Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Security icon

Security Priorities 2025

Safeguard your organization by preparing for growing cybersecurity challenges.

Cyber threats are evolving rapidly. So should security priorities.

AI has transformed the security landscape, and in 2025, IT leaders will need to protect against increasingly savvy threat actors. From dealing with typical attack vectors, such as phishing and credential capture attacks, to limitless possibilities for new vectors such as deepfakes and quantum computing, IT leaders will have to move far past reactive security. They will need to balance their approach and spend across the triad of people, process, and technology in the year to come.

The Security Priorities 2025 report highlights five key areas of focus in the fast-evolving security environment.

Five priorities for the security agenda in 2025

Based on the results of our Info-Tech Future of IT 2024 survey and interviews, this report examines five key priorities that could transform your security efforts in 2025.

1. Operationalize AI Security

The era of AI is here. Are you ready to tap its potential?

The AI revolution promises great opportunities and risks for organizations seeking to improve their cybersecurity posture. In 2025, IT leaders will need to ensure that proper guardrails are in place to mitigate risk with AI adoption.

2. Strengthen Your Identity & Access Management Program

Safeguard your data with a modern approach to identity and access management.

AI has added a new tool to cybercriminals’ belts – making identity-based attacks easier than ever before and more compelling. Block cybercriminals’ advances with a modern identity & access management program built on zero-trust principles.

3. Build a Resilient Vendor Risk Management Practice

Establish a game-changing approach to mitigating third-party risk.

With new third-party breaches making the headlines at an increasingly worrisome rate, IT leaders know they must adopt a risk-based approach to vendor security. See the entire picture through to the finish line with stakeholder engagement and support.

4. Defend Against Deepfake Attacks

Perceptions of reality are evolving. So should your defense.

Deepfake attacks have altered reality – leaving employees in the dark about who to trust and where to turn in search of help. Shine a light on AI-powered attacks by developing a resilient incident-response plan powered by people, process, and technology.

5. Prepare for a Post-Quantum Era

Prepare now to protect against the technologies of tomorrow.

Advances in technology are bringing us closer to the post-quantum era: a time when encrypted data won’t be as protected as it is now. Threat actors are preparing now to accelerate their attacks with quantum computing – how will you meet this new threat?


Security Priorities 2025 Research & Tools

1. Security Priorities 2025 Report – A data-driven report that reviews five priorities for security leaders in the upcoming year.

In this report, we provide five key priorities for IT leaders to combat the evolving cyber threat environment.

  • Operationalize AI Security
  • Strengthen Your Identity & Access Management Program
  • Build a Resilient Vendor Risk Management Practice
  • Defend Against Deepfake Attacks
  • Prepare for the Post-Quantum Era

Prepare now for the cyberattacks of the future with Security Priorities 2025.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

7.0/10


Overall Impact

$822


Average $ Saved

1


Average Days Saved

Client

Experience

Impact

$ Saved

Days Saved

Rautaruukki Oyj

Guided Implementation

7/10

N/A

1

No bad parts. I think this provided thought leadership to my Champions and my team and it did even make me think about the material in a new way.


SECURITY PRIORITIES 2025

INTRODUCTION

Analyst Perspective

Safeguarding against current threats while preparing for emerging ones has evolved the security threat landscape.

The past year saw various emerging opportunities and challenges continue to evolve the cybersecurity threat landscape. Many technology trends were adopted, which helped security leaders better protect their organizations, but they added associated risks, which exacerbated organizations’ risk exposure. Organizations were at a crossroads of leveraging innovative capabilities to get ahead of the Exponential IT curve while addressing and responding to various business disruptors. The advent of artificial intelligence (AI) over the past few years has opened a plethora of opportunities for organizations to stay competitive within their industries through efficient implementation of the technology to boost productivity and create value-driven strategies. However, threat actors also looked to capitalize on the technology for their own motivation and expanded their attack vector, which had organizations assessing the security of both leveraging and protecting against AI. This not only expanded the threat landscape but also attributed to the increased cost of a data breach, which rose by 10% from last year to USD 4.88M (“Cost of a Data Breach,” IBM, 2024). It is the largest increase since the pandemic and demonstrates the growing impact of security on organizations. Ransomware, another well-known attack vector, still appears to be the top threat for over 90% of industries (Verizon Business, 2024), which reflects its advanced capabilities as it becomes more prevalent through ransomware-as-a-service (RaaS) or extortion attacks. With over 80% of organizations compromised by at least one attack over the past 12 months, it is important to address the drivers for the increased incidents and understand what measures could be implemented to respond to the evolving threat landscape (CyberEdge, 2024).

In this year’s priorities report, we highlight five important security priorities security leaders should focus on for the upcoming year. We address the implications of these priorities, the benefits of adopting them, and the potential risks of not implementing them as part of your security strategy. We present applicable use cases where organizations adopted these priorities and the impact it had on their security program. We also discuss actionable next steps organizations should implement to spearhead the initiatives for each priority and provide resources to support the development of their strategy. Having these priorities in mind will ensure you are addressing the most pressing matters in cybersecurity through appropriate planning and execution to respond to threats and build a resilient cybersecurity program.

Ahmed Jowhar

Ahmad Jowhar

Research Analyst, Security & Privacy
Info-Tech Research Group

INTRODUCTION

Methodology

The security priorities were formulated through a multifaceted approach to ensure the most important security priorities are addressed.

Our security priorities for 2025 were derived through a comprehensive assessment of our annual Future of IT Survey, which asks IT decision-makers about their responses to emerging IT trends and how their organizations are addressing the opportunities, risks, and implications of emerging technology. Additional interviews were conducted with security experts to learn about their priorities, the current measures they have in place, and what areas they need guidance on.

FUTURE OF IT 2025 SURVEY

The Future of IT 2025 Survey was conducted between May and June 2024. The online survey received 970 responses from IT decision-makers across a broad range of industries and regions, with a focus on North America. Almost six out of ten respondents hold director-level seniority or higher. Each chart included in the report will specify the sample size received for the specific question or respondent group.

PRIORITIES INTERVIEW

In-depth interviews were conducted with IT leaders between August and October 2024 to collect insights on priority-making and agenda-setting for 2025. In total, 20 interviews with security subject matter experts were completed, with interviewees from industries such as healthcare, government, and higher education. The interviewees are from various continents and countries and have extensive security experience.

INTRODUCTION

Cybersecurity is a continuing disruptor to the business

Cybersecurity implications can impact various business factors.

Cybersecurity has continued to be a major business disruptor to organizations. With the increase in the number of organizations impacted by cybersecurity incidents, stakeholders of all levels are concerned about security risks and implications and the measures their organization has in place to respond to these incidents. It is why cybersecurity incidents was one of the top three factors expected to disrupt the business within the next 12 months in this year’s Future of IT Survey (n=694). Even though it was behind talent shortage and AI, cybersecurity incidents continues to be a top concern year over year for IT leaders. The increase in well-known cybersecurity incidents such as ransomware and identity-based attacks, coupled with the advent of sophisticated capabilities from emerging technologies, showcases the severe implications of cybersecurity incidents as an ongoing threat to the business. With less than 50% of organizations identifying their cybersecurity program as “extremely advanced,” it’s evident that many organizations would have challenges keeping up with the evolving threat landscape (Splunk, 2024).

Although cybersecurity incidents was the third most disruptive factor to the business, cybersecurity impacts all other business disruptors. The talent shortage in cybersecurity is a reflection of the growing global IT talent shortage affecting various industries. The need to ensure the safety and security of AI technology while also defending against threat actors who leverage its capabilities further expands the impact of AI on the business. Various government-enacted regulations have been developed in response to the growing cybersecurity threat and use of AI, which resulted in organizations struggling to keep pace with changing demands. Changing customer behavior is also impacted by customers’ digital trust in organizations to secure their data and protect their reputation from any security risks. The updates to certain cybersecurity frameworks such as NIST’s CSF 2.0 has organizations working toward adhering to best practices. The advent of quantum computing and the risk of post-quantum cryptography showcases the impact of other emerging technologies besides AI and how organizations can respond and prepare for the post-quantum era. Even the ability to stay competitive within an industry relies on a mature security program to enable business growth and innovation. Cybersecurity can be disruptive to various factors impacting the business, and improving an organization’s security posture would have a profound effect on addressing the many business disruptors it’s challenged by.

Factors that would disrupt the business in the next 12 months. The factors listed are: talent shortage, artificial intelligence, cybersecurity incidents, government-enacted policy or regulatory changes, changing customer behavior, industry body-enacted standards or regulation changes, other emerging technology besides AI, competition gets ahead of us.

INTRODUCTION

IT spending is increasing, but where is it being invested?

Cybersecurity has been the top investment priority for many years.

As organizations continue to innovate through technological capabilities to grow and stay competitive, the spending on technology also needs to increase to meet demand. Many organizations agree, with over 75% indicating a spending increase to their IT budget for next year (Future of IT 2025 Survey, 2024). Furthermore, with over a quarter indicating an increase of more than 10% in spending, many organizations understand the importance of significant investment into their IT operations to drive business growth and meet customer demand. Security spending has also seen an increase over the past few years to respond to the threat landscape and industry changes. It has been found to outpace IT spend and annual revenue growth, with security as a percentage of IT spend increasing to 13% this past year, compared to 8% in 2020 (IANS Research, 2024). This could be attributed to many factors, such as an increased presence of cybersecurity experts sitting on the board, with 60% of organizations having at least one board of director member with cybersecurity experience (CyberEdge, 2024). It is evident that organizations are taking a proactive approach to address security challenges and increase their resources to efficiently respond to threats.

As 85% of organizations increased their cybersecurity budget in 2024, it is not surprising to continue to see cybersecurity solutions as the top investment priority in 2025 (PwC, 2024). Even with the advent of emerging technologies and improved capabilities of AI and cloud computing, cybersecurity is still at the forefront of IT leaders’ spending priorities to strengthen their security posture and support the business’ strategic goals. Furthermore, with only 8% of respondents from our Future of IT 2025 Survey indicating a decrease in investment into cybersecurity solutions, it is clear that for organizations to continuously improve and stay ahead of the technology curve, substantial investments in cybersecurity will need to be made. Improvements to their security posture would be eminent, and the increased return on their security investments will demonstrate the benefits of the solution. At a time when threat actors are becoming more sophisticated through the efficient development of attack vectors and support from state sponsors, organizations should prepare to efficiently increase their investment in cybersecurity to defend against today’s adversaries while preparing to protect against tomorrow’s threats.

Organizations' 2025 spending change compared to 2025. 46% of organizations report an increase of 1 - 10%, and 26% report an increase of over 10%. Investment Priorities for 2025. Cybersecurity solutions is the top priority in 2025.

INTRODUCTION

Year of regulations and standards

New regulations and standards enacted due to emerging technologies and their security implications.

2024 can be remembered for many events that had an impact on society. From the various democratic elections that saw over four billion people vote to the 2024 Summer Olympics, which saw Paris as the host for the first time in 100 years. Many of these events had security implications that influenced their preparation and required ensuring the safety and security of individuals. However, 2024 can also be known by many security experts as the year of regulations and standards, with various countries and regulatory boards announcing new or revised regulations to promote improvement to an organization’s or country’s security posture. Both security and business leaders welcomed the enhanced security rules, which provide improved safeguard measures to address evolving threats. With 60% of executives attributing proper cyber and privacy regulations to effectively reducing risks, it is evident that these regulations and standards will help guide the cybersecurity improvement strategies for organizations while reducing their financial and reputational risks (World Economic Forum, 2024).

GOVERNMENT-ENACTED REGULATIONS AND BILLS

The US National Strategy: Along with the executive order on improving the nation’s cybersecurity enacted in 2021, the US government has developed a US National Cybersecurity Strategy, which will promote the “safe and secure digital ecosystem for all Americans.” Since its release in 2023, many of the strategies have gone into force this past year, which includes enhancing incident response plans and process, defending against ransomware, and preparing for the post-quantum future.

Canada’s Bill C-26: Canada’s Bill C-26 aims to improve the cybersecurity posture of critical industries, such as transportation and financial institutions, and the services and systems that are crucial for telecommunication services. This act includes mandates for organizations to implement a cybersecurity program that meets the standards of the Critical Cyber Systems Protection Act (CCSPA) and develop appropriate risk mitigation steps to reduce supply chain risks.

European Union’s NIS2: This past October marked the deadline for EU member states to enact the Network and Information Security (NIS) Directive 2 into applicable national law. This directive was enacted in early 2023 and was developed to strengthen cybersecurity capabilities around critical infrastructure.

REGULATORY STANDARDS

NIST CSF 2.0 Framework: NIST’s Cybersecurity Framework (CSF) provides guidance to organizations on proactively managing their cybersecurity risks. The changes to the previous framework include an introduction to the “Govern” function, which includes categories such as cybersecurity supply chain risk management, the refinement of categories, and the addition of new subcategories such as strategic opportunities.

INTRODUCTION

Training that goes beyond cybersecurity

Diversified training has been optimal to defend against an evolving threat landscape.

Investments in cybersecurity include not only the implementation of the right security solutions but also effective training and development that will equip your last line of defense with the confidence that they can protect your organization against adversaries. With the increase in cybersecurity talent shortages, exploring different approaches to meet your organization’s cybersecurity demands will enhance your employees’ security awareness, promote proactive security response, and improve the overall security culture through training and development. Addressing the security staffing shortage will also reduce the risk of cybersecurity incidents and their associated cost. In fact, investments in employee training was the top factor that reduced the average cost of a data breach, while a security skills shortage was the top factor that increased the cost of a data breach (“Cost of Data Breach,” IBM, 2024). This inverse relationship showcases the impact of effective security training to not only address the security staff and skills gap but also reduce your organization’s risk exposure, including any financial and reputational implications.

Employee training and development also extends into improving their AI knowledge and skill set to effectively leverage the technology and its capabilities to drive business growth and innovation. Future-proofing your IT workforce with essential AI competencies will ensure your organization possesses appropriate business and technical skills to support the responsible, reliable, and effective adoption of AI. Coupling cybersecurity with AI training would build resilience in your organization’s security posture, as you will possess the necessary AI skills to proactively assist your cybersecurity operations. Understanding AI from a security lens would also foster the responsible use of AI with appropriate governance that incorporates the security and privacy of AI technologies. With over 60% of organizations anticipating AI will have a significant positive impact on cybersecurity, it is important to ensure applicable training and development is provided to both domains, which will help you stay ahead of the curve, reduce your risk exposure, and proactively defend against the threats of emerging technologies.

Breached organizations who were experiencing security staffing shortage

53%

“Cost of Data Breach,” IBM 2024

FEATURED TRAINING

Cybersecurity Workforce Development Program

FEATURED TRAINING

Artificial Intelligence Workforce Development Program

INTRODUCTION

Moving from trends to priorities

Understand the security priorities by analyzing both how security leaders respond to trends in general and how specific security leaders responded in the context of their organization.

Analyze contextual and priority insights with their implications, opportunities and risks, case examples, and priorities to action.

SECURITY PRIORITIES 2025

01

Operationalize AI Security

02

Strengthen Your Identity & Access Management Program

03

Build a Resilient Vendor Security Management Practice

04

Defend Against Deepfakes

05

Prepare for a Post-Quantum Era

Safeguarding your organization by preparing to respond to the growing cybersecurity challenges.

PRIORITY 01

OPERATIONALIZE AI SECURITY

Implement the right guardrails to help AI yield its potential.

  • Establish a responsible AI governance structure
  • Ensure the security and privacy risks of AI technologies are assessed
  • Develop a plan to address and mitigate the risks of AI technologies

Safeguard your organization by preparing for growing cybersecurity challenges.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

MEMBER RATING

7.0/10
Overall Impact

$822
Average $ Saved

1
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

You get:

  • Security Priorities 2025 Report

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Author

Ahmad Jowhar

Contributors

  • Douglas Albro, VP Information Systems, Ram Technology
  • Keith Barros, CISO, Chapman University
  • Gina Strickland, CIO, Miller Zell
  • 3 anonymous contributors
  • 970 survey completion from Future of IT 2025 Survey

Search Code: 106443
Last Revised: January 14, 2025

Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171