
Global Cybersecurity Trends 2025 and Their Strategic Impact on Business
Global cybersecurity trends in 2025 have shifted from being a technical backdrop to becoming one of the primary forces shaping business risk, resilience and value. Estimates from industry researchers suggest that cybercrime could impose around 10.5 trillion US dollars in annual costs this year, a figure comparable to the GDP of the world’s largest economies and significantly higher than most natural catastrophe loss scenarios. At the same time, analysts such as Gartner project that worldwide spending on information security and risk management will reach approximately 213 billion US dollars in 2025, up from about 193 billion US dollars in 2024, reflecting continued double-digit growth. For boards, CEOs, founders and investors, understanding these global cybersecurity trends in 2025 is now essential to interpreting risk, allocating capital and assessing long-term competitiveness.
This article provides an integrated view of the global cybersecurity landscape in 2025. It draws on recent analysis from institutions such as the World Economic Forum, IBM, Gartner, regulators and sector specialists to examine the escalation of cybercrime, the prominence of supply chain and ecosystem risk, the role of artificial intelligence and generative AI, the acceleration of regulation, and sector-specific developments in finance, healthcare, manufacturing and energy. The focus is on how these trends are unfolding and what they mean for the way organizations think about resilience and risk.
In this article
Global cybersecurity landscape in 2025
The World Economic Forum’s report Global Cybersecurity Outlook 2025, produced with Accenture, describes an environment in which cyber risk is becoming more complex, more interconnected and more unevenly distributed. Large enterprises have generally improved their resilience, while many small and mid-sized organizations, public sector bodies and entities in emerging markets report declining confidence in their ability to withstand major cyber incidents. The report highlights four structural drivers of complexity: deepening supply chain interdependencies, heightened geopolitical tension, rapid adoption of emerging technologies such as generative AI, and a persistent shortage of cybersecurity skills.
Certain quantitative indicators illustrate this shift:
- Long-term forecasts from Cybersecurity Ventures estimate that global cybercrime costs are reaching around 10.5 trillion US dollars annually in 2025, up from roughly 3 trillion US dollars in 2015.
- Gartner’s mid-2025 forecast indicates that worldwide end-user spending on information security and risk management is expected to reach about 213 billion US dollars this year, increasing further in 2026 as application security, identity and cloud security remain high-growth segments.
- IBM’s Cost of a Data Breach Report 2025 places the global average breach cost at around 4.4 million US dollars, a slight decrease from the 4.88 million US dollars reported in 2024. The change is attributed mainly to faster detection and containment in many regions, particularly where security AI and automation are deployed, while average costs in some markets, including the United States, continue to rise.
- The World Economic Forum notes that 72% of surveyed organizations report that cyber risk has increased over the past year, and 54% of large organizations identify supply chain challenges as the biggest barrier to achieving cyber resilience.
These figures suggest that global cybersecurity trends in 2025 are characterized by both escalating threat volume and increasing investment. Cybersecurity has become a structural factor in enterprise risk and resilience rather than a narrow technical concern.
Cybercrime and ransomware as macroeconomic risk
Ransomware remains one of the most visible forms of cybercrime in 2025. Threat-intelligence analyses of leak sites and incident reporting indicate that the number of organizations named on ransomware extortion sites in the first quarter of 2025 more than doubled compared with the same period in 2024. Industry reporting suggests that close to 100 distinct ransomware groups have been active during the first half of the year, reflecting a continuing proliferation of criminal operations.
Extortion tactics have also evolved. Double-extortion attacks, in which data is both encrypted and exfiltrated, now represent a large share of observed incidents, and pure data theft without encryption is increasingly common. This shift allows attackers to exert pressure even on organizations with effective backup and recovery capabilities. Incident-response data from several providers shows that the average ransom payment in 2025 is around or slightly above 1 million US dollars, with median payments somewhat lower but highly variable across regions and sectors.
Beyond ransomware, the broader cybercrime economy includes business email compromise, online investment fraud, e-commerce scams and account-takeover attacks. Law-enforcement agencies such as the US Federal Bureau of Investigation continue to report billions of US dollars in annual losses from business email compromise alone, and note that many incidents are never formally reported. These forms of fraud are increasingly supported by criminal “as-a-service” offerings: initial access brokers, bulletproof hosting providers and underground marketplaces that trade stolen credentials, personal data and malicious tooling.
Collectively, these patterns support the view that cybercrime has become a significant macroeconomic factor. It acts as a drag on digital transformation, raises the cost of capital for high-risk sectors and can interrupt critical services in sectors such as healthcare, energy and logistics.
Supply chains and digital ecosystems as systemic vulnerabilities
One of the most distinctive global cybersecurity trends in 2025 is the prominence of supply chain and ecosystem risk. The World Economic Forum’s Global Cybersecurity Outlook 2025 identifies supply chain interdependencies as the leading ecosystem risk and notes that more than half of large organizations view these interdependencies as the main barrier to cyber resilience. A companion article from the Forum on supply chain interdependencies explains how third-party vulnerabilities and opaque software dependencies can propagate cyberattacks across entire ecosystems.
Recent real-world incidents illustrate this systemic exposure. A widely publicized outage in mid-2024, caused by a faulty update from a global security provider, disrupted airlines, banks, retailers and public services across multiple continents for hours. Estimates by independent analysts suggested that the event caused several billion US dollars in economic disruption in a matter of days. Separate attacks on managed file-transfer tools and remote-access solutions have demonstrated how compromises at one vendor can lead to widespread data breaches downstream.
The complexity of modern software supply chains contributes to this risk. Many products incorporate open-source components, external libraries and third-party services that may not be fully inventoried or monitored. Small vendors supplying niche services to large enterprises may lack the resources to maintain strong security controls or to respond quickly to emerging threats. This creates a situation where highly regulated or well-resourced organizations may still be exposed through partners, integration points and shared platforms.
As a result, third-party and ecosystem risk has moved from a compliance topic in procurement contracts to a central concern in enterprise risk assessments and resilience planning. A single failure in the ecosystem can affect many organizations simultaneously, which is one reason why regulators are paying closer attention to “critical third-party” providers in financial services, cloud computing and other infrastructure layers.
Geopolitics, cyber operations and critical infrastructure exposure
Geopolitical tension and cyber operations are increasingly intertwined. The World Economic Forum notes that nearly 60% of surveyed organizations say geopolitical developments have prompted changes in their cybersecurity strategy, and approximately one-third of chief executives express strong concern about state-linked cyber espionage targeting trade secrets, advanced technologies and other forms of intellectual property.
Critical infrastructure—such as energy, water, transport and healthcare—sits at the centre of this concern. The US Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response has highlighted that foreign adversaries and sophisticated criminal groups continue to probe energy systems, with a view to gaining persistent access and potentially disrupting operations. Similar assessments from European and Asia–Pacific regulators point to a sustained level of activity directed against utilities, telecommunications networks, government services and defence supply chains.
Another area of geopolitical relevance is the long-term risk from quantum computing. Security and standards bodies such as the US National Institute of Standards and Technology have finalized initial post-quantum cryptographic standards, and governments are encouraging organizations that handle long-lived sensitive data—such as defence, health and financial records—to begin planning for migration. The concern is that some adversaries may be intercepting and storing encrypted traffic today with the aim of decrypting it in the future once powerful quantum systems are available, a practice often described as “harvest now, decrypt later”.
These developments reinforce that cyber risk is not only a matter of criminal activity but also an instrument of statecraft and geopolitical leverage. For organizations that operate or depend on critical infrastructure, global cybersecurity trends in 2025 are tightly coupled to broader changes in the security environment.
Artificial intelligence, generative AI and the cyber arms race
Artificial intelligence and generative AI are among the most consequential global cybersecurity trends in 2025. The World Economic Forum’s research highlights that about two-thirds of organizations expect AI to have a major impact on their cybersecurity strategy, yet only around one-third report having systematic processes to assess the security of AI tools before adoption. Many organizations are therefore deploying AI-enabled systems faster than they are updating governance, creating a gap between capability and control.
On the offensive side, security firms and law-enforcement agencies report that cybercriminals and state-aligned actors are using generative AI to craft highly convincing phishing content in multiple languages, generate deepfake audio and video for social engineering, and automate reconnaissance and vulnerability discovery. With generative models drastically reducing the time required to customise attacks, the volume and sophistication of social-engineering campaigns have increased. Some threat-intelligence reports describe experiments with semi-autonomous “agents” that can chain together tasks such as scanning, exploitation and exfiltration using AI-based decision making.
On the defensive side, organizations are applying machine learning and generative AI to anomaly detection, threat-hunting, automated incident triage and digital forensics. IBM’s 2025 breach analysis notes that organizations with extensive security AI and automation reduced average breach costs by close to two million US dollars compared with those that had not deployed such capabilities, largely because they identified and contained incidents more quickly.
At the same time, AI deployments themselves have become targets. IBM’s analysis and independent media reporting on the 2025 Cost of a Data Breach findings indicate that around one-fifth of studied breaches involved “shadow AI” or inadequately governed AI tools. In these cases, sensitive data was often exposed through unsanctioned uploads to AI services or poorly secured plug-ins and APIs. Only a small fraction of organizations in the study reported having mature AI governance, with clearly defined acceptable-use policies and technical controls.
Regulation is evolving quickly to address these issues. The European Union’s AI Act, which entered into force in August 2024, is being phased in over several years. Its first obligations in 2025 cover prohibited uses, transparency requirements for certain AI systems and governance obligations for providers of general-purpose AI models. China has introduced rules requiring AI-generated content to be labeled and has issued national standards on generative AI security and governance. Other jurisdictions, including several US states, are introducing laws on automated decision-making and AI transparency in specific contexts such as employment, credit and consumer services.
These developments indicate that AI is both a major source of new cyber risk and a critical component of modern defence. Governance frameworks, legal requirements and technical practices around AI are likely to remain central themes in cybersecurity strategy for years to come.
Regulation, data privacy and AI governance in 2025
The regulatory environment for cybersecurity, privacy and AI governance has become more demanding and more fragmented. Organizations that operate across multiple jurisdictions face overlapping and sometimes inconsistent rules on incident reporting, data protection, AI risk management and critical-infrastructure security.
United States: cybersecurity disclosures and state-level privacy laws
In the United States, the Securities and Exchange Commission has implemented rules requiring public companies to disclose material cybersecurity incidents promptly and to describe their cyber risk management, strategy and governance in annual filings. These rules became effective in late 2023 and are being actively applied in 2024 and 2025. Public statements and enforcement actions indicate that regulators are paying close attention to the timeliness of disclosure and the consistency between companies’ narratives and their internal practices.
In parallel, state-level data privacy laws have continued to proliferate. By late 2025, around 20 US states have passed comprehensive data privacy statutes, with multiple laws coming into force during the year. Legal analyses from firms such as White & Case and Gibson Dunn point out that these laws vary in definitions, coverage and enforcement powers, meaning that national businesses often need to manage different requirements around consent, sensitive data, data subject rights and security obligations across states.
European Union: NIS2, DORA and the AI Act
In the European Union, several major regulatory frameworks are reshaping cybersecurity expectations. The revised Network and Information Security Directive (NIS2) expands the range of “essential” and “important” entities that must implement risk-management and incident-reporting measures, covering sectors from energy and transport to healthcare, financial market infrastructure, manufacturing and digital services. Member States are required to impose administrative fines that can reach at least 10 million euros or 2% of global annual turnover for essential entities, with provisions for management-level accountability.
The Digital Operational Resilience Act (DORA) became applicable to EU financial entities on 17 January 2025. It sets out detailed ICT risk-management requirements, including incident classification and reporting, testing of operational resilience and heightened oversight of critical third-party ICT providers. Supervisory agencies and financial institutions in the EU are now working through practical implementation, including classification of major incidents and the design of advanced resilience tests.
The EU AI Act adds another layer by introducing a horizontal framework for AI systems. Its early obligations in 2025 cover banned practices and transparency requirements for certain AI systems and for general-purpose AI models. High-risk AI systems, including many used in financial services, healthcare, infrastructure and employment, will fall under more detailed governance and documentation requirements from 2026 onward.
Asia–Pacific and other jurisdictions: data protection and AI rules
In Asia–Pacific, several jurisdictions have strengthened data protection and AI governance. India’s Digital Personal Data Protection Rules 2025, notified in mid-November 2025, operationalize the Digital Personal Data Protection Act 2023. Government communications and legal briefings explain that the rules introduce phased compliance obligations over the next 12 to 18 months, create a new Data Protection Board and emphasize principles such as purpose limitation, data minimization and transparency, including prompt breach notification requirements.
China has expanded its data and AI governance framework through the Cybersecurity Law, Data Security Law and Personal Information Protection Law, complemented by sectoral rules and standards. New labeling requirements that came into force in September 2025 require clearly marking AI-generated content across formats, and national standards provide guidance on generative AI security controls and governance. Other countries in the region, including Singapore, South Korea, Australia and Japan, have updated or are updating their privacy and cybersecurity rules with an eye to international interoperability and local priorities.
In the Middle East, Africa and Latin America, several countries have adopted privacy frameworks inspired by the EU General Data Protection Regulation and are developing sector-specific cybersecurity rules, particularly for finance and critical infrastructure. This contributes to a globally fragmented regulatory environment, in which multinational organizations manage a heterogeneous mix of obligations across markets.
Against this backdrop, many enterprises are aligning around global security standards such as the NIST Cybersecurity Framework and ISO/IEC 27001 to provide a consistent baseline, then mapping local legal requirements to those internal frameworks. Doing so allows organizations to respond to new rules more systematically as they emerge.
Sector-specific cybersecurity dynamics
Although many global cybersecurity trends in 2025 cut across industries, their manifestation and impact differ by sector. Financial services, healthcare, manufacturing and energy provide instructive examples of how risk profiles are evolving.
Financial services: digital operational resilience and third-party concentration
Financial services organizations face above-average breach costs, stringent regulatory expectations and a high degree of interconnectedness. IBM’s 2024 breach data, which continues to inform 2025 analysis, placed the average cost of a financial-sector data breach above 6 million US dollars, significantly higher than the global average. This reflects both the sensitivity of financial data and the complexity of legacy IT estates.
With DORA in effect in the European Union and equivalent guidelines in other jurisdictions, financial institutions are under sustained supervisory scrutiny regarding their ability to withstand cyber incidents, particularly those involving critical third-party providers and shared market infrastructure. Many firms are consequently increasing investment in identity and access management, cloud security, resilience testing and provider oversight, treating cyber resilience as a core element of overall operational resilience.
Healthcare: service disruption and patient-safety implications
Healthcare organizations continue to experience a high volume of cyberattacks. A 2024–2025 study by Proofpoint and the Ponemon Institute on healthcare cybersecurity found that almost all surveyed providers had experienced multiple cyberattacks in the preceding year, with an average number of attacks per organization in the low-to-mid-forties. A majority reported disruptions to patient care, including delays in procedures and longer hospital stays, and a material minority linked cyber incidents to adverse clinical outcomes.
In addition to direct impacts on hospitals and clinics, incidents affecting health technology intermediaries have demonstrated the interconnected nature of the sector. The 2024 attack on Change Healthcare, a subsidiary of UnitedHealth Group, disrupted claims processing and pharmacy services for weeks and affected many healthcare providers and patients. Public disclosures and subsequent coverage indicate that hundreds of millions of individuals were touched in some way by the event, and remediation costs reached several billion US dollars.
These developments have reinforced the view that cybersecurity in healthcare is closely tied to patient safety, regulatory compliance and financial stability, rather than being a purely technical concern.
Manufacturing and industrial: converged IT/OT environments
Manufacturing and industrial organizations face converging risks across information technology and operational technology environments. Industrial cybersecurity specialists report that hundreds of ransomware incidents have affected industrial entities in 2025, with North America and Europe among the most impacted regions. Several active ransomware groups explicitly target industrial control systems, seeking to disrupt production as a way of increasing pressure during extortion.
The broader trend toward Industry 4.0—combining connected sensors, digital twins, predictive maintenance and cloud-based analytics—adds new dependencies and increases the attack surface. Legacy industrial control systems may lack modern security features and can be difficult to patch. Management of remote access for engineers, suppliers and maintenance partners is also challenging. These factors contribute to heightened focus on network segmentation, OT-specific monitoring and closer collaboration between industrial equipment vendors and operators.
Energy and critical infrastructure: national resilience and cyber risk
Energy and utilities occupy a central position in discussions of cyber resilience. National strategies and sectoral analyses from organizations such as the US Department of Energy and the World Economic Forum’s Centre for Cybersecurity highlight that the reliability of electricity grids, pipelines and related infrastructure depends increasingly on secure digital control systems and data flows.
Changes in the energy system—integration of renewable generation, distributed energy resources and smart-metering infrastructure—are adding complexity and creating new digital interfaces. At the same time, the sector remains a priority target for state-aligned actors and sophisticated criminal groups. Many energy companies are therefore expanding their cybersecurity programs in areas such as cyber-informed engineering, OT monitoring, incident exercises and coordinated information-sharing initiatives.
Cybersecurity talent, culture and organizational resilience
Across sectors, cybersecurity capability depends heavily on people, not just technology. The World Economic Forum’s 2025 outlook and related surveys point to a global cybersecurity workforce gap of several million professionals, with two-thirds of organizations reporting moderate-to-critical skills shortages. Only a small minority express confidence that they have the talent and skills required to meet their cybersecurity objectives.
This gap is particularly pronounced for specialized roles in cloud security, incident response, security architecture and OT cybersecurity. Smaller organizations and public bodies often find it hardest to attract and retain experienced professionals. These constraints influence the pace at which new security initiatives can be implemented and the extent to which organizations can make full use of advanced tools such as security AI and automation.
Culture and awareness also play a significant role. Breach analyses continue to show that a large share of incidents involve a human element, such as phishing, credential reuse, misconfiguration or errors in handling data. In response, many organizations are expanding security awareness programs, integrating security into product development and infrastructure processes, and using automation to reduce manual workload and the risk of human error in routine tasks.
Viewed together, the trends in workforce, culture and technology suggest that organizational resilience depends on a combination of structural investment, governance, skills development and the careful use of automation, rather than on any single control or tool.
Sources, References and Additional Reading
The following sources provide detailed data and analysis underpinning the trends discussed in this article and can be consulted for further exploration.
-
World Economic Forum – Global Cybersecurity Outlook 2025
Comprehensive analysis of global cyber risk in 2025, with emphasis on supply chain interdependencies, AI-driven threats, skills shortages, regulatory fragmentation and differences in resilience across organization sizes and regions. -
IBM – Cost of a Data Breach Report 2024 and Cost of a Data Breach Report 2025
Annual research on breach costs, breach lifecycles, the impact of security AI and automation, and the role of shadow AI and governance gaps in recent incidents. -
Cybersecurity Ventures – Official Cybercrime Report 2025
Long-term forecasts of global cybercrime costs, including the estimate that cybercrime will reach around 10.5 trillion US dollars annually by 2025 and will continue to grow through the decade. -
Gartner – Worldwide End-User Spending on Information Security to Total $213 Billion in 2025
Forecasts on global information security and risk-management spending, covering trends by technology category and the drivers behind continued growth. -
World Economic Forum – Cybersecurity: 5 Risks from Supply Chain Interdependencies
Discussion of how supply chain complexity and dependencies on critical providers create systemic cyber risk, with five principal risk factors and illustrative examples. -
Supply Chain Digital – WEF: Supply Chains at Heart of Cybersecurity Threats
Summary of the World Economic Forum’s findings on supply chain risks and coverage of large-scale outages linked to failures in widely used software and security platforms. -
Proofpoint & Ponemon Institute – Healthcare Cybersecurity Report
Survey research on the frequency and impact of cyberattacks in healthcare, including statistics on attack volumes, patient-care disruption and financial consequences. -
European Union – Digital Operational Resilience Act (DORA)
Official information on the scope, requirements and implementation timeline of DORA, covering ICT risk management, incident reporting, resilience testing and oversight of critical third-party providers in the EU financial sector. -
European Commission – EU Artificial Intelligence Act
Overview of the EU AI Act’s objectives, risk-based classification of AI systems and phased implementation, including obligations for general-purpose and high-risk AI systems. -
U.S. Securities and Exchange Commission – Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
Text and commentary on SEC rules governing cybersecurity disclosures and governance for US public companies. -
Press Information Bureau, Government of India – DPDP Rules 2025 Notified
Official announcement of India’s Digital Personal Data Protection Rules 2025, explaining their role in operationalizing the DPDP Act 2023 and summarizing key obligations and timelines. -
White & Case – AI Watch: Global Regulatory Tracker
Ongoing overview of AI regulatory developments worldwide, including China’s generative AI and content-labeling rules and emerging AI legislation in other jurisdictions. -
IBM – Escalating Data Breach Disruption Pushes Costs to New Highs
Press release summarizing key findings of IBM’s 2024 Cost of a Data Breach report, including the role of disruption, AI and automation in breach dynamics. -
World Economic Forum – How AI-Driven Fraud Challenges the Global Economy
Analysis of AI-driven fraud and cybercrime, explaining how generative AI is affecting phishing, social engineering and financial crime in 2025. -
IBM Newsroom – Commentary on the AI Oversight Gap
Articles and briefings based on IBM’s 2025 breach research, describing the prevalence and impact of shadow AI and governance gaps in AI adoption.








