It is no longer a question of if it will happen to an organisation , but rather when it will happen . This is why threat preparation and knowing how to respond when the time comes is so crucial . Although these may not seem as exciting or dangerous , they will continue to drive the vast majority of costly breaches .
DAVE SPENCER , DIRECTOR OF TECHNICAL PRODUCT MANAGEMENT AT IMMERSIVE LABS
The current upward trend of zero-day exploits will continue to rise
There are a few reasons for this , but organisations actually have more control over this than they realise . Threat researchers receive limited kudos and incentives for discovering bugs . Meanwhile , companies have strict NDAs and pay less than thirdparty bug bounties . For these reasons , researchers are less willing to work closely with these companies , and the companies then lack the speed and agility to detect and resolve vulnerabilities before they are leveraged by attackers .
Cyber warfare will continue with the current state of wars and growing global tension
Nation state-led attackers have two things that no other type of threat actors have : unlimited time and unlimited budget . This means they more often than not have the resources and time to successfully gain
We continue to see organisations suffering from massive ransomware and supply chain attacks year after year .
access wherever they want . With this said , there are ways to combat cyberwarfare . Organisations in regions with conflict should understand the threats that impact them . They can do so by conducting regular threat hunts across their network using the latest threat intel feeds . They should also regularly update their telemetry with data enrichment based on their assets , use the most up-to-date techniques , and train their defensive team to be proactive , and well-drilled on the processes .
AI investments will continue , but demand will surge for skills where AI falls short
In 2025 , skills in blockchain , SOAR , OT , and DevSecOps will likely be among the highest in demand , shaping hiring and workforce development priorities . If security leaders want to strengthen these areas , they have to make sure they are finding the people that are passionate about cyber , and giving them the tools and exercising they need to excel .
50 WWW . INTELLIGENTCISO . COM