Articles

RegulationsSecurity

Beyond the breach: Thoughts for CISOs in FY25-26

Our director of security services, Ferdinand Hagethorn, gives his take on how cyber security has changed. And the best strategies to stay ahead.

Fresh new financial year, fresh new migraine. Each week brings another headline-grabbing security breach, and to be honest, it’s getting old.

Feeling breach fatigue yet? I know I am. But instead of drowning in the FUD, let’s hunt for opportunity. FY 25-26 will see a lot of changes. The threats are still out there, but those who act decisively will come out on top.

And doing so doesn’t need to be a struggle—not when my little playbook can help you turn risk into reward and reposition your security programme as a business enabler:

The AI arms race

Let’s get straight to the point: while most people were busy debating the ethics of AI, the cyber criminals had already weaponised it.

They generated slick phishing emails, assembled shape-shifting malware and automated attacks at a massive scale.

Your move:
It’s time to turn the tables and deploy AI-powered security, the kind that anticipates threats.

The closer you can bring anomaly detection to the now(); the quicker you can contain the damage. It’s time to upgrade your team, to give them some fresh tech that bolsters your security posture.

Everywhere is an entry point

The perimeter is old-school thinking. The data and processes you’re protecting can live anywhere now: a chaotic growth of cloud instances, IoT widgets and many, many remote endpoints. All of them entry points for attackers.

Your move:
Resilience is the game to play. If you haven’t heard of “resilient-by-design”, it’s time to read up.

You can’t secure what you can’t see—so the mission is visibility across the entire digital ecosystem. Something you can achieve through ruthless asset management, relentless monitoring and a Zero Trust attitude that treats every asset and access request with healthy suspicion.

The human firewall

Yes, some people will always click that suspicious link. You can’t always stop lapses in judgement. But don’t mistake your team as a liability. Tap into their strengths instead.

Your move:
Say goodbye to boring PowerPoints and interminable security lectures. It’s time to entertain and engage people with gamified training and engaging phishing simulations.

Shift the culture to one that celebrates people who spot and report threats—they’ll be your best force multiplier.

Secure your supply chain

You can have rock solid security, but it won’t matter if your suppliers leave the back door wide open. This supply chain risk is the soft underbelly of modern business, and I’ve seen just how easily attackers exploit it.

Your move:
Make security a non-negotiable part of your procurement process. Ask for ISO27001 and SOC2. Add those accreditations as the bare minimum for security in your contracts.

Let your suppliers prove their worth through third-party risk assessments and attestations. But also include a collaborative approach to threat intelligence; you want to know what is knocking at the door of your SaaS provider for your tenancy in their infrastructure.

Remember, for a lot of the data your organisation holds, including personal information, you’re the custodian. It’s your job to make sure it’s safe.

Regulation as your winning edge

At first glance, regulations read like alphabet soup.DORA, NIS2, PCI DSS 4.0… They’re a nightmare for your competitors; they approach them like an exercise in ticking boxes. But you know better.

Turn it around, show your pride in being compliant and go beyond what’s expected. Leverage the assessors’ reports and gain the trust of your clients.

Make these regulations a part of your security posture blueprint. In today’s chaotic market, this can be a unique selling point. You can gain a competitive advantage and prove to your customers that you’re a trusted partner.

The clock is ticking

Survival of the fittest has come to the cyber security landscape. Meaner, smarter threat actors are sniffing around systems, using AI-powered bots to pick out the weakest, juiciest targets.

It’s the end of a reactive, check-box security era. The future belongs to those who don’t see security as a coat, but a pillar for growth, trust and opportunity.

This is also where Planit can help you.

With extensive security services, from threat assessments to penetration testing, we can identify the weak points in your infrastructure and applications and provide the right tools to ensure they’re fully protected.

So don’t leave yourself exposed to the newest security threats. Reach out to us today and get the expertise you need to stop attackers before they stop you.

Looking for more security insights?

Take a look at some of the other expert articles Ferdinand has published, including 10 uncomfortable truths about cybersecurity and a detailed look at recent cyber attacks in the UK.

Happy young woman checking her phone and smiling, paired with abstract colourful background and shield icon

Protect Your Data and Reputation

In today’s hostile internet environment, the risks associated with system vulnerabilities are substantial as information is exploited, systems corrupted and brands damaged. Planit’s three-pronged approach to data security policies and penetration testing can help you protect your systems by addressing development, use, and infrastructure.

Get Updates

Get the latest articles, reports, and job alerts.

AUTHOR:

Ferdinand Hagethorn

Director - Security Services