Skip to main content

State of Cybersecurity 2024

Cybersecurity is a constant balancing act. For years, the tug-of-war has been framed as a contest between security and convenience. Today, a new challenge is emerging.

The conflict is not so much with convenience as it is with progress. As organizations go through digital transformation and tie technology initiatives tighter to business success, excessive cybersecurity efforts can hinder overall progress. CompTIA's 2024 State of Cybersecurity report explores the many variables that must be considered in balancing the cybersecurity equation.

 

research_state-of-cybersecurity-2024_2.png

Download the full report

Market overview: The current state

The simplest way to describe both the corporate stakes for cybersecurity and the challenges involved in crafting cybersecurity policy is to say that the scale has grown dramatically.

  • From a threat landscape perspective, companies can see that the number of cybercriminals is skyrocketing, their organizational ability is growing, and the potential damage from a cyberattack can be catastrophic.
  • From an information security perspective, far more data is being captured, with both privacy implications for customers and operational risk for internal workflows.
  • From a product perspective, generative artificial intelligence (AI) is accelerating capabilities, often widening skill gaps in organizations.

Our approach to defending cyberspace is changing – and we're starting to see these changes having an effect:

  • In 2022, only 25% of survey respondents felt that the overall state of cybersecurity in the economy was improving dramatically. In 2023, that number increased to 27%.
  • In 2022, only 24% of respondents said their organization's cybersecurity was completely satisfactory. In 2023, that number grew to 28%.

But information technology (IT) staff and cybersecurity professionals have a different perspective than executive stakeholders:

  • More than 4 in 10 executives report being completely satisfied.
  • But just 25% of IT staff and 21% of business staff share that sentiment.

Even with small gains in satisfaction, there is still plenty of room for improvement. The next stage of maturity involves establishing and refining cybersecurity operations, using strategic policy and processes to drive tactical actions around people and products.

Policy: Risk management is the driving force behind cybersecurity

Risk management is becoming the primary method for solving one of our most significant challenges: The connection between cybersecurity strategy and business operations.

When cybersecurity professionals:

  1. Identify various risks
  2. Assign the probability of cyber incidents
  3. Determine potential cost
  4. Propose incident response plans

The link between cybersecurity spending and desired outcomes gets stronger.

Do you need a formal risk management framework? See what our respondents are doing:

research_state-of-cybersecurity-2024_2.png

One of the best reasons to use a formal framework is to help identify areas that may lie outside traditional IT system architecture.

research_state-of-cybersecurity-2024_3.png

Beyond technical topics, thorough risk analysis also examines policies and processes that may have little to do with the IT team.

Process: Cybersecurity processes drive a wide range of decision-making

Following a comprehensive risk management discipline, both building cybersecurity processes and integrating cybersecurity into business workflows drive many functional decisions.

  1. Cybersecurity is becoming a primary factor when evaluating new technology.

research_state-of-cybersecurity-2024_4.png

Fifty-eight percent of companies view cybersecurity as a primary consideration when assessing new initiatives. However, firms are still treating cybersecurity as a secondary factor or even an afterthought, opening the ecosystem to vulnerabilities, cyber risk, and cybersecurity incidents.

research_state-of-cybersecurity-2024_5.png

2. Cybersecurity is impacting other business activities.

We see this happening in a few ways:

  • Threat intelligence now includes new types of cyber threats, such as social engineering and ransomware attacks, that highlight the intersection of technology and reality.
  • The web of regulatory issues and government agencies overseeing digital business drives organizations to become more cognizant of how they conduct business.
  • As remote and hybrid work continues, the individual employee's responsibility to maintain secure practices via workforce education has never been higher.

3. The goal of a cybersecurity process is to align with the principles of a zero trust framework.

research_state-of-cybersecurity-2024_6.png

Although only 28% of firms identify a zero-trust framework as part of their cybersecurity strategy, more firms are following individual practices commonly included in a zero-trust approach.

People: Talent pipelines get stronger as firms build skill resilience

The cybersecurity workforce is growing. There were 660,000+ cybersecurity-related job openings in the United States between May 2022 and April 2023 – a 28% increase from the same time period in 2020 during the pandemic.

What's your biggest cybersecurity challenge? See what our respondents said:

research_state-of-cybersecurity-2024_7.png

The top challenge in pursuing cybersecurity initiatives now is cybersecurity skill gaps. One strong option for bridging that gap is to bring in less experienced cybersecurity professionals who continue building their skills while becoming familiar with your corporate culture and objectives.

Regardless of the hiring pathway, there are bound to be some skill gaps that remain when new individuals are brought into an organization or when internal employees transition to cybersecurity from a previous role.

research_state-of-cybersecurity-2024_8.png

 
Developing a regular skill assessment regimen based on industry expertise and best practices is a key step in understanding the exact nature of the gaps that need to be filled.
 

What about using third parties? See what our respondents are doing:

research_state-of-cybersecurity-2024_9.png

 

Today, organizations are taking a more comprehensive approach to selecting providers to protect their critical infrastructure. End users are looking for outside firms who understand modern cybersecurity threats and endpoint mitigation and have access to threat intelligence.

Product: AI drives the cybersecurity product set to new heights

Generative artificial intelligence (AI) has been the buzz. Many believe this new wave of AI is the biggest tech paradigm shift in decades. But many companies have been using AI for some time:

  • 56% of respondents indicate they already work with AI and machine learning (ML).
  • 36% say they have not worked with AI or ML but are exploring the possibilities.

What are the AI possibilities for cybersecurity? See what our respondents said:

research_state-of-cybersecurity-2024_10.png

Of course, AI is like other emerging technologies. It's not a standalone product by itself but rather an embedded component of other products:

research_state-of-cybersecurity-2024_11.png

Our cybersecurity resources have been steadily expanding over the past few years. Now, the challenge of managing a wide variety of cybersecurity tools is compounded by weaving AI capability into each one.

Please note this is an excerpt, and the full report contains more detail.

Download the full report

Methodology

This quantitative study consisted of an online survey fielded to business and IT professionals involved in cybersecurity during Q2 2023. A total of 511 professionals based in the United States participated in the survey, yielding an overall margin of sampling error at 95% confidence of +/- 4.4 percentage points. For international regions (ANZ, ASEAN, Benelux, DACH and UK/Ireland), a total of 125 professionals in each region participated in the survey, yielding an overall margin of sampling error at 95% confidence of +/- 8.9%. Sampling error is larger for subgroups of the data.

As with any survey, sampling error is only one source of possible error. While non-sampling error cannot be accurately calculated, precautionary steps were taken in all phases of the survey design, collection and processing of the data to minimize its influence.

CompTIA is responsible for all content and analysis. Any questions regarding the study should be directed to CompTIA Research and Market Intelligence staff at research@comptia.org.

CompTIA is a member of the market research industry’s Insights Association and adheres to its internationally respected Code of Standards and Ethics.

Read more about cybersecurity.