Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnSecurity Leadership and ManagementLogical Security

Cyber Tactics

State of cybersecurity: Complex threat landscape spiking stress levels

ISACA's 2024 State of Cybersecurity report offers insights into the current cybersecurity landscape.

By Pam Nigro, Contributing Writer
State of Cybersecurity

mesh cube / iStock / Getty Images Plus via Getty Images

October 14, 2024

ISACA’s 2024 State of Cybersecurity report offers insights into the current landscape of cybersecurity challenges and trends. This report highlights several key areas of concern, including staffing shortages, skills gaps, evolving threats, and budgetary constraints, while also identifying areas of progress such as increased confidence in threat response capabilities and a growing awareness of cyber risk assessments.

One of the most alarming trends in the report is the increased stress among cybersecurity professionals, with 66% of respondents indicating that their roles are significantly or slightly more stressful than five years ago. This heightened stress is primarily due to the increasingly complex threat landscape. Compounding this issue, 57% of organizations report being understaffed, further exacerbating the burden on existing personnel.

The aging workforce also is a growing issue, with the number of respondents aged 45 to 54 now surpassing those aged 35 to 44. Coupled with minimal improvement in the representation of individuals aged 34 and below, and no increase in managers overseeing staff with less than three years of experience, this trend suggests that industry leaders need to develop succession plans to address potential increases in attrition.

Recruiting and retaining qualified talent remains a significant challenge. While 44% of staff have transitioned from other fields into cybersecurity, the demand for experienced professionals continues to outpace supply. Unfilled cyber positions remain high, with 64% of organizations reporting vacancies at various levels. Filling these positions also takes considerable time, with 37% of organizations needing 3-6 months to fill entry-level roles and 38% taking the same amount of time for non-entry-level positions.


Persistent skills gaps

The report identifies persistent skills gaps in several critical areas. Notably, "soft skills" and "cloud computing" are cited by 51% and 42% of respondents, respectively, as the most significant gaps. This underscores the need for professionals who can not only understand technical concepts but also effectively communicate, collaborate, and adapt to changing environments.

To address these gaps, organizations are increasingly turning to training and development programs. The most common approaches include online learning websites, corporate training events, and mentoring. However, upskilling existing staff and attracting new talent with the necessary skills remains a crucial challenge.

The use of artificial intelligence (AI) in security operations remains relatively low, with 20% of respondents reporting no usage. However, its potential is undeniable. The top three applications of AI include automating threat detection and response, enhancing endpoint security, and automating routine security tasks. Despite its promise, the lack of involvement by security professionals in AI development and implementation raises concerns about the effective integration and utilization of this technology.


Cyberattacks still on the rise

Cyberattacks continue to rise, with 38% of respondents experiencing an increase compared to the previous year. Cybercriminals and hackers remain the primary threat actors, employing tactics such as social engineering, malware, and exploiting unpatched systems. This underscores the need for vigilance and continuous improvement in security practices to mitigate these threats.

While 81% of executive leadership teams see the value in cyber risk assessments, only 41% conduct them annually. This indicates a growing awareness but also potential gaps in understanding and implementation. Additionally, nearly half (45%) of respondents are unaware of their organization's cyber insurance coverage, highlighting a significant need for better communication and education in this area.

By investing in talent, bridging skills gaps, leveraging technology, improving risk management, and strengthening communication and collaboration, organizations can significantly enhance their security posture and mitigate potential risks.

The report reveals that 49% of cybersecurity teams report to the Chief Information Security Officer (CISO), who most often reports to the Chief Information Officer (CIO) (26%) or Chief Executive Officer (CEO) (23%). This suggests a centralized approach to cybersecurity leadership, with the CISO playing a key role in aligning security strategies with organizational objectives. Encouragingly, 74% of respondents think their cyber strategy is aligned with organizational goals, and 56% believe their board of directors adequately prioritizes cybersecurity.

The 2024 State of Cybersecurity report emphasizes the necessity of a multi-faceted approach to tackle evolving challenges. By investing in talent, bridging skills gaps, leveraging technology, improving risk management, and strengthening communication and collaboration, organizations can significantly enhance their security posture and mitigate potential risks. The insights offered by this report serve as an essential guide for organizations aiming to navigate the complex and ever-changing cybersecurity landscape effectively.

Specific Actions for Organizations: 

  • Develop and implement proactive recruitment strategies: Attract and retain qualified cybersecurity professionals by offering competitive salaries, benefits, and professional development opportunities.
  • Invest in training and development programs: Upskill existing staff and bridge skills gaps by providing access to online webinars and learning platforms, corporate training events, and mentoring programs.
  • Explore the potential of AI: Implement AI-driven solutions to automate routine tasks, enhance threat detection and response capabilities, and improve overall security posture.
  • Conduct regular cyber risk assessments: Identify vulnerabilities and develop mitigation strategies to reduce the likelihood and impact of cyberattacks.
  • Ensure comprehensive cyber insurance coverage: Understand the organization's cyber insurance policy and ensure it provides adequate coverage for potential risks.
  • Foster effective communication and collaboration: Break down silos between security teams, leadership, and other departments. Share information, insights, and best practices to enhance overall security posture.

Actions for Individuals:

  • Stay informed about the latest threats and trends: Continuously update your knowledge and skills through professional development, certifications, and online resources.
  • Develop strong soft skills: Communication, collaboration, critical thinking, and problem-solving are essential skills for any cybersecurity professional.
  • Embrace continuous learning: The cybersecurity landscape is constantly evolving. Stay ahead of the curve by embracing a lifelong learning mindset.
KEYWORDS: cybersecurity trends organizational resilience talent gap threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • stressed

    Mental health warning in cybersecurity: CISOs across the industry reporting high levels of stress

    See More
  • globe cyber threat

    State of the geopolitical cyber threat landscape

    See More
  • AI-powered phishing

    Combating the rising threat of AI-powered phishing attacks

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

See More Products

Events

View AllSubmit An Event
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing