Elevating Cybersecurity 2025

Page 6 of 26 · WEF_Elevating_Cybersecurity_2025.pdf

The complexity surrounding the CISO role1 The increasing complexity of the cyber landscape is reshaping the role of the CISO. The transformation of the cyber landscape calls for dialogue between practitioners and business leaders to redefine the fundamental attributes of the CISO.2 Before examining this in more detail, this paper explores how each of these factors of complexity – and their interplay – affects and shapes the CISO role and mandate. –Geopolitics: Geopolitical tensions exert an influence on cyber strategy in nearly 60% of organizations, according to the Global Cybersecurity Outlook 2025 survey. In addition, the Microsoft Digital Defense Report 2024 emphasizes the escalation of state-sponsored cyberthreats.3 Current geopolitical tensions – which can lead to wars or tariffs – require CISOs to adapt their security strategy and advise the business on their approach to security towards different events, such as changing regulations, technologies under sanctions, reputational damage and so forth. The current debates on data sovereignty, driven by the shifting geopolitical landscape, are also influencing countries’ and organizations’ technology narratives. As systems become increasingly fragmented regionally, it makes it harder for CISOs to aggregate data to detect attacks. CISOs need to find efficient ways to gain central visibility over a more diverse and dynamic systems landscape. –Cybercrime: Some 72% of respondents to the Global Cybersecurity Outlook 2025 survey said that cyber risks have risen in the past year. Some of the factors may include the rise of cyber-enabled fraud, driven by an increase in phishing and social engineering attacks. Additionally, identity theft is one of the top risks that concerns people on an individual level. The increased volume of cybercriminal networks and cybercrime types – including advanced persistent threats (APTs) developed by state- sponsored groups, scam farms, ransomware and supply chain attacks – means that CISOs need to proactively determine how to make threat intelligence actionable and valuable for their organizations and focus on establishing trusted collaboration lines with peers within their ecosystem. –Regulatory requirements: According to the Global Cybersecurity Outlook 2025 survey a total of 78% of leaders from private organizations feel that cyber and privacy regulations effectively reduce risk in their organization’s ecosystems. However, the complexity and proliferation of regulatory requirements poses a significant challenge. Geopolitical tensions and emerging technologies, among other factors, have led to diverging regulations across regions. The cybersecurity compliance landscape thus becomes more fragmented, adding layers of compliance levels. CISOs need to devote more resources to managing a higher number of (sometimes opposing) requirements. –Emerging technologies: Some 66% of respondents to the Global Cybersecurity Outlook 2025 survey believe that AI will affect cybersecurity in the next 12 months, but only 37% have processes in place for safe AI deployment.4 Additionally, AI-related spending across industries is projected to reach approximately $639 billion by 2028.5 The rise of digitalization and innovation – with the development of technologies such as quantum computing – expands the attack surface that CISOs manage, while rapidly evolving technologies demand that CISOs and their teams stay continuously informed about both the associated risks and the potential benefits to the business. CISOs need to balance the speed of innovation while adapting quickly to ensure the resilience of their organizations.1.1 The intricate landscape in which the CISO operates Elevating Cybersecurity: Ensuring Strategic and Sustainable Impact for CISOs 6
Ask AI what this page says about a topic: