Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnLogical SecuritySecurity & Business Resilience

Cyber Tactics

Sizing Up Top Tech Trends and Priorities for 2026

A look into areas security professionals and digital trust practitioners should be mindful of in the year to come.

By Pam Nigro, Contributing Writer
Top Tech Trends for 2026
Marut Khobtakhob / iStock / Getty Images Plus / Via Getty Images
December 29, 2025

2026 promises a new era of innovation, powered by artificial intelligence. Yet, as ISACA's latest research reveals, this technological leap forward brings a parallel surge in sophisticated cyber threats. Security professionals will need to navigate this complex landscape.

ISACA’s 2026 Tech Trends and Priorities Global Pulse Poll, which surveyed more than 2,963 professionals in digital trust fields such as cybersecurity, IT audit, governance, risk and compliance, show that the security community is both excited and anxious for 2026 amid an increasingly perilous cyber risk landscape: while AI and generative technologies promise transformation, they also introduce new risks and demand robust governance. The struggle to keep pace with change and secure digital trust is compounded by resource constraints and a global shortage of skilled professionals.

Read on for five things to expect and five ways to prepare.

Five Things to Expect in 2026:

  1. AI dominates the agenda: Artificial intelligence, including machine learning and generative AI, are the top technology priorities for 2026, with predictive analytics, automation and content/code generation leading the ways it is being used. The majority of respondents (62%) identified AI and machine learning as top technology priorities, reflective of AI’s growing relevance both as a tool for practitioners to work more efficiently and as a layer of added complexity to contend with on the threat landscape.
  2. Cybersecurity risks intensify: AI-driven social engineering (63%), ransomware/extortion attacks (54%) and insider threats (35%) are the most significant cyber threats organizations expect to face, with AI-driven social engineering’s prominence reinforcing the overlap between AI’s rise and the evolving threat landscape. AI is making these attacks more effective by enabling hyper-personalized phishing campaigns, automating ransomware deployment, and identifying vulnerable insiders with greater accuracy.
  3. Talent shortages threaten progress: Nearly half of organizations expect to hire for digital trust roles, but anticipate difficulty finding qualified candidates, particularly in audit, risk, and cybersecurity, potentially leaving critical security gaps. Meanwhile, 39% say they will be hiring for more digital trust roles in 2026 than they did in 2025. This shows great opportunity exists for aspiring professionals in these fields.
  4. Workforce upskilling is essential: Upskilling in data security and emerging tech risk management is a top improvement area, with organizations seeking more training, awareness, and role-specific certifications. As organizations increasingly make artificial intelligence and other emerging technologies a focal point in their business models and operations, a willingness to gain additional expertise in these areas will loom large for the tech workforce. Examples of layering AI knowledge into existing skill sets include the new ISACA Advanced in AI Audit™ (AAIA™) and ISACA Advanced in AI Security Management™ (AAISM™) credentials.
  5. Cloud security and migration remain central: Respondents express concern about potential data compromises, adherence to cloud regulatory frameworks and the persistent shortage of qualified cloud security talent, as 47% of respondents say cloud migration and security are “very important” focus areas, highlighting the continued shift to cloud and associated risks.

The struggle to keep pace with change and secure digital trust is compounded by resource constraints and a global shortage of skilled professionals.

Given these and other trends identified in the ISACA survey, here are five areas security professionals and other digital trust practitioners should be mindful of in 2026:

  1. Establish robust AI governance and risk frameworks that address data privacy, algorithmic bias, and security vulnerabilities inherent in generative AI applications. Prioritize explainability and transparency in AI deployments.
  2. Accelerate workforce upskilling in high-impact areas such as AI information security management and cloud security, and invest in continuous learning, certifications and internal mobility.
  3. Modernize legacy systems and infrastructure — such as outdated operating systems, unpatched applications, and vulnerable network protocols — to reduce attack surfaces and improve agility. This is especially critical in the context of preparedness for the impending era of quantum computing.
  4. Strengthen cyber resilience and business continuity planning by developing and regularly testing incident response plans, ransomware recovery strategies and cross-functional crisis management protocols.
  5. Understand the key connection points between evolving compliance requirements and your security operations. Take the first step toward securing your future by engaging with expert communities such as ISACA and investing in compliance tools and frameworks. Conduct an immediate assessment of your organization's AI risk profile and begin planning for workforce upskilling to stay ahead of the curve.
KEYWORDS: business continuity planning digital security security culture testing security tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Business Continuity Plan

    Your Mid-Year BCP Wake-Up Call: Is Your Business Ready?

    See More
  • Smart watch security

    Securing the Digital Frontier: Strategies for Safeguarding Companies and Customers in the Age of Wearables

    See More
  • data-center

    People, processes, and tech: 2021’s top cybersecurity priorities

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing