Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnLogical SecuritySecurity & Business Resilience

Cyber Tactics

Navigating Cybersecurity’s Tightrope: Balancing Skills, AI, and Human Resilience

Addressing the skills gap, supporting employee well-being, responsibly leveraging AI, and securing adequate funding requires a holistic approach.

By Pam Nigro, Contributing Writer
Digital balance
Imagesrouges / iStock / Getty Images Plus via Getty Images
November 26, 2025

The cybersecurity landscape is a dynamic arena in which innovation and threats evolve relentlessly. ISACA’s State of Cybersecurity 2025 report — drawing insights from more than 3,800 professionals worldwide — offers a critical snapshot of this environment. It highlights persistent staffing shortages, the transformative impact of AI, rising stress levels and constrained budgets. Together, these findings underscore the delicate balance organizations must strike between technology, talent and well-being.

The Enduring Skills Gap: Reconnecting Education and Industry

The cybersecurity skills gap remains one of the industry’s greatest challenges. ISACA reports that 55% of organizations are understaffed, with hiring delays of three to six months for both entry-level (38%) and experienced roles (39%). Sixty-five percent of organizations struggle to fill open positions, leaving teams stretched thin and more vulnerable to threats.

A major driver of this gap is the disconnect between academic curricula and industry needs. Only 27% of respondents believe recent graduates are adequately prepared, citing deficiencies in threat detection (43%), data security (39%), and incident response (39%). Academic institutions must modernize programs in partnership with industry leaders. Hands-on training, internships, and certifications can better equip students with real-world capabilities.

Organizations should also broaden talent acquisition by considering nontraditional candidates. Over half of cybersecurity professionals (56%) have transitioned from other fields. Upskilling programs, boot camps, and certifications emphasizing transferrable skills can onboard diverse talent and reduce reliance on traditional pipelines.

Soft Skills: The New Cornerstone of Cybersecurity Success

While technical expertise remains vital, soft skills are now a differentiator. ISACA’s report highlights adaptability (61%) as the top qualification factor, even ahead of hands-on experience (60%), underscoring the need to learn and pivot. Meanwhile, critical thinking (57%), communications (56%) and problem-solving (47%) rank as the top soft skills needed.

To cultivate these competencies, organizations should invest in mentorship, cross-functional simulations, and team-building initiatives that foster collaboration and problem-solving. By blending technical know-how with human-centered skills, teams become more resilient in navigating a constantly shifting threat landscape.

Prioritizing well-being not only improves retention but also strengthens organizational resilience.

Rising Stress Levels: Addressing Burnout and Retention

The high-pressure nature of cybersecurity continues to impact employee well-being. Two-thirds of professionals (66%) report increased stress over the past five years, driven by complex threats (63%) and relentless demands. Nearly half (47%) cite workplace pressures as a reason for leaving, compounding retention challenges.

To mitigate burnout, organizations must adopt proactive workplace strategies:

  • Automate Routine Tasks: Use AI to reduce repetitive work and free staff for higher-value priorities.
  • Prioritize Mental Health and Flexibility: Offer flexible schedules, wellness programs, and access to mental health resources.
  • Foster Collaborative Cultures: Build supportive teams where employees can share challenges and solutions.

Prioritizing well-being not only improves retention but also strengthens organizational resilience.

AI: Harnessing Opportunity While Managing Risk

Artificial intelligence is reshaping cybersecurity operations, driving advances in threat detection (32% rank it as a top use in security operations), endpoint security (30%), and automation (28%). Its ability to process massive datasets and detect anomalies holds enormous promise.

Yet AI is a double-edged sword. Algorithmic bias, exploitable vulnerabilities, and malicious use — such as AI-crafted phishing campaigns — pose serious risks. Encouragingly, nearly half of cybersecurity teams (47%) are now contributing to AI governance policy, and 40% are involved in implementation.

To accelerate progress, organizations should invest in training on AI ethics, risk management, and governance frameworks. Embedding cybersecurity into AI systems from the outset — through robust validation and access controls — ensures these tools are secure and responsibly deployed.

Budget Constraints: Advocating for Sustainable Investment

Budgets remain a persistent barrier. More than half of respondents (53%) report underfunded programs, and only 41% expect increases this year — down from 47%. Limited resources make it harder to address threats effectively or sustain long-term resilience.

To secure funding, cybersecurity leaders must link investments to measurable business outcomes, such as reduced risk exposure, improved efficiency, or compliance savings. Encouragingly, 56% of boards now prioritize cybersecurity, creating a valuable platform for aligning initiatives with organizational strategy.

Strategic Imperatives for the Future

ISACA’s report is both a warning and a roadmap. To meet these challenges, organizations should:

  • Bridge the Skills Gap: Partner with academia to modernize curricula and expand hands-on learning.
  • Cultivate Soft Skills: Invest in programs that build communication, critical thinking, and adaptability.
  • Prioritize Employee Well-being: Implement stress management initiatives, promote flexibility, and leverage automation.
  • Integrate AI Responsibly: Involve cybersecurity teams in AI governance and risk mitigation from the outset.
  • Advocate for Funding: Tie cybersecurity investments to clear business value to secure sustainable budgets.

Striking the Right Balance for a More Secure Future

ISACA’s State of Cybersecurity 2025 report sheds light on the industry’s most urgent challenges. Addressing the skills gap, supporting employee well-being, responsibly leveraging AI, and securing adequate funding all require a holistic approach. Success will depend on collaboration among academia, industry, and business leaders.

Ultimately, cybersecurity is not just a technical problem — it is a people-driven mission. By balancing innovation with resilience and sustained investment, organizations can build security programs that endure in an increasingly complex world.

KEYWORDS: business continuity planning digital security security culture testing security tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Human hand and AI Hand

    Hackers: Generative AI unlikely to replace human cybersecurity skills

    See More
  • Cyber brain

    The fundamentals of cybersecurity in the age of AI

    See More
  • employee teamwork

    Growing cybersecurity skills gap necessitates human factor security

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • September 25, 2025

    Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

    ON DEMAND: Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing