that demands coordinated, cross-functional action.
Why AI-Driven Disinformation Is a CISO’s New Priority
Disinformation, especially when amplified by GenAI, is unique in its intent and impact.
Unlike misinformation or malinformation, which may be inaccurate or misleading but not necessarily harmful, disinformation is both false and designed specifically to damage organizations.
It can be episodic, targeting individuals for immediate gain, such as tricking an employee into transferring funds via a deepfaked call. It can also be industrial, operating at scale to undermine brand reputation, manipulate stock prices, or probe organizational defenses over time.
The attack surfaces are broad: internally, adversaries exploit corporate meeting solutions, email, and messaging platforms to bypass authentication and impersonate trusted individuals.
Externally, they propagate malicious narratives through fake websites, deepfaked media, and social media profiles, often using bot networks to scale their campaigns.
The result is a threat that cuts across cybersecurity, communications, marketing, and risk management frequently seen as “everybody’s problem and nobody’s responsibility.”
Common Pitfalls in Addressing Disinformation
Many organizations fall into the trap of fragmented, reactive responses by treating disinformation as a technical or PR issue rather than an enterprise risk.
Without clear ownership and cross-functional collaboration, efforts to counter disinformation are often disjointed and ineffectual.
In some cases, organizations leave disinformation as an unmanaged risk, exposing themselves to episodic attacks on individuals and industrial campaigns targeting reputation and financial stability.
Another common pitfall is failing to differentiate between types of information threats.
CISOs should focus their resources on disinformation where intent to harm and lack of accuracy intersect, rather than attempting to police all forms of misinformation or malinformation.
This targeted approach enables security leaders to define clear areas of responsibility and collaborate effectively with executive peers.
A Three-Step Playbook for Disinformation Security
To mitigate the cybersecurity and reputational impact of disinformation, CISOs must adopt a structured, collaborative approach:
- Establish a Shared Vision and Governance: CISOs should work with CIOs, CCOs, and CMOs to define clear responsibilities, policies, and a common understanding of the disinformation threat. This includes creating governance structures such as a Trust Council and joint task forces, which guide detection, response, and remediation across functions. Policies should address content provenance (using standards like C2PA), deepfake detection (both synchronous and asynchronous), and narrative management ensuring rapid, coordinated responses to incidents.
- Protect Internal Surfaces with the CIO: Collaboration with the CIO is essential for securing internal systems against deepfake and social engineering attacks. Key actions include implementing strong user authentication (ideally multifactor authentication integrated with single sign-on), deploying real-time deepfake detection in corporate meeting solutions, and upgrading security awareness training to dynamic, experiential models. Identity assurance solutions should be integrated into help desk workflows to counter phishing attacks, and business processes at risk of subversion should be hardened with additional approval and authentication steps.
- Manage External Reputation with the CCO and CMO: Externally, CISOs must partner with communications and marketing leaders to deploy narrative intelligence tools that track and classify malicious campaigns, monitor sentiment, and detect deepfake content. Adopting content provenance standards like C2PA for official communications helps establish trust and authenticity, while executive protection services defend against targeted attacks on leadership. Narrative management playbooks should be developed to guide rapid response whether launching counter-narratives or repudiating deepfaked media.
Success Measures: KPIs for Collaborative Defense
Effective disinformation security requires robust metrics to evaluate technology efficacy and team coordination.
Key performance indicators include:
- Time-to-detection: Average time from onset to detection of a disinformation campaign.
- Response time: Duration to initiate coordinated countermeasures.
- Security awareness training effectiveness: Improvements measured via simulated attack exercises.
- Incident recurrence rate: Frequency of similar campaigns over a defined period.
- Brand trust metrics: Changes in reputation scores before and after incidents.
Building a Culture of Shared Responsibility
Ultimately, combating AI-driven disinformation is not just a security or technology challenge.
It is an organizational imperative.
CISOs must lead the way in communicating the risks and fostering a culture of shared responsibility, engaging all employees in detection, reporting, and response.
This includes developing internal tooling for monitoring and reporting, promoting transparency, and ensuring ongoing education about evolving threats.
What CISOs Should Do Now
To succeed, CISOs must move beyond siloed solutions and embrace a holistic, cross-functional strategy. This means:
- Collaborating with CIOs, CCOs, and CMOs to align on governance and response.
- Investing in advanced authentication, deepfake detection, and narrative intelligence tools.
- Establishing clear policies for content provenance and incident management.
- Promoting executive protection and resilience against targeted attacks.
- Measuring success through comprehensive KPIs and continuous improvement.
AI promises to revolutionize business operations, but it also empowers attackers with new tools for deception and disruption.
By adopting a unified, proactive approach to disinformation security, CISOs can safeguard their organizations’ reputation, assets, and people, ensuring resilience in the face of an increasingly sophisticated threat landscape.
Trusted insights for technology leaders
Our readers are CIOs, CTOs, and senior IT executives who rely on The National CIO Review for smart, curated takes on the trends shaping the enterprise, from GenAI to cybersecurity and beyond.
Subscribe to our 4x a week newsletter to keep up with the insights that matter.


