Which, again, if you go in open-eyed can be fine.
Any technically competent CSO knows they are totally screwed even if they implement everything feasible perfectly (i.e. no inane solution like shutting down the whole company). It is not a problem of resources or commitment (though you could also have those problems), it is a problem of impossibility due to the incompetence of commercial IT cybersecurity processes.
The only way to survive in a environment where you literally can not do what you were ostensibly hired to do is to lie and take the fall. The only other alternative is being too stupid to realize you are screwed, but every bank cybersecurity executive team I’ve ever met knew that someone could go in and steal all of their documents for less than 1 million dollars (you could also change things, but the out of band cross-checking makes that hard without intimate knowledge of the specific financial checks, more a question of knowing how banks work than hacking, the 1 M$ gives you full access rights, but you need to be careful not the drive the tank through the wall of the general’s office).
Many security leaders (CISOs or otherwise) do not have the budget or authority to meet their board's or CEO's expectations, but it may be outside your sample of big banks.
I'm otherwise aligned with your comment. The successful CISOs I've interacted with, regardless of industry, educate their leadership team on the trade-offs and risks of investment levels, set realistic response and recovery times expectations based on those investments, and turn it into a business decision, rather than promising the impossible.