• Search
Insights 3 minutes read

Cyber Risk in 2026: The Changes CISOs Need to Plan For

Identity, AI and the shifting attack surface: What’s changed, what hasn’t and where focus needs to shift

At its core, cyber security is about balancing effective controls with operational efficiency. Constant change in the threat landscape means this work is never finished. 

While the fundamentals haven’t changed, the environment they operate in looks very different to even a few years ago. Shifts in technology and attacker behaviour are pushing existing controls to their limits. In response, cyber security leaders must realign controls to address these emerging threats and restore the balance. 

Here’s where that focus should lie in 2026: 

 

Why break in when you can log in? Identity is now a primary attack surface

As infrastructure becomes more distributed and cloud-centric, identity is replacing the network perimeter as the most crucial security control. With access now centralised across platforms and locations, attackers are exploiting gaps that didn’t exist in more contained environments.  

According to eSentire, account compromise attacks have surged 389% over the past year and now account for roughly 50% of observed cyber threats.  

The increasing use of non-human identities, including AI agents, further expands the attack surface. These agents work at machine speed, often with persistent access and limited oversight. That makes them ideal targets for compromise. 

Email remains the most common entry point for identity-based attacks, and the risks are higher. Phishing no longer needs to lead to malware, it only needs a convincing login prompt. 

As organisations push more work into SaaS platforms, the browser becomes the primary channel for access to data, systems and financial workflows. A single compromised login can now provide the same level of access that once required breaching the network. 

That’s why modern security strategies focus less on stopping every phishing email, and more on limiting what happens after credentials are stolen. 

In 2026, cyber security leaders must treat identity as a foundational security layer, rather than a supporting service. 

 

Prepare now, or panic later: How AI is changing the cyber threat landscape 

AI is no longer experimental on either side of the fence. Attackers are using AI tools to accelerate reconnaissance and vulnerability discovery 

At the same time, security teams are using automation and GenAI to triage events and surface insights faster. That response is essential to maintaining cyber resilience in 2026.  

Organisations still reliant on manual detection and response will struggle to keep up with the speed of AI-enabled attacks.

 

Human risk doesn’t disappear in an AI-enabled workplace

AI introduces a new class of risk for organisations, one that must be carefully managed.  

GenAI tools are widely available and easy to use, but they’re also an emerging cause of data loss. Once confidential data is uploaded to an external GenAI platform, it falls outside established controls. That data may then be used to train AI models or influence in future outputs, leading to long-term exposure. 

Managing this risk comes down to discipline and fundamentals. Employees shouldn’t be discouraged from using GenAI tools responsibly, but they need clear guidance on what data can and can’t be shared. To enforce this, security teams need strong data classification and DLP controls.  

 

Looking ahead: The key takeaway for cyber leaders 

Cyber security in 2026 is about adapting core principles – identity, trust and human oversight – to a rapidly changing threat landscape. As cyber risk management becomes a core business capability, organisations that get this right gain a genuine competitive advantage. 

Featured Insights

Insights 3 minutes read
Zero-Trust enhances security by eliminating implicit trust. It enables mobility and strong protection.
Insights 3 minutes read
APRA calls for stronger cyber security by August—super funds must act fast to avoid regulatory risk.
Insights 8 minutes read
Cloud flaws, app logic, human error—learn what pen tests catch and how manual insight drives real fixes.
[wpforms id="15231"]
[wpforms id="14210"]
FORM HEADINF
Search by industry
  • Consumer & Media
  • Corporate & Financial
  • Industry & Technology
  • Public & Community Services