Three Top Cybersecurity Projects to Prioritize

This year, prioritize cybersecurity projects that reduce organizational risk and increase resilience ─ and can be completed in 12 months. 

Expand Your Approach to Cybersecurity

If the expression “May you live in interesting times” describes your role, you may be a security and risk management (SRM) leader. Between resource constraints caused by rapid-fire tariff announcements, pressure to expand your purview and a perpetual need to catch up with the latest cybersecurity threat, your best bet is to prioritize initiatives that align with the organization’s broader objectives.

Prioritize For Risk Reduction and Resilience

Talk to Gartner to discover the top cybersecurity projects SRM leaders should prioritize in the coming months to reduce organizational risk and increase resilience.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Turn your attention to AI governance, unstructured data and cyberstorage

Staffing shortages and tight budgets are putting comprehensive security solutions out of reach for many SRM leaders. We spotlight three 12-month projects that optimize resources and engage stakeholders.

The state of cybersecurity

The SRM leader's role is changing as businesses are taking on more risks, responding to the macro-economic conditions and the evolving threat landscape. This change has led to additional responsibilities for the SRM leader such as cyber-physical systems security (e.g., operational technology, the Internet of Things, enhancing data governance frameworks, ensuring robust business continuity strategies and facilitating the adoption of AI technologies). SRM leaders must also navigate new data and AI compliance regulations, a constant barrage of new threats and increasing complexity in IT. Uncertainty about tariffs tops it all off.  

SRM leaders can make measurable progress in the next 12 months by:

  • Introducing the safe use of GenAI by embedding cybersecurity considerations into the GenAI governance framework

  • Adopting risk-reducing practices and technologies to unstructured data management

  • Implementing advanced storage governance and AI-driven threat detection

Embed cybersecurity considerations into GenAI governance

As organizations integrate and commoditize GenAI in operations, SRM leaders must make it their business to establish strong security guardrails that protect the technology and its use. GenAI is deployed via software embeds and emerging structures (e.g., agentic AI), so policies must be updated routinely to address emerging capabilities and security implications.

Approach this initiative with the assumption that GenAI capabilities are embedded in most software and that users cannot detect the presence of GenAI functions in applications. This mindset covers the interests of the organization while seeking to preserve stakeholder trust.

SRM leaders should create short-, medium- and long-term goals to define and implement GenAI governance:

  • Short term. Augment governance artifacts with GenAI guidance by creatingGenAI policy, standards, procedures and usage guidelines to cover GenAI-specific security issues.

  • Medium term. Monitor for compliance and identify governance deficiencies.

  • Long term. Collaborate with business leaders to address gaps produced by evolving GenAI adoption and deployment models.

Prepare unstructured data for GenAI adoption

The top reason for failed GenAI deployments is a lack of GenAI-ready data. Organizations that use retrieval-augmented generation pipelines for their GenAI applications need access to unstructured data, which comprises 70% to 90% of the data in today’s organizations.

As vendors race to address demand for augmented data management, SRM leaders must establish data governance programs that enforce security measures to prevent GenAI from allowing unauthorized access to sensitive data. This means discovering, classifying and cataloging unstructured data, optimizing access entitlements and protecting sensitive content by redacting or concealing it.

SRM leaders should:

  • Implement a data governance program to address the specific challenges and benefits of integrating GenAI into the organization.

  • Reduce unnecessary data and streamline data preparation for AI applications.

  • Make sure data discovery tools, data classification and handling instructions are ready for AI use.

  • Ensure compliance with data residency requirements, especially GenAI services that involve cross-border data transfers.

  • Maintain clear visibility and transparency in the use of AI in standardized business applications and custom AI applications that require large language model (LLM) training data.

Enhance the cybersecurity of data with cyberstorage

Traditional infrastructure security layers that focus on network and endpoint are no longer enough to prevent cyberattacks and data loss. By 2029, 100% of storage products will include cyberstorage capabilities focused on active defense beyond recovery from cyber events,up from 20% in early 2024. Cyberstorage adds a security layer at the storage level ─ a proactive bulwark against advanced cyberthreats.

Storage teams may be reluctant to step outside their comfort zone. However, as cyberattacks increase and gain visibility at C-level, storage operators must accept responsibility for implementing cyberstorage capabilities. Ultimately, if the security layers at the network perimeter or application levels fail, the storage administrator is responsible for identifying what data to recover and from what point in time, while ensuring access to critical data.

Enterprise storage solutions vendors have started to offer a range of security features that align with the U.S. National Institute of Standards and Technology (NIST) Cybersecurity Framework’s six pillars: govern, identify, protect, detect, respond and recover.

Cybersecurity projects FAQs

What is cyberstorage?

Cyberstorage actively defends storage systems and data against cyberattacks through prevention, early detection and attack blocking. It also supports data analytics, forensic attack analyses and storage-specific recovery capabilities. Cyberstorage can be an enterprise storage product with comprehensive features, a platform-native service offering with integrated solutions or a collection of stand-alone products that augment storage vendors with cyber protection capabilities.


How are tariffs impacting cybersecurity?

Organizations are facing uncertainties due to the speed at which tariffs are being announced and applied. These have the potential to impact security planning and operations in different ways, such as delaying deployment of critical security infrastructure.

Attend a Conference

Accelerate growth with Gartner conferences

Gain exclusive insight on the latest trends, receive one-on-one guidance from a Gartner expert, network with a community of your peers and leave ready to tackle your mission-critical priorities.

Drive stronger performance on your mission-critical priorities.