State of Cybersecurity
State of Cybersecurity
Information
Security © 2024 ISACA. All rights reserved.
2 STATE OF CYBERSECURITY 2024: GLOBAL UPDATE ON WORKFORCE EFFORTS, RESOURCES, AND CYBEROPERATIONS
CONTENTS
4 Executive Summary
5 Survey Methodology
17 Pipeline Progress
17 / Qualifying Applicants
20 / University Insights
22 / Qualifying Workforce Issues
22 / Professional Development Needs by Career Stage
22 / Human Capital Mitigations
33 Cyberrisk
34 / Cyberinsurance
39 Acknowledgments
ABSTRACT
State of Cybersecurity 2024: Global Update on Workforce Efforts, Resources, and
Cyberoperations reports the results of the annual ISACA® global State of Cybersecurity
Survey, conducted in the second quarter of 2024. This survey report focuses on the
current trends in cybersecurity workforce development, staffing, and budgets; threat
landscape; cyberrisk; and use of artificial intelligence (AI). Although past annual
cybersecurity reporting did not indicate major shifts in views or trends, 2024
survey data reveal multiple changes which carry the potential to adversely affect
cybersecurity readiness.
Executive Summary
The tenth annual ISACA® global State of Cybersecurity • Sixty-six percent of respondents report that
Survey continues to identify current challenges and trends occupational stress is much higher than five years
within the cybersecurity field, while ISACA continues ago—81 percent of respondents attribute the higher
to expand its longitudinal reporting with year-over-year stress to an increasingly complex threat environment.
comparison survey results in State of Cybersecurity 2024.
• Open cybersecurity roles at all levels continue to wane.
This year’s report analyzes survey results on cybersecurity
Survey data reveal steep declines in vacant technical
skills, staffing, and budgets; cyberthreats; cyberrisk; and,
and nontechnical individual-contributor positions.
new this year, artificial intelligence (AI).
Cybersecurity manager positions drop nine percentage
Compared with prior year, some survey-result data points (from 60 percent) to their lowest level ever
has not changed, while other data reinforce the finding reported for the State of Cybersecurity Survey. Senior
last year that market uncertainty is having a marked manager/director vacancies decrease for the third
impact—especially on budgets and compensation, consecutive year. Executive cybersecurity positions do
which carry the potential to adversely affect the same, but not as severe.
cybersecurity readiness.
• Economic conditions appear to be discouraging
Key findings include: employees from leaving current jobs—especially
within the United States. The top two reasons why
• The aging workforce is growing. For the first time in
cybersecurity professionals leave their jobs are
the 10 years of this survey, the largest percentage
selected by fewer respondents this year—recruitment
of respondents are between the ages of 45 and 54
by other companies drops by eight percentage points
(34 percent). This age group overtakes respondents
to 50 percent and poor financial incentives drops
between the ages of 35 and 44 (30 percent). These
by four percentage points to 50 percent. High work-
results, combined with no uptick in the percentage
stress levels jumps to 46 percent—three percentage
of respondents who are ages 34 and below and no
points higher than last year’s survey results. The
increase in the number of respondents who manage
ongoing employer-employee struggle over return-to-
staff with less than three years of experience, are an
office mandates is likely fueling the increase of four
alert to industry leaders to consider succession plans
percentage points in respondents who identify limited
for any sudden increase in attrition.
remote work possibilities as a reason for attrition.
• This year’s survey findings show a slight
improvement in appropriate staffing levels. Thirty-
Economic conditions appear to be discouraging
eight percent of respondents believe that their employees from leaving current jobs—especially within
cybersecurity team is appropriately staffed, which is the United States.
an increase of two percentage points over last year’s
results. Respondents who believe that their team
• Employer benefits are shrinking. Fewer employers are
is somewhat understaffed (43 percent) decreases
paying for professional development training, dropping
by three percentage points from last year. Analysis
seven percentage points from last year’s survey
reveals no relationship between staffing levels and
results. Employers offering flex hours shows a similar
whether enterprises use AI to mitigate shortfalls.
drop this year.
• Hands-on cybersecurity experience continues to be the • budgets will plateau. Thirteen percent of respondents
primary factor in determining whether a candidate is expect budgets to shrink over the next year—a view that
considered qualified. Although views on credentials and is incrementally growing since 2022.
hands-on training are unchanged, respondents place
• Threat-landscape data change very little, with two
less emphasis on prior-employer recommendations
caveats—exploitations attributed to nonmalicious
and university degrees. Respondents report an increase
insiders drops to 9 percent, which is an acceptable
in the importance of association membership.
metric for effective insider-threat and cybersecurity
• Leveraging training to allow interested nonsecurity education and awareness training programs.
professionals to move into security roles and increased Respondents indicating the “Not applicable” answer
use of contractors or consultants remain the primary declines five points, which is not surprising given an
mitigations for the cybersecurity technical skills gaps. increasingly complex threat landscape.
Training decreases by four percentage points, and
• Almost half do not know what kind of cyberinsurance
increased use of contractors or consultants increases
their enterprise carries. From a regional perspective,
by two percentage points. After last year’s decline,
57 percent of those in Oceania lacked knowledge of
increased reliance on AI or automation to address
their enterprise cyberinsurance type, followed by North
staffing shortages rebounds to 23 percent. The use of
America (49 percent) and Europe (43 percent).
apprenticeship or internship programs decreased by
three percentage points. • Use of AI in security operations remains in its
infancy. Threat detection/response (28 percent) and
• Cybersecurity funding levels drop significantly this
endpoint security (27 percent) are the most popular
year, and its incremental year-over-year decline shows
applications. Eighteen percent of respondents prefer
signs of a potential multiyear freefall. Just thirty-six
to not answer. The number of respondents reporting
percent of respondents indicate that their cybersecurity
that either they or a team member are involved in the
budgets are appropriately funded, and 44 percent of
development, onboarding, or implementation of AI
respondents believe that their budgets are somewhat
solutions is disheartening. Nearly half (45 percent)
underfunded—an increase of four percentage points.
report no involvement. Results are similar regarding
Only 47 percent of respondents believe that budgets
respondent involvement in the development of AI
will increase, and 41 percent of respondents report that
governance policies.
Survey Methodology
In the second quarter of 2024, ISACA sent online formats and presents respondents with questions
survey invitations to a global population of cybersecurity across six focus areas:
professionals. • Hiring and Skills
The survey uses multiple-choice and Likert-scale • Organizational Cybersecurity and Governance
A total of 1,868 respondents completed the survey Of the 1,868 respondents, 47 percent indicate that
in its entirety, and their responses are included in cybersecurity is their primary professional area of
the results. 1
responsibility. Figure 1 shows demographic information
about the respondents, who hail from 102 countries
This survey has a margin of error of +/- 2 percent at a and territories. Figure 2 further illustrates the breadth of
95-percent confidence interval. Survey data was collected survey input, showing that respondents represent more
anonymously, and response rates vary by question. than 17 industries.
REGIONS
N O R T H A M E R I CA* E U RO PE AS I A** C H I N A†
INDUSTRIES
7%
3% 4%
25 % INDIA
5%
L AT I N A M E R I CA A F R I CA
OCEANIA
T EC H N O LO GY * Including Caribbean and Central America ** Excluding China † Including Hong Kong and Macau
S E RV I C E S/C O N S U LTI N G
MAIN AREA OF RESPONSIBILITY
59%
21% 36%
CY B E RS EC U R IT Y
M A N AG E M E N T
8%
FI N A N C I A L /BA N K I N G IT
C O M PLI A N C E
13% E M PLOY E D I N
A N E N T E R PR IS E
W IT H
AT L E AS T
14 % IT R IS K
11% M A N AG E M E N T
1,500
GOV E R N M E N T/M I LITA RY CY B E RS EC U R IT Y
E M PLOY E E S
(N ATI O N A L /S TAT E /LO CA L) PR AC TITI O N E R
1 Some survey questions included the option to choose “Don’t know” from the list of answers. Where appropriate, “Don’t know” responses were removed
from the calculation of findings, consistent with prior-year survey reports. Result percentages are rounded to the nearest integer.
Technology services/
25%
consulting
Financial/banking 21%
Government/military
14%
(national/state/local)
Other 8%
Healthcare/medical 6%
Manufacturing/engineering 5%
Telecommunications/
4%
communications
Insurance 4%
Retail/wholesale/distribution 2%
Utilities 2%
Transportation 2%
Mining/construction/ 2%
petroleum/agriculture
Public accounting 1%
Aerospace 1%
Legal/law/real estate 1%
Advertising/marketing/media 1%
Pharmaceutical 1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
<1%
18-24 <1%
<1%
9%
25-34 9%
11%
30%
35-44 34%
35%
34%
45-54 32%
30%
19%
55-64 19%
16%
3%
65+ 2%
2%
4%
5%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
14%
Significantly understaffed
13%
43%
Somewhat understaffed
46%
38%
Appropriately staffed
36%
2%
Somewhat overstaffed
2%
1%
Significantly overstaffed
1%
2%
Not applicable
2%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
2024 2023
2 Kalser, A.; “Employees are staying put — but how long will that last?,” HR DIVE, 23 May 2024, www.hrdive.com/news/attrition-low-but-for-how-
long/716827/
3 PoliteMail, “How the Big Stay Has Replaced the Great Resignation,” 13 March 2024, https://politemail.com/how-the-big-stay-has-replaced-the-great-
resignation/
Africa 65%
China 56%
Europe 55%
India 66%
Oceania 64%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
90%
80%
64%
70%
60%
57% 56% 55%
60% 53%
50%
40%
30%
20%
10%
0%
4 The figure depicts the percentage of “Yes” responses to the question by reporting region.
5 The figure depicts “Yes” responses for the years 2019 to 2024.
Other 11%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
46%
Non-entry-level positions
50%
18%
Entry-level positions
21%
38%
No open positions
35%
10%
Don’t know
8%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
2024 2023
4%
< 1 month
2%
7%
1 month
4%
18%
2 months
11%
37%
3–6 months
38%
13%
> 6 months
27%
2%
Cannot fill open positions
2%
7%
Not applicable
5%
12%
Don’t know
10%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Entry-level Non-entry-level
Future Demand
Survey data reveal steep declines in vacant technical
Demand for technical individual contributors has remained
and nontechnical individual-contributor positions.
high for many years, and, although future demand for this
Cybersecurity manager positions drop nine
percentage points to the lowest level reported for position is still high, it declined last year and continues to
the State of Cybersecurity Survey. fall (by five percentage points) to the lowest level reported
for the State of Cybersecurity Survey (figure 13).
8%
30%
Individual contributor/
27%
technical cybersecurity
11%
23%
3%
10%
Individual contributor/ 30%
Nontechnical cybersecurity
21%
36%
3%
10%
23%
43%
3%
9%
Senior manager/ 12%
director of cybersecurity
21%
55%
3%
6%
Executive or C-suite 9%
cybersecurity (e.g., CISO)
14%
67%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
100%
92% Individual contributor/
86% technical cybersecurity
90% 82% 83%
81% 81%
75% Individual contributor/
80%
71% nontechnical cybersecurity
66% 68% 65% 68%
70% 63%
60% 56%
50%
40%
30%
20%
10%
0%
6 This figure compares reported unfilled position data from 2018 to 2024 survey results. Percentages represent the sum of all reported vacancy
percentages for each position and exclude the “Don’t Know” and “None” responses.
100%
Cybersecurity manager
90%
Senior manager/
80% director of cybersecurity
19%
20%
10%
0%
In the next
In the next year,
year,do
doyou
yousee
seethe
thedemand
demandforfor the
the following
following cybersecurity
cybersecurity position
position levels
levels increasing,
increasing, decreasing,
decreasing, or remaining
or remaining
the same?
the same?
73%
Individual contributor/
23%
technical cybersecurity
3%
45%
48%
5%
38%
32%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
7 This figure compares reported unfilled position data from 2018 to 2024 survey results. Percentages represent the sum of all reported vacancy
percentages for each position and exclude the “Don’t Know” and “None” responses.
Future demand for nontechnical individual contributor and two percentage points from the previous year. Note that
cybersecurity manager positions are unchanged, while the seven-year trend between years is very similar for
future demand for senior- and executive-level cybersecurity technical and nontechnical individual contributors.
positions is reported to increase slightly, each increasing Figure 14 shows historical views on this question.
100%
Individual contributor/
90%
technical cybersecurity
82%
79%
77%
75%
78% 78% Individual contributor/
80% 73% nontechnical cybersecurity
70%
Cybersecurity manager
60%
51% Senior manager/
46% 47% 47% 48% 48%
50% 44% director of cybersecurity
51%
39% 45%
40% 46% 46% 46% Executive or C-suite
42% 33% 34% 38%
39% 29% 36% cybersecurity (e.g., CISO)
30%
26%
33% 32%
29% 30% 30%
20%
21% 21%
10%
0%
8 Everett, C.; “Training budgets first to be cut due to unclear business value,” HR Zone Ltd, 14 February 2012, https://hrzone.com/training-budgets-first-to-
be-cut-due-to-unclear-business-value/
50%
Recruited by other companies
58%
50%
Poor financial incentives
(e.g., salaries or bonuses) 54%
46%
Limited promotion and
development opportunities
48%
46%
High work stress levels
43%
34%
Lack of management support
34%
32%
Poor work culture/environment
33%
32%
Limited remote work
possibilities 28%
22%
Inflexible work policies
21%
15%
Family situation changes
(e.g., children born, marriage) 14%
14%
Retirement
13%
13%
Desire work in new industry
16%
11%
Switching careers (e.g., leaving
cybersecurity entirely) 9%
7%
Lack of workplace diversity
9%
5%
Don’t know
6%
2%
Other (please specify)
3%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
2024 2023
FIGURE 16:
Which Employer
of the Benefits
following benefits does your employer offer? Select all that apply.
Which of the following benefits does your employer offer? Select all that apply.
65%
Pays employee
certification fees 65%
57%
Professional
development training 64%
54%
Pays employee
certification maintenance 55%
50%
Flex work hours
56%
29%
University tuition
reimbursement 28%
19%
Paid volunteer time
21%
16%
Recruitment bonus
18%
14%
Signing bonus
16%
10%
None of the above
8%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
2024 2023
Pipeline Progress
Qualifying Applicants are unchanged. Respondents place less emphasis
on prior-employer recommendations and university
Respondent views on whether candidates are well
degrees than last year—each fall three percentage
qualified for vacancies9 crept up slightly by two
points. Surprisingly, the importance of association
percentage points from last year to 28 percent
membership climbed four percentage points.
(figure 17).
Figure 18 shows that prior hands-on cybersecurity Respondents report that although soft skills continue
experience dominates as the primary factor (73 percent) to dominate all other skill gaps (51 percent), soft skills
in determining whether a candidate is considered decrease four percentage points from last year’s survey
qualified. Views on credentials and hands-on training results. Respondents report betterments in cloud
0% 1%
1-25% 24%
26-49% 26%
50-75% 22%
76-100% 6%
Don’t know 5%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Very important Somewhat important Not very important Not at all important Don’t know
computing (down five percentage points); coding (21 percent), and computing devices (10 percent) are
(down three percentage points); and software unchanged. New for 2024, two response options—LLM
development-related topics, data-related topics, and SecOps and ML SecOps—are added to this question.
pattern analysis—each down two percentage points. Twenty-four percent of respondents select these skill
Security controls (35 percent), network operations gaps (figure 19).
What are
What are the
thebiggest
biggestskill
skillgaps
gapsyou
yousee
seeinintoday’s
today’s cybersecurity
cybersecurity professionals?
professionals?
Soft skills
(e.g., communication, 51%
flexibility, leadership)
Security controls
(e.g., endpoint, network, 35%
application) implementation
Software development-related
topics (e.g., languages, machine 28%
code, testing, deployment)
Networking-related topics
(e.g., architecture, addressing, 26%
networking components)
ML SecOps 24%
Network operations
(e.g., configuration, 21%
performance monitoring)
Computing devices
(e.g., hardware, software, 10%
file systems)
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Strongly agree 4%
Agree 23%
Disagree 19%
Strongly disagree 6%
Don’t know 9%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Yes 55%
No 35%
Don’t know 9%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Which of
Which of the
the following
followingskill
skills gaps
gaps have
have youyou noticed
noticed among
among recent
recent university
university graduates?
graduates?
Security controls (e.g.,
endpoint, network,
64% application)
implementation
68%
Soft skills (e.g., communication,
flexibility, leadership) 66%
64%
Network-related topics
(e.g., architecture,
59% addressing,
networking components)
Security controls (e.g., 54%
endpoint, network, application)
implementation 56%
56%Network operations 3
43% (e.g., configuration,
performance monitoring)
Network-related topics 39%
(e.g., architecture, addressing,
35%
networking components)
41%
41% System hardening
Network operations 34%
(e.g., configuration,
39% 33
performance monitoring)
41%
Data-related topics
(e.g., characteristics,
38% classification, processing, 3
36% structure)
System hardening
36% 25%
41% Software development-related 25%
33% topics (e.g., languages, machine
25%
Data-related topics code, testing, deployment)
35%
(e.g., characteristics, 30%
classification, processing, 33% 24%
structure) 40% 25%
25% Pattern analysis
27%
Software development-related 25% 30%
topics (e.g., languages, machine
25% 20%
code, testing, deployment)
30% 21%
24% Coding skills
22%
25% 27%
Pattern analysis
27% 19%
30% Computing devices 20%
20% (e.g., hardware, software,
20%
file systems)
21% 22%
Coding skills
22%
17%
27%
19% LLM SecOps
Computing devices 20%
(e.g., hardware, software,
20% 17%
file systems)
22%
17%
ML SecOps
LLM SecOps
10%
9%
17% Other (please specify)
6%
11%
ML SecOps
0% 10% 20% 30%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
102024
LLM SecOps and ML SecOps
2023 2022are new2021
response options in 2024.
Qualifying Workforce Issues (early career) require the most professional development/
training are security controls (58 percent), soft skills
For 2024, the reported top-three security skills change
(55 percent), and cloud computing (44 percent).
(figure 23). Data protection (46 percent) overtakes
Security controls and soft skills improved by three
identity and access management (45 percent), while
and five percentage points, respectively, from 2023
incident response (44 percent) ranks higher than cloud
survey results.
computing (43 percent) in this year’s survey results.
DevSecOps falls eight percentage points (28 percent); When comparing this early-career group against
data collection/correlation (30 percent) and threat hunting university graduates and those with more experience
(26 percent) drop three percentage points; and forensics (figure 25), a prevailing theme surfaces for many
drops two percentage points (18 percent). Ten percent training areas—proficiency improves markedly as
of respondents believe that the newly added responses, individuals advance in their careers, which is logical.
ML SecOps and LLM SecOps, belong in the top-five most This theme diverges with cloud computing, software
important security skills needed in their enterprises. development-related topics, coding, ML SecOps, and
LLM SecOps because early-career professionals have
Respondent reporting about required soft skills for security
greater perceived proficiency than the career groups
professionals (figure 24) shows that communication
above and below them. In an era where professional
(both listening and speaking skills) (56 percent), critical
development budgets are often targets for cost
thinking (54 percent), and problem solving (50 percent)
savings, this observation underscores the need
remain the top-three required soft skills. The survey results
for continuous learning/upskilling—especially on
show a concerning trend in ethics—attention to detail
emerging technology—for employees who have
(35 percent) falls three percentage points since 2022,
been in the cybersecurity profession for a
honesty (15 percent) continues not to be recognized as
longer time.
sufficiently important, and empathy (11 percent) drops
two percentage points.
Human Capital Mitigations
Forty-one percent of respondents indicate that their
Survey results show a concerning trend in ethics—
attention to detail falls three percentage points enterprises leverage training to allow interested
since 2022, honesty continues not to be recognized nonsecurity professionals to move into security roles
as sufficiently important, and empathy drops two as a method of mitigating skill gaps. Respondents
percentage points. report decreased usage of contracted help or outside
consultants (36 percent) to help decrease skill gaps.
After a sizeable decline in 2023, reliance on AI or
Please choosethe
Please choose thetop
TOP FIVE
five most
most important
important security
security skillsskills
neededneeded in organization
in your your organization
today.today.
46%
Data protection 44%
47%
45%
Identity and access 49%
management (IAM)
46%
44%
Incident response 44%
43%
43%
Cloud computing 48%
52%
31%
Threat detection technologies 31%
(e.g., IDS, IPS, UTM)
29%
30%
Data collection and correlation 33%
(e.g., SIEM, SOAR)
31%
29%
Endpoint security 30%
(e.g., EDR, XDR)
32%
28%
DevSecOps 36%
36%
27%
Vulnerability scanning 28%
30%
27%
Penetration testing 27%
27%
26%
Threat hunting 29%
28%
25%
Vulnerability discovery 24%
24%
18%
Forensics 20%
21%
16%
Network segmentation 16%
17%
10%
LLM SecOps
10%
ML SecOps
9%
Virtualization 10%
11%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
56%
Communication (both listening 58%
and speaking skills)
57%
54%
56%
50%
Problem-solving 49%
49%
44%
Teamwork (includes 45%
collaboration and cooperation)
44%
35%
26%
Attitude 27%
24%
28%
27%
25%
23%
19%
22%
21%
Honesty 17%
16%
11%
Empathy 13%
13%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Thinking about your security staff with less than 3 years of work experience, in which of the following areas is professional
development/training most needed? Select all that apply. 11
FIGURE 25: Professional Development Needs by Career Stage
59%
Security controls (e.g.,
endpoint, network, application) 58%
implementation 35%
64%
Soft skills (e.g., communication,
critical thinking, flexibility, 55%
leadership)
51%
38%
43%
Network-related topics
(e.g., architecture, addressing, 40%
networking components) 26%
41%
Network operations (e.g.,
configuration, performance 35%
monitoring) 21%
38%
35%
Data-related topics (e.g.,
characteristics, classification, 28%
collection, processing, structure) 26%
24%
25%
Software development-related
topics (e.g., languages, machine 21%
code, testing, deployment) 28%
21%
20%
Computing devices
(e.g., hardware, software, 17%
file systems) 10%
17%
ML SecOps 14%
24%
17%
Other 3%
4%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
11 This chart is a comparative analysis based on respondent views about which professional development/training areas are MOST needed by university
graduates, early career, and all others.
41%
Training to allow nonsecurity
staff who are interested to 45%
move into security roles 45%
36%
Increased usage of contract
employees or outside 38%
consultants 42%
23%
Increased reliance on artificial 19%
intelligence or automation
25%
21%
Increased use of reskilling 21%
programs
21%
20%
Increased use of
performance-based training to 20%
attest to actual skill mastery 22%
19%
Increased reliance on
credentials to attest to actual 18%
subject matter expertise 19%
16%
Apprenticeships/
19%
internships
15%
14%
4%
Organization has no 3%
skills gap
3%
2%
Other 1%
1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Organizations continue to leverage online learning mentoring (43 percent) declines three percentage
websites primarily (54 percent) to increase points from 2023 survey results. Figure 27
nontechnical skills of staff. Corporate training events shows employer actions to overcome soft
increases two percentage points (44 percent), while skills shortcomings.
Which, if any,
FIGURE 27: Meansof the following Nontechnical
of Mitigating has your organization
Skill Gapsundertaken to help decrease nontechnical skills gaps?
Select all that apply.
Which, if any, of the following has your organization undertaken to help decrease nontechnical skills gaps? Select all that apply.
54%
Online learning websites
(e.g., LinkedIn Learning, 53%
Coursera, edX) 55%
44%
43%
Mentoring 46%
45%
21%
Academic tuition 20%
reimbursement
24%
18%
17%
4%
Organization has no 3%
nontechnical skills gap
3%
1%
Other 2%
1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Significantly overfunded 1%
Somewhat overfunded 3%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
5%
5%
Significantly increase 7%
5%
4%
42%
46%
47%
54%
41%
38%
27%
29%
11%
9%
Somewhat decrease 6%
16%
11%
2%
2%
Significantly decrease 2%
4%
2%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
100%
90%
80%
70% 64%
61%
58%
60% 55% 55%
52% 51%
50%
47%
50%
40%
30%
20%
10%
0%
100%
90%
80%
70%
62% 62%
60% 55% 55%
53%
52%
48%
50%
20%
13% 12%
9% 10% 11%
9%
10% 7%
0%
12 The responses “I don’t know” and “prefer not to say” are omitted from this figure.
7%
Completely confident
33%
Very confident
39%
Somewhat confident
9%
Not so confident
2%
Not at all confident
Don’t know 5%
5%
Prefer not to answer
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Nearly half of respondents believe that their enterprises FIGURE 33: Likelihood of Attack
will experience a cyberattack next year (figure 33), which How likely is it that your organization will experience a
is similar to last year’s survey results. How likely isnext
cyberattack it that your organization will experience a cyberattack next year?
year?
Cybercriminals 28%
Hackers 20%
Nation/state 13%
Hacktivists 10%
Nonmalicious insiders 9%
Other 1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
If your
your organization
organizationwas
wascompromised
compromisedthis
thisyear,
year, which
which of of
thethe following
following attack
attack types
types were
were used?
used? Select
Select all that
all that apply.
apply.
Malware 13%
Security misconfiguration 9%
Password attack 8%
Broken authentication 5%
Cross-site scripting 5%
Insider theft 5%
Mobile malware 4%
IoT attack 3%
Cryptojacking 2%
Insecure deserialization 2%
Watering hole 2%
Cyberrisk
Respondent beliefs about whether their board of FIGURE 36: Executive Leadership Value
Never 2%
Monthly 8%
Annually 41%
2 years or longer 3%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Europe (43 percent). Although views may vary about Third party Don’t know
Ninety-six percent of respondents in enterprises that have that their enterprise used its cyberinsurance policy
cyberinsurance report that their enterprise cyberinsurance (figure 40). Of those respondents who are aware that their
policy at least somewhat addresses their enterprise risk enterprise used its cyberinsurance policy, most believe that
profile (figure 39). One-third of these respondents report their policy has complete coverage.
4%
33%
40%
56% 67%
1 6
2-5 28
6-10 20
11-25 13
More than 25 32
0 10 20 30 40 50
Automating threat
28%
detection/response
Other 2%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Security operations is just one of the areas in which AI employees report less involvement than respondents
can help enterprises. ISACA sought to understand how in smaller organizations, which is understandable and
respondents are involved with AI policies and onboarding provides an opportunity to increase collaboration and
solutions for other areas of the business. transparency in decision making.
When asked whether the respondent or anyone on their When asked whether the respondent or anyone on
team was involved in the development, onboarding, or their team was involved in the development of a policy
implementation of AI solutions, the respondent answers governing the use of AI technology in their enterprise
are disheartening (figure 43). Nearly half (45 percent) of (figure 44), the respondent answers are equally
respondents report no involvement, which holds true for disappointing. Only 35 percent of respondents report
Europe, India, Latin America, North America, and Oceania involvement. Ten percent of respondents indicate that
data. Twelve percent of respondents indicate that the the question does not apply. Respondents who are
question does not apply to their organization. Responses employed by enterprises with 500-to-4,999 employees
are similar across cybersecurity staffing and budgetary report greater involvement than respondents employed
views. Respondents in enterprises with more than 10,000 by enterprises with fewer than 500 employees.
Yes 29%
No 45%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Were
FIGUREyou, or anyone on
44: Involvement in your team, involved in the development of a policy governing the use of AI technology in
AI Policy
your organization?
Were you, or anyone on your team, involved in the development of a policy governing the use of AI technology in your organization?
Yes 35%
No 41%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Conclusion: Focus on
Cybersecurity Readiness
The ISACA global State of Cybersecurity Survey has Although nearly half of respondents indicate that
been conducted for a decade. Although 10 years is a their enterprises leverage training to allow interested
relatively long time for a comparatively new profession, nonsecurity professionals to move into security roles,
some of the challenges reported from the survey have declining professional development training budgets
not changed much over these 10 years. are concerning. This approach may also demotivate
existing staff. The significant drop in cybersecurity
The demand for cybersecurity talent has been funding levels reported this year points to the beginning
consistently high, yet efforts to increase supply are not of a multiyear freefall.
reflected in the global ISACA IS/IT-community workforce.
The current cybersecurity practitioners are aging, and the Although this year’s survey data show fewer
efforts to increase staffing with younger professionals exploitations attributed to nonmalicious insiders,
are making little progress. Left unchecked, this situation effective insider-threat and cybersecurity training and
will create business continuity issues in the future. awareness programs alone do not protect enterprises in
today’s everchanging threat landscape. Moreover, data
Shrinking budgets and employee compensation carry reveal major unawareness in the type of cyberinsurance
the potential to adversely affect cybersecurity readiness that enterprises carry, which may result in inflated
much sooner than the aging workforce, when the Big Stay confidence by senior leadership about what these
passes. Declines in vacant positions across all reporting policies cover. Finally, this year’s survey results affirm
categories may lead some enterprises to believe that the that the use of AI in security operations is still novel;
pendulum of power will swing back to employers, but however, the involvement of security professionals in
the increasingly complex threat environment is greatly the development, onboarding, and implementation of
increasing stress in cybersecurity teams; therefore, the AI is astonishingly low. Most concerning is the lack of
concern is not if, but when, employees will reach their involvement in the development of a policy that governs
tipping point to vacate current positions. the use of AI technology within respondent enterprises.
Acknowledgments
ISACA would like to recognize:
Board of Directors
John De Santis, Chair Pamela Nigro
Former Chairman and Chief Executive ISACA Board Chair, 2022-2023
Officer, HyTrust, Inc., USA
CISA, CGEIT, CRISC, CDPSE, CRMA
Niel Harper, Vice-Chair Vice President, Security, Medecision, USA
CISA, CRISC, CDPSE, CISSP, NACD.DC
Tracey Dedrick
Chief Information Security Officer and
ISACA Board Chair, 2020-2021
Data Protection Officer, Doodle, Former
Chief Information Security Officer, United Former Executive Vice President and
Nations Office for Project Services Head of Enterprise Risk Management,
(UNOPS), Germany Santander Holdings, USA
Jason Lau
CISA, CISM, CGEIT, CRISC, CDPSE, CIPM,
CIPP/E, CIPT, CISSP, FIP, HCISPP
Chief Information Security Officer,
Crypto.com, Singapore
Massimo Migliuolo
Independent Board Member, Malaysia
Jamie Norton
CISA, CISM, CGEIT, CIPM, CISSP
Partner, McGrathNicol, Australia
Maureen O’Connell
NACD.DC
Board Chair, Acacia Research (NASDAQ),
Former Chief Financial Officer and Chief
Administration Officer, Scholastic, Inc.,
USA
Erik Prusch
Chief Executive Officer, ISACA, USA
Asaf Weisberg
CISA, CISM, CGEIT, CRISC, CSX-P, CDPSE
Chief Executive Officer, introSight Ltd.,
Israel
About ISACA
For more than 50 years, ISACA® (http://www.isaca.org) has advanced the best
talent, expertise and learning in technology. ISACA equips individuals with 1700 E. Golf Road, Suite 400
knowledge, credentials, education and community to progress their careers Schaumburg, IL 60173, USA
and transform their organizations, and enables enterprises to train and build
quality teams that effectively drive IT audit, risk management and security Phone: +1.847.660.5505
priorities forward. ISACA is a global professional association and learning
Fax: +1.847.253.1755
organization that leverages the expertise of more than 150,000 members who
work in information security, governance, assurance, risk and privacy to drive Support: support.isaca.org
innovation through technology. It has a presence in 188 countries, including
more than 220 chapters worldwide. In 2020, ISACA launched One In Tech, a Website: www.isaca.org
philanthropic foundation that supports IT education and career pathways for
under-resourced, under-represented populations.
ISACA has designed and created State of Cybersecurity 2024: Global Update
on Workforce Efforts, Resources, and Cyberoperations (the “Work”) primarily
as an educational resource for professionals. ISACA makes no claim that
use of any of the Work will assure a successful outcome. The Work should
not be considered inclusive of all proper information, procedures and tests
or exclusive of other information, procedures and tests that are reasonably
directed to obtaining the same results. In determining the propriety of any
specific information, procedure or test, professionals should apply their
own professional judgment to the specific circumstances presented by the
particular systems or information technology environment.
State of Cybersecurity 2024: Global Update on Workforce Efforts, Resources, and Cyberoperations