{"id":4840,"date":"2025-09-15T07:00:00","date_gmt":"2025-09-15T07:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=4840"},"modified":"2025-09-15T07:00:00","modified_gmt":"2025-09-15T07:00:00","slug":"5-trends-reshaping-it-security-strategies-today","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=4840","title":{"rendered":"5 trends reshaping IT security strategies today"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Cybersecurity\u2019s core mission remains the same: Defend the organization from all the dangers that lurk in the digital space.<\/p>\n<p>But what constitutes danger is evolving, as are the technologies involved on both the offensive and defensive sides of cybersecurity. So, too, are the ways security chiefs execute on that mission.<\/p>\n<p>Threats are rising, and <a href=\"https:\/\/www.csoonline.com\/article\/4014238\/cybercriminals-take-malicious-ai-to-the-next-level.html\">they\u2019re becoming more sophisticated<\/a>. Attacks are coming at an <a href=\"https:\/\/www.csoonline.com\/article\/3841865\/what-cybersecurity-teams-need-to-know-about-shrinking-attack-timeframes.html\">ever-increasing rate of speed<\/a>. Artificial intelligence is <a href=\"https:\/\/www.csoonline.com\/article\/4042494\/how-ai-is-reshaping-cybersecurity-operations.html\">reshaping everything<\/a>. Market and financial pressures are mounting.<\/p>\n<p>CISOs feel the squeeze. Bitsight Trace surveyed 1,000 cybersecurity and cyber risk leaders for its <a href=\"https:\/\/www.bitsight.com\/resources\/state-of-cyber-risk-and-exposure-2025\">State of Cyber Risk and Exposure 2025 report<\/a> and found that 90% said managing cyber risks is harder than it was five years ago. The explosion of AI and the widening attack surface are the top two reasons for that increasing difficulty, according to respondents.<\/p>\n<p>But cyber leaders say those are only two of the factors impacting security. Here they delve into five key trends reshaping IT security strategies today.<\/p>\n<h2 class=\"wp-block-heading\">1. Financial pressures putting the squeeze on security budgets<\/h2>\n<p>Macroeconomic uncertainties have put pressure on the C-suite to keep costs in check. That pressure extends to the security function, with CEOs and CFOs expecting CISOs to do more with less, says <a href=\"https:\/\/www.csoonline.com\/cybersecurity%20research%20lab%20and%20incutabor\">Lou Steinberg<\/a>, founder and managing Partner at CTM Insights, a cybersecurity research lab and incubator.<\/p>\n<p>\u201cWe\u2019ve hit a point of funding fatigue with information security. Budgets have gone up and to the right forever, and now they\u2019re flat and sometimes down,\u201d Steinberg says. \u201cThat\u2019s new to many CISOs, so they have to answer questions about efficiencies that they have not had to in the past.\u201d<\/p>\n<p>The <a href=\"https:\/\/www.iansresearch.com\/resources\/ians-security-budget-benchmark-report\">2025 Budget Benchmark Report from IANS Security and Artico Search<\/a> found that average annual security budget growth dropped to 4%, a sharp decline from 8% in 2024 and the lowest growth rate in five years. It also found that only 47% of the 587 surveyed CISOs reported an increase in their security budgets in 2025, down significantly from 62% in 2024 and 78% in 2022. More than half (54%) reported flat or shrinking budgets.<\/p>\n<p>Similarly, the <a href=\"https:\/\/www.ey.com\/en_gl\/insights\/consulting\/how-can-cybersecurity-go-beyond-value-protection-to-value-creation\">2025 Global Cybersecurity Leadership Insights Study<\/a> from professional services firm EY found that cybersecurity budgets have fallen from 1.1% to 0.6% of annual revenue over the past two years.<\/p>\n<p>Steinberg said CISOs in response are <a href=\"https:\/\/www.csoonline.com\/article\/2515727\/6-tips-for-consolidating-your-it-security-tool-set.html\">simplifying their tech stack<\/a>, shedding bespoke and point-in-time solutions for off-the-shelf options that offer the same controls but are easier to manage and have a lower total cost of ownership. They\u2019re identifying more areas to automate to generate efficiencies, and they\u2019re <a href=\"https:\/\/www.csoonline.com\/article\/4016339\/skills-gaps-send-cisos-in-search-of-managed-security-providers.html\">outsourcing more to reduce talent costs<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">2. AI-enabled attacks emerging to amplify business risks<\/h2>\n<p>CISOs now rank AI-powered cyberattacks as their top concern, cited by 80% of CISOs in <a href=\"https:\/\/www.bcg.com\/publications\/2025\/ai-creates-cyber-risks-can-resolve-them\">a survey by Boston Consulting Group<\/a>. That\u2019s in contrast to a year ago when CISOs put AI-powered attacks at No. 4 on their list of top concerns.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3819176\/top-5-ways-attackers-use-generative-ai-to-exploit-your-systems.html\">Adversaries are using generative AI<\/a> for more sophisticated, more targeted, and more effective social engineering \u2014 which 62% of CISOs listed as a major concern or critical threat, according to the BCG survey.<\/p>\n<p>\u201cOrganizations have seen a surge in automated, Gen-AI powered attacks, which are increasingly easy for attackers to execute and can be extremely effective at deceiving employees, partners, or customers,\u201d BCG said in announcing its survey results.<\/p>\n<p>This has CISOs spending more in areas they believe can help them counter these types of attacks, notably <a href=\"https:\/\/www.csoonline.com\/article\/3975448\/top-tips-for-successful-threat-intelligence-usage.html\">threat intelligence<\/a> and application security as well as AI-enabled security solutions, BCG reported.<\/p>\n<p>Security leaders are bracing for even more powerful AI-enabled attacks. <a href=\"https:\/\/www.kyndryl.com\/us\/en\/perspectives\/authors\/kris-lovejoy\">Kris Lovejoy<\/a>, global security and resiliency practice leader at IT infrastructure services provider Kyndryl, predicts that by 2027 enterprises will be hit by fully autonomous, AI-driven cyberattacks.<\/p>\n<p>Such predictions have CISOs rushing to implement AI tools for detection, response, recovery and resilience, says <a href=\"https:\/\/www.linkedin.com\/in\/jwgoerlich\/\">Wolfgang Goerlich<\/a>, IANS Research faculty and a public sector CISO.<\/p>\n<h2 class=\"wp-block-heading\">3. Agentic AI rising to redefine security fundamentals<\/h2>\n<p>CISOs have been working to secure their own organization\u2019s AI initiatives, adjusting policies and implementing tools to protect the data being used by AI as well as the AI algorithms.<\/p>\n<p>That work is ongoing, but CISOs must now start planning how to <a href=\"https:\/\/www.csoonline.com\/article\/4047974\/agentic-ai-a-cisos-security-nightmare-in-the-making.html\">safeguard their organizations from the risks created by agentic AI<\/a>.<\/p>\n<p><a href=\"https:\/\/team8.vc\/rethink\/enterprise\/ciso-survey-2025\/\">Team8\u2019s 2025 CISO Village Survey<\/a> found that 37% of CISOs said securing AI agents was among their most urgent concerns.<\/p>\n<p>Steinberg says agentic AI will require CISOs to <a href=\"https:\/\/www.csoonline.com\/article\/3989855\/will-ai-agent-fueled-attacks-force-cisos-to-fast-track-passwordless-projects.html\">evolve how they approach not just authentication<\/a> but authorization, too.<\/p>\n<p>\u201cMost agents today live in their walled gardens so CISOs trust them implicitly,\u201d Steinberg explains. \u201cBut we\u2019re moving to a place where we\u2019ll have outside agents interacting with [a CISO\u2019s own organization], and the CISO will have to authenticate those agents to know it is what it says it is and that it is authorized to take the action it\u2019s taking. We\u2019re going to have to ask, \u2018Are you authorized to perform the task you\u2019re asking me to do.\u2019\u201d<\/p>\n<p>For example, Steinberg says agentic AI will allow a traveler to book a flight with little more than a prompt. The traveler would start with an online query for a flight that meets certain perimeters, such as departing airport and destination, day, preferred airline, etc. The AI agent would then move from search to booking to payment on its own.<\/p>\n<p>In this future state, the airline will have to find a way to verify that the agent was authorized to book the flight on the traveler\u2019s behalf \u2014 a difficult task without a human in the loop, Steinberg says.<\/p>\n<p>\u201cWe have to have some sort of way to confirm that a real person with a real identity wants the agent to do a specific thing. Otherwise, how will the organization know that the chain is trustworthy?\u201d Steinberg says, noting that agentic AI will mean the end of CISOs using authentication as a proxy for authorization.<\/p>\n<p>Steinberg says he doesn\u2019t see any real solutions to that challenge yet, although researchers and technology companies are trying to expand existing authorization protocols to include authentication mechanisms, too.<\/p>\n<p>\u201cBut until there is a real standard solution, we\u2019re going to continue to use the walled garden approach: I\u2019ll only trust what is mine,\u201d he says. \u201cAnd that is going to be limiting at a time when the business folks are going to want to do things. It could mean the security department will once again be the department of no and slow.\u201d<\/p>\n<h2 class=\"wp-block-heading\">4. Speed of change shifting security postures and practices<\/h2>\n<p>Speed is another trend impacting security strategies, as CISOs say they\u2019re moving faster now than they have in the past and they expect they\u2019ll have to move still faster in the future to keep pace with adversaries and the business.<\/p>\n<p>Consider some figures.<\/p>\n<p>The <a href=\"https:\/\/resource.cobalt.io\/ciso-perspectives-report\">CISO Perspectives Report 2025: AI and Digital Supply Chain Risks from Cobalt<\/a>, a security tech and services company, found that 60% of surveyed security leaders believe attackers are evolving too quickly to maintain a truly resilient security posture.<\/p>\n<p>And the <a href=\"https:\/\/rhisac.org\/wp-content\/uploads\/CISO-Benchmarking-Presentation-2025_TLP-Clear.pdf\">2025 CISO Benchmark Report: Securing the Digital Foundation for Reinvention<\/a> from Accenture and the Retail &amp; Hospitality ISAC found that 45% of CISOs surveyed cited \u201cspeed of business requirements\u201d as a barrier to secure the digital core by design.<\/p>\n<p>\u201cIt\u2019s about the speed of change and keeping up with it,\u201d says<a href=\"https:\/\/www.extremenetworks.com\/resources\/blogs\/philip-swain#cq=%40z95xtemplatename%3D%22Blog%20Detail%20Page%22%20AND%20%40author%3D%22467bf86e6d1747099b2cc2e61b3352ca%22\">Phil Swain<\/a>, CISO and vice president of information security at tech company Extreme Networks. \u201cCISOs are here to support the business, and security is an enabler of the business, so as businesses evolve faster and become a lot more nimble and more innovative, that is percolating down into security. Security has to evolve more quickly and become more adaptable.\u201d<\/p>\n<h2 class=\"wp-block-heading\">5. Vendor landscape raising questions about viability, resiliency, and trust<\/h2>\n<p>The security tech sector <a href=\"https:\/\/www.csoonline.com\/article\/1298623\/top-cybersecurity-ma-deals-this-year.html\">has experienced a surge in mergers and acquisitions in 2025<\/a>.<\/p>\n<p>\u201cM&amp;A activity remains high (with Q1\u2019s annualized deal count in line with 2024\u2019s record deal volume) as strategic buyers and investors consolidate capabilities across key domains \u2014 cloud security, exposure management, identity and SecOps \u2014 positioning themselves to meet evolving enterprise needs and capitalize on cross-platform value,\u201d according to the <a href=\"https:\/\/www.kroll.com\/en\/publications\/m-and-a\/cybersecurity-software-sector-ma-industry-insights-spring-2025\">Cybersecurity Software Sector M&amp;A Industry Insights Spring 2025 report<\/a> from Kroll, a provider of financial and risk advisory solutions.<\/p>\n<p>That may not always benefit CISOs, however, Goerlich says.<\/p>\n<p>\u201cWhen we think about resilience, we have to think about the resilience of our tech software and services providers. That is driving us to look more at the vendor market. More and more we have to pay attention to the viability of our vendors, whether they\u2019re going to be acquired and whether they\u2019ll be around,\u201d he says. \u201cBecause when a vendor gets bought, costs can go through the roof, the vendor\u2019s roadmap can be paused. I had one vendor that was bought and its roadmap was paused and it fell behind and I ended up with a weakness [in my security program] as a result. So I had to pivot when I wasn\u2019t planning on it.\u201d<\/p>\n<p>Goerlich says he\u2019s now spending more time monitoring the vendor markets for investor trends and M&amp;A news so that he can safeguard his security program against such situations in the future.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity\u2019s core mission remains the same: Defend the organization from all the dangers that lurk in the digital space. But what constitutes danger is evolving, as are the technologies involved on both the offensive and defensive sides of cybersecurity. So, too, are the ways security chiefs execute on that mission. Threats are rising, and they\u2019re [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":4841,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4840"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4840"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4840\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/4841"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}