2025 Cybersecurity Predictions By Qualys
Posted: Wednesday, Jan 08

i 3 Table of Contents

2025 Cybersecurity Predictions By Qualys

1. Prediction: The increasing use of AI will not alter the basics of cybersecurity strategies ย 

โ€œWhile several enterprises are looking for the next best AI solution in an effort to fight fire with fire, I am reminded of the famous Alphonse Karr quote, โ€œThe more things change, the more they stay the same.โ€ As such, a better question is, โ€œWhat do businesses stand to lose (i.e. what is the value at risk) from AI abuse and misuse?โ€ And what portion of this risk can be addressed with current security capabilities? For example, is securing an AI agent from threats like spoofing, tampering, information disclosure, denial of service, escalation of privileges, actually novel? Does it require new investments to stand up a dedicated โ€œAIโ€ security stack? Similarly, consider that AI models consist of open source and first party code deployed on-premises, in the cloud, or both. Infrastructure, software pipeline, and supply chain security practices still apply. So again, the question is, do we really need a complete security rethink?โ€ฏย 

My recommendation is that security teams proactively address these evolving threats by developing robust threat models and establishing guardrailsโ€”essentially โ€œsecure by defaultโ€ solutions. Ultimately, the key challenge lies in balancing the desire for rapid digital transformation with the imperative of safeguarding enterprise assets against potential AI-related abuses.โ€ย 

2. Prediction: The โ€˜human factorโ€™ will be key to guarding against the increase in hackers leveraging AI for offensive attacksย 

โ€œAI will enable bad actors to do what they have always done, but just faster. Just like defenders, they will use AI to automate software development and expedite the analysis of reams of data to discover plausible vulnerabilities and select and execute exploits.ย 

One critical area for improvement lies in addressing human vulnerabilities, often referred to as “layer 8” in cybersecurity. Since humans are easily spoofed, it’s essential to implement stronger forms of multi-factor authentication and privileged access management. These measures can help mitigate risks associated with social engineering and wire fraud, which are likely to increase as attackers utilize AI for more sophisticated tactics.โ€ย 

3. Prediction: In the next five years, AI-driven cybersecurity will enhance operational efficiency for defenders, but the human element will remain crucial in interpreting data and making decisions.ย 

โ€œOver the next five years, we can expect significant improvements in operational and capital efficiency for defenders, as AI continues to automate routine tasks and streamline processes. This will free security practitioners to focus on more complex challenges, particularly those involving “irreducible uncertainty”โ€”situations where the risk cannot be fully understood through empirical data.ย 

As the deterministic aspects of cybersecurity are automated, the role of experts will increasingly shift toward decision-making in uncertain scenarios. AI will aid in modeling these risks, but the effectiveness of these models will heavily depend on the expertise and assumptions of the security professionals using them. This means that while AI will enhance analytical capabilities, the human element will remain critical in interpreting data and making informed choices among plausible alternatives. Security professionals will continue to play a vital role in navigating complexities and uncertainties, underscoring the importance of their expertise in the evolving landscape of AI-driven cybersecurity.โ€ย 

4. Prediction: Automation and orchestration will grow in importance in 2025 to centralize risk telemetry across cloud, endpoints, and IoT devices.

โ€œLanding all your risk telemetry into one place will become common.โ€ฏMany organizations are already aggregating IT, OT and cloud-native risk data into security data lakes, including asset state and changes over time, along with threat and vulnerability intelligence. Note that telemetry consumption is not the same as risk measurement.โ€ฏAt a minimum, assets must be normalized, and scores must be rationalized.โ€ฏFrom there, automation will enable organizations to measure operational efficiency in controlling attack surfaces and implement “policy-as-code” using AI copilots. AI-driven tools will drive down risk in both a capital and operationally efficient manner.โ€ย 

5. Prediction: Cyber risk quantification (CRQ) will be a core organizational practice for most CISOs in the next five yearsย 

โ€œMeasuring risk is a core capability, not a product. As cybersecurity maturity grows, the integration of financial metrics with technical security data will become critical.โ€ฏ The industry calls this “CRQ” but I call it cybersecurity risk management.โ€ฏYou can’t extract quantitative measurement from the broader domain of cybersecurity risk management โ€“ they are one and the same. The good news is that the majority of CISOs will have CRQ capabilities in 2025 โ€“ in part or wholly integrated into their cybersecurity risk management programs.”ย 

ย 6. Prediction: The relationship between CISOs, the C-suite, and boards will evolve toward more strategic collaboration, driven by a focus on economic and operational efficiencyย 

โ€œThe CISO that focuses on economic and operational efficiency will be fast friends with business focused leaders.โ€ฏThe modern CISO will see risk management as minimizing business impact without breaking the bank. Itโ€™s that simple in theory.โ€ฏIn practice, the CISO must do this in a structured manner that is explainable to business stakeholders and executable by operators, which goes back to measurement as a career skill and core security capability. Clear, measurable communication will be essential, allowing CISOs to translate complex security strategies into actionable insights for business leaders.โ€ฏIn short, our relationship with business folks who are focused on winning will be improved to the extent we adopt the right concepts, objects and methods of measurement. This approach will foster stronger partnerships with the C-suite, enhancing decision-making and driving business outcomes while managing cyber risk effectively.โ€ย 

Richard Seiersen
I'm focused on cybersecurity risk management โ€“ as a modern enterprise practice and leadership skill. My books, speaking, and work support security leaders who need to align security practice with business goals. That alignment is at the heart of cybersecurity risk management. As the Chief Risk Technology Officer at Qualys I help customers and the broader security community measure, communicate, and eliminate risk. With over 10 years of experience as a CISO, I have led and supported security strategy, operations, and governance across various industries and orgs, including Twilio, GE, and LendingClub. I am also a published author and a faculty member at IANS, where I share my insights and knowledge on security metrics and risk management. My books, "How To Measure Anything In Cybersecurity Risk" and "The Metrics Manifesto: Confronting Security With Data", provide practical and innovative approaches to quantifying and reducing security risk.
Share This