Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnSecurity Leadership and ManagementLogical Security

Cyber Tactics

State of cybersecurity: Complex threat landscape spiking stress levels

ISACA's 2024 State of Cybersecurity report offers insights into the current cybersecurity landscape.

By Pam Nigro, Contributing Writer
State of Cybersecurity

mesh cube / iStock / Getty Images Plus via Getty Images

October 14, 2024

ISACA’s 2024 State of Cybersecurity report offers insights into the current landscape of cybersecurity challenges and trends. This report highlights several key areas of concern, including staffing shortages, skills gaps, evolving threats, and budgetary constraints, while also identifying areas of progress such as increased confidence in threat response capabilities and a growing awareness of cyber risk assessments.

One of the most alarming trends in the report is the increased stress among cybersecurity professionals, with 66% of respondents indicating that their roles are significantly or slightly more stressful than five years ago. This heightened stress is primarily due to the increasingly complex threat landscape. Compounding this issue, 57% of organizations report being understaffed, further exacerbating the burden on existing personnel.

The aging workforce also is a growing issue, with the number of respondents aged 45 to 54 now surpassing those aged 35 to 44. Coupled with minimal improvement in the representation of individuals aged 34 and below, and no increase in managers overseeing staff with less than three years of experience, this trend suggests that industry leaders need to develop succession plans to address potential increases in attrition.

Recruiting and retaining qualified talent remains a significant challenge. While 44% of staff have transitioned from other fields into cybersecurity, the demand for experienced professionals continues to outpace supply. Unfilled cyber positions remain high, with 64% of organizations reporting vacancies at various levels. Filling these positions also takes considerable time, with 37% of organizations needing 3-6 months to fill entry-level roles and 38% taking the same amount of time for non-entry-level positions.


Persistent skills gaps

The report identifies persistent skills gaps in several critical areas. Notably, "soft skills" and "cloud computing" are cited by 51% and 42% of respondents, respectively, as the most significant gaps. This underscores the need for professionals who can not only understand technical concepts but also effectively communicate, collaborate, and adapt to changing environments.

To address these gaps, organizations are increasingly turning to training and development programs. The most common approaches include online learning websites, corporate training events, and mentoring. However, upskilling existing staff and attracting new talent with the necessary skills remains a crucial challenge.

The use of artificial intelligence (AI) in security operations remains relatively low, with 20% of respondents reporting no usage. However, its potential is undeniable. The top three applications of AI include automating threat detection and response, enhancing endpoint security, and automating routine security tasks. Despite its promise, the lack of involvement by security professionals in AI development and implementation raises concerns about the effective integration and utilization of this technology.


Cyberattacks still on the rise

Cyberattacks continue to rise, with 38% of respondents experiencing an increase compared to the previous year. Cybercriminals and hackers remain the primary threat actors, employing tactics such as social engineering, malware, and exploiting unpatched systems. This underscores the need for vigilance and continuous improvement in security practices to mitigate these threats.

While 81% of executive leadership teams see the value in cyber risk assessments, only 41% conduct them annually. This indicates a growing awareness but also potential gaps in understanding and implementation. Additionally, nearly half (45%) of respondents are unaware of their organization's cyber insurance coverage, highlighting a significant need for better communication and education in this area.

By investing in talent, bridging skills gaps, leveraging technology, improving risk management, and strengthening communication and collaboration, organizations can significantly enhance their security posture and mitigate potential risks.

The report reveals that 49% of cybersecurity teams report to the Chief Information Security Officer (CISO), who most often reports to the Chief Information Officer (CIO) (26%) or Chief Executive Officer (CEO) (23%). This suggests a centralized approach to cybersecurity leadership, with the CISO playing a key role in aligning security strategies with organizational objectives. Encouragingly, 74% of respondents think their cyber strategy is aligned with organizational goals, and 56% believe their board of directors adequately prioritizes cybersecurity.

The 2024 State of Cybersecurity report emphasizes the necessity of a multi-faceted approach to tackle evolving challenges. By investing in talent, bridging skills gaps, leveraging technology, improving risk management, and strengthening communication and collaboration, organizations can significantly enhance their security posture and mitigate potential risks. The insights offered by this report serve as an essential guide for organizations aiming to navigate the complex and ever-changing cybersecurity landscape effectively.

Specific Actions for Organizations: 

  • Develop and implement proactive recruitment strategies: Attract and retain qualified cybersecurity professionals by offering competitive salaries, benefits, and professional development opportunities.
  • Invest in training and development programs: Upskill existing staff and bridge skills gaps by providing access to online webinars and learning platforms, corporate training events, and mentoring programs.
  • Explore the potential of AI: Implement AI-driven solutions to automate routine tasks, enhance threat detection and response capabilities, and improve overall security posture.
  • Conduct regular cyber risk assessments: Identify vulnerabilities and develop mitigation strategies to reduce the likelihood and impact of cyberattacks.
  • Ensure comprehensive cyber insurance coverage: Understand the organization's cyber insurance policy and ensure it provides adequate coverage for potential risks.
  • Foster effective communication and collaboration: Break down silos between security teams, leadership, and other departments. Share information, insights, and best practices to enhance overall security posture.

Actions for Individuals:

  • Stay informed about the latest threats and trends: Continuously update your knowledge and skills through professional development, certifications, and online resources.
  • Develop strong soft skills: Communication, collaboration, critical thinking, and problem-solving are essential skills for any cybersecurity professional.
  • Embrace continuous learning: The cybersecurity landscape is constantly evolving. Stay ahead of the curve by embracing a lifelong learning mindset.
KEYWORDS: cybersecurity trends organizational resilience talent gap threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • stressed

    Mental health warning in cybersecurity: CISOs across the industry reporting high levels of stress

    See More
  • globe cyber threat

    State of the geopolitical cyber threat landscape

    See More
  • AI-powered phishing

    Combating the rising threat of AI-powered phishing attacks

    See More

Events

View AllSubmit An Event
  • September 29, 2025

    Global Security Exchange (GSX)

     
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing