Cyber resilience tunnel vision is leaving enterprises open to external threats
Many enterprises are overlooking supply chain risks as part of their cyber resilience strategies
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
More than six-in-ten organizations across worry their cyber resilience strategies are too internally-focused.
In a new report, cloud security firm Zscaler noted that businesses are increasingly susceptible to external shockwaves from cyber incidents, supply chain attacks, and geopolitical uncertainty.
As a result, 61% admitted their cyber resilience strategies are too internally-focused.
Six-in-ten (60%) said they have faced a major failure scenario owing to a supplier or third-party vendor over the past year, with 63% anticipating something similar over the next 12 months.
An overwhelming 96% are updating their strategy in response to external factors and shoring up defenses, with 90% having increased cyber resilience investment over the past 12 months.
"Disruptions can now originate far beyond an organization’s walls. True resilience must ripple outward across dependency layers such as partners, platforms, and supply chains to absorb external shockwaves before they destabilize operations,” said Brian Marvin, SVP EMEA at Zscaler.
“By adopting a ‘Resilient by Design’ approach that extends beyond the walls of the enterprise, organizations can embed the capacity to withstand inevitable failure or breach scenarios.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Cyber resilience practices are falling flat
Crucially, only 34% of organizations believe their current resilience measures are highly effective against supply chain volatility, and 52% said their organization’s current security systems are unable to defend against advanced threats.
While 76% of organizations have either fully implemented or are actively trialing agentic AI technologies, 69% said they lack visibility into the use of shadow AI use, with 56% fearing sensitive data exposure.
Looking forward, more than half (57%) of organizations said they haven't factored Post-Quantum Cryptography (PQC) into their security strategy, despite 60% recognizing that today's stolen data could be at risk in three to five years.
Many are also facing agility issues, with 59% of respondents acknowledging that their organization’s IT architecture cannot keep pace with the rapid rate of business change, and many are still heavily dependent on legacy systems.
“While it makes sense that global organizations are nervous to invest in digital transformation in this geopolitical climate, it could result in laggards being behind the curve,” said James Tucker, head of EMEA CISOs in residence at Zscaler.
“Forward-thinking organizations are abandoning traditional centralized architectures and turning to distributed models with sovereignty and localization at their core to mitigate any data sovereignty concerns. These modern approaches enable granular configuration to address specific regulatory and operational requirements.”
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Ericsson maps out the road to fully commercial 6G networks at MWC 2026News The world will move from 5G networks that carry intelligence to 6G networks that are intelligent, Ericsson says
-
Honor MagicBook Pro 14 reviewReviews Perhaps a little too ostentatious for the office, but a solid laptop offering with great cross-OS features
-
‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technologyNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
-
The Salesloft Drift victim list keeps growing: Zscaler is the latest to confirm a breach, warning customers to remain wary of follow-up phishing attacksNews The company has warned customers that their data may have been accessed, saying it's implemented extra safeguards in response
-
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security toolsNews The pair’s expanded partnership aims to help customers simplify their security setups while tackling evolving cyber threats
-
Zscaler just uncovered what could be the largest ransomware payment of all timeNews Zscaler’s ThreatLabz identified a new record for the largest ransomware payment ever recorded, which is almost twice the size of the previous record holder
-
Google Workspace just got a slew of new zero trust features to help supercharge user security – here's what you need to knowNews New Zscaler integrations across Chrome Enterprise, Google Workspace, and Google Security Operations aim to enhance enterprise security and access
-
The state of zero trust transformation, 2023whitepaper From prevention to enablement: Leveraging the full potential of zero trust for the highly mobile and cloud-centric enterprise
-
A brief history of zero trustwhitepaper The cybersecurity game changer, from concept to cornerstone
-
Why IT leaders should consider a zero trust network access (ZTNA) strategywhitepaper Bridge the gap between business needs and IT capabilities
