Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses

We can’t outpace the adversary by trying to stop every attack, but we can outlast them by engineering systems and culture to take a punch and try to quickly rebound.

Cyber Resilience

If there’s one lesson from the past year, it’s this: we won’t outpace the adversary by trying to stop every attack. We will, however, outlast them by becoming measurably more resilient. In my recent lecture on emerging threats for 2026, I made the case that cyberattacks will be more complex, more persistent, more intelligent, and far more automated than we’ve seen before. That means our odds of outright prevention diminish. The imperative shifts to resilience; the ability to take a punch, adapt in the moment, and rebound quickly with minimal damage.

Resilience isn’t a technology purchase. It’s an organizational capability. And it only works when it’s truly holistic: governance that’s clear and practiced; operational readiness that’s tested, not assumed; technology that’s engineered for recovery as much as detection; and people who understand their role and can act under pressure. 

Culture, communication, and accountability are not the soft stuff; they’re the multipliers.

The Four Drivers of Cyber Risk for 2026

Attackers are already using automation to scale reconnaissance, craft highly tailored lures, and pivot faster inside compromised environments. Expect synthetic identities and convincingly faked voices and videos to erode trust between customers and brands, and even between colleagues. 

On the defensive side, AI can accelerate detection and response, but tooling without guardrails will create fresh exposures. Your questions as a board should be: Where have we embedded AI in critical workflows? How do we assure the provenance and integrity of the data those models touch? Are we red-teaming our AI-enabled processes, not just our perimeter? And have we trained our people to manage AI-driven social engineering at scale?

Advertisement. Scroll to continue reading.

Second, third party ecosystems present attack surface. The risk isn’t abstract: it’s a payroll provider outage that stops salaries, a logistics partner breach that stalls distribution, or a SaaS compromise that leaks your crown jewels. 

Map your tier-one and tier-two critical dependencies. Establish continuous control monitoring for high-risk vendors. Limit vendor access to least privilege, segment it aggressively, and ensure you have a “kill switch” to disconnect and operate in a degraded mode if needed. And remember, termination planning is a resilience control, not just a procurement formality.

Third is quantum computing. Some will say it’s too early; some will say it’s too late. The pragmatic position is this: crypto agility is a business requirement now. Inventory where and how you use cryptography—applications, devices, certificates, key management, data at rest and in transit. Prioritize crown-jewel systems and long-lived data that must remain confidential for years. 

Start piloting post-quantum cryptography in non-customer-facing contexts and adopt hybrid approaches where appropriate. Build the ability to swap algorithms and rotate keys without tearing down systems. 

Fourth is the risk posed by geopolitics. We live in a more unstable world, and digital risk doesn’t respect borders. Conflicts spill into cyberspace, data sovereignty rules tighten, and critical components can become chokepoints overnight. 

Scenario planning isn’t a workshop—it’s a rehearsal for the messy middle of a real event. Run cross-border scenarios that combine cyber, legal, communications, and operations. Ask whether your recovery assumptions hold if a region is offline for a month or a supplier in a sensitive jurisdiction is suddenly out of bounds.

Bringing the Message From The Boardroom to the Practitioner

Start by setting ownership. Create a cross-functional resilience council—CIO, CISO, COO, CHRO, General Counsel—tasked with translating business priorities into resilience outcomes. The goal is simple: when—not if—an incident occurs, we don’t debate roles; we execute.

  • Measure what matters. Time to detect, time to contain, and time to recover are your north stars. If you can’t restore your top five business services to minimum viable levels within defined windows, invest there before buying another detection widget. Engineer for isolation, backup integrity, and clean-room recovery. 
  • Run an executive tabletop that blends the four drivers: an AI-enabled extortion attempt with a third-party outage and a cross-border regulatory wrinkle. Decide in advance what you’ll pay or not pay, who speaks to whom and when, and what minimum viable service looks like for customers and regulators. Make it uncomfortable. That’s the point.
  • Tighten identity and access. Most breaches still hinge on credentials. Enforce phishing-resistant MFA for employees and vendors, implement privileged access management with just-in-time elevation, and separate third-party identities from your core directory. 
  • Invest in people and culture. Short, story-driven education beats mandatory click-throughs every time. Give managers talking points for their teams. Celebrate early reporting of mistakes and near-misses. In a crisis, muscle memory and psychological safety win.

On AI, establish guardrails now: data classification and provenance requirements for any AI use case; model-risk management that mirrors financial controls; and red teaming of AI-enabled business processes. 

On quantum, publish your crypto inventory and a roadmap for algorithm agility aligned to emerging standards. 

On third parties, move to continuous assurance for your most critical suppliers and ensure your contracts grant you the right to validate controls and to disconnect swiftly.

Finally, set incentives and transparency. Tie resilience metrics to executive compensation. Use cyber risk quantification to express exposure in financial terms in a language the board understands. Revisit cyber insurance with a clear-eyed view of systemic risk exclusions and catastrophe triggers.

Final Thoughts

We won’t repel every attack in 2026. But we can decide to bend rather than break. Resilience comes of age when it stops being a slogan and becomes a practiced capability—where governance, operations, technology, and people move as one. If we do that, the year ahead won’t just be survivable; it will be one where trust becomes a competitive advantage. And in a world of intelligent, persistent, automated threats, trust may be the most valuable asset we have.

Related: How the Best CISOs Drive Operational Resilience

Written By

Steve Durbin is Chief Executive of the Information Security Forum, an independent association dedicated to investigating, clarifying, and resolving key issues in information security and risk management by developing best practice methodologies, processes, and solutions that meet the business needs of its members. ISF membership comprises the Fortune 500 and Forbes 2000.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.