
Analysts to Explore the Future of Cybersecurity at the Gartner Security & Risk Management Summit, 12-14 September in London
As cybersecurity strategy, leadership and technologies continue to evolve, Gartner, Inc. highlighted three steps security leaders can take now to prepare for the emerging threat landscape over the next 10 years.
“The rise of artificial intelligence (AI) is a double-edged sword for CISOs,” said Katell Thielemann, VP analyst at Gartner. “Organisations are facing a deluge of automated cyberattacks, which are exponentially rising in velocity, variety and complexity. However, AI is simultaneously supporting security teams in detecting and responding to threats, fundamentally changing organisations’ defence paradigms.”
“If the 2020s were the decade of ‘hybrid everything,’ the 2030s will be the decade of ‘augmented everything,’” added Andrew Walls, distinguished VP analyst at Gartner. “Attackers are weaponising AI just as fast as organisations augment their defences with it, meaning that it’s not enough for cybersecurity technologies to evolve – strategy and leadership approaches must change, too.”
Invoke Continuous Foresight
Security leaders must look beyond immediate threats and embrace continuous foresight, a strategy that integrates research insights into internal capabilities and third-party tools to maintain a proactive security approach.
Gartner forecasts that information security spending will reach $187 billion in 2023, an increase of 11.1% from 2022. As security budgets continue to rise, CEOs and Boards of Directors will expect a highly strategic approach to security investment that results in demonstrable returns typified by fewer breaches and greater enterprise resilience. Pursuing multiple models of the future will enable security leaders to build an investment strategy that is flexible enough to respond to new threats with agility.
Play to Your Strengths as a Leader, But Know Your Weaknesses
Effective enterprise cybersecurity requires deep technical, business and strategy expertise, yet it is unlikely that one security leader excels in all three areas. In fact, Gartner predicts that by 2025, a single, centralised cybersecurity function will not be agile enough to meet the needs of a digital organisation.
“The most effective CISOs don’t try to do it all,” said Thielemann. “Play to your strengths as a leader, and then augment your teams with those who complement your weaknesses.”
Remember the Attack Is Never Over
The nature of technology is one of perpetual change, meaning that new attack techniques and threat vectors will continue to emerge as new technologies do. Security leaders must remain on the cutting edge of technology innovation by investigating solutions including cybersecurity mesh architecture, AI-augmented security tools, homomorphic confidential computing and other emerging security technologies.
Fachartikel

RISE with SAP: Wie Sicherheitsmaßnahmen den Return on Investment sichern

Jailbreaking: Die unterschätzte Sicherheitslücke moderner KI-Systeme

VoidLink: Cloud-native Linux-Malware mit über 30 Plug-ins entdeckt

Angriffsphasen verstehen: Cyber-Kill-Chain in Unternehmens-IT und Industrieanlagen

Schwachstelle in ServiceNow ermöglicht Übernahme von KI-Agenten
Studien

IT-Modernisierung entscheidet über KI-Erfolg und Cybersicherheit

Neue ISACA-Studie: Datenschutzbudgets werden trotz steigender Risiken voraussichtlich schrumpfen

Cybersecurity-Jahresrückblick: Wie KI-Agenten und OAuth-Lücken die Bedrohungslandschaft 2025 veränderten
![Featured image for “Phishing-Studie deckt auf: [EXTERN]-Markierung schützt Klinikpersonal kaum”](https://www.all-about-security.de/wp-content/uploads/2025/12/phishing-4.jpg)
Phishing-Studie deckt auf: [EXTERN]-Markierung schützt Klinikpersonal kaum

Gartner-Umfrage: Mehrheit der nicht geschäftsführenden Direktoren zweifelt am wirtschaftlichen Wert von Cybersicherheit
Whitepaper

ETSI veröffentlicht weltweit führenden Standard für die Sicherung von KI

Allianz Risk Barometer 2026: Cyberrisiken führen das Ranking an, KI rückt auf Platz zwei vor

Cybersecurity-Jahresrückblick: Wie KI-Agenten und OAuth-Lücken die Bedrohungslandschaft 2025 veränderten

NIS2-Richtlinie im Gesundheitswesen: Praxisleitfaden für die Geschäftsführung

Datenschutzkonformer KI-Einsatz in Bundesbehörden: Neue Handreichung gibt Orientierung
Hamsterrad-Rebell

Cyberversicherung ohne Datenbasis? Warum CIOs und CISOs jetzt auf quantifizierbare Risikomodelle setzen müssen

Identity Security Posture Management (ISPM): Rettung oder Hype?

Platform Security: Warum ERP-Systeme besondere Sicherheitsmaßnahmen erfordern

Daten in eigener Hand: Europas Souveränität im Fokus






