Gartner: enabling cybersecurity amid geopolitical rifts


The digital and physical worlds are increasingly intertwined, amplifying both the complexity and stakes for cybersecurity and risk management leaders. On top of that geopolitical tensions are escalating and regulatory requirements are evolving, which means SRM leaders need to move their organization beyond reactive security models.
Today, SRM leaders are integrating geopolitical awareness, cyber deterrence, and AI-driven security into their cybersecurity strategies, so they can swiftly counter threats and ensure operational continuity and resilience, protecting not just systems, but the trust and stability that fuel organizational success.
Director Analyst at Gartner.
The growing influence of geopolitics on cybersecurity
Geopolitical instability is no longer a backdrop – it’s a direct driver of security decision-making. Gartner predicts that by 2029, geopolitics will be a significant consideration in security programs managed by global organizations. Three key forces drive this shift: regulatory fragmentation, increased cyber risks from third parties, and the growing importance of cyber resilience.
Governments worldwide are enforcing stricter data sovereignty laws, compelling businesses to reassess cloud computing strategies and third-party relationships. Regulatory frameworks such as the EU’s Cyber Resilience Act and the US Cyber Incident Reporting for Critical Infrastructure Act illustrate how businesses need to now navigate increasingly stringent compliance mandates. Failure to comply can result in penalties, disruptions, and weakened market positioning.
Cyber deterrence: a proactive paradigm
Traditional cybersecurity strategies focus on detection and response, but this reactive model has limitations. Cyber deterrence is an underutilized strategy with transformative potential for mitigating cyber risk before attacks occur. Unlike conventional security measures, deterrence discourages attacks by increasing the perceived costs for adversaries, aligning with their motivations for profit and anonymity.
Deterrence measures include automated domain takedowns, bug bounty programs, and deception technologies such as honeypots. These tactics disrupt adversaries’ ability to conduct reconnaissance, execute attacks, or operate within compromised environments. By 2027, over 75% of large enterprises deploying deterrence tactics will expand these measures, creating new benchmarks for operational resilience.
Despite its potential, cyber deterrence remains underdeveloped in most organizations. Many businesses mistakenly conflate deterrence with active countermeasures, such as “hack back” strategies. However, effective deterrence does not require retaliation—it focuses on shaping adversary behavior by exploiting their motivations, including financial incentives, anonymity concerns, and operational costs.
The third-party cyber risk conundrum
One of the most overlooked risks in cybersecurity is the growing reliance on third-party vendors. Every supplier, cloud computing provider, and outsourced service introduces potential vulnerabilities, and many businesses lack full visibility into their extended attack surface. Traditional third-party cyber risk management (TPCRM) approaches – lengthy security questionnaires and periodic audits – are proving insufficient in today’s fast-moving threat landscape.
Organizations need new ways to assess and monitor third-party risk in real time. Tools like generative AI (GenAI) are beginning to play a role in automating risk assessments, identifying anomalies, and flagging potential vulnerabilities before they can be exploited. But adoption remains slow, and many security teams are still struggling to allocate the resources needed to manage third-party threats effectively.
Building a resilient cybersecurity framework
The ability to anticipate, withstand, and recover from cyber disruptions determines whether an organization can maintain operations in an increasingly volatile world.
Building resilience requires SRM leaders a shift in mindset to include:
- Assess Geopolitical Risks: Analyze how global and regional dynamics impact both business operations and security programs and integrate into current planning.
- Adopt Cyber Deterrence Tactics: Leverage tools like automated deception and domain takedowns to proactively counter threats, dissuade attackers and limit their ability to operate.
- Strengthen Third-Party Risk Management: Focus on business continuity and compensating controls to mitigate vulnerabilities in extended ecosystems.
- Implement GenAI for Cybersecurity: Invest in AI capabilities to address resource constraints and enhance efficiency and precision in threat detection and response.
- Promote Crypto-Agility: Prepare for evolving cryptographic standards to ensure long-term data security in the face of advancing threats.
The path forward
The convergence of geopolitical risk, third-party vulnerabilities, and technological disruption presents a complex challenge—but also an opportunity. As cybersecurity evolves, SRM leaders that prioritize resilience, deterrence, and collaboration in their organization will be better positioned to navigate this dynamic landscape.
We rate the best endpoint protection software.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The digital and physical worlds are increasingly intertwined, amplifying both the complexity and stakes for cybersecurity and risk management leaders. On top of that geopolitical tensions are escalating and regulatory requirements are evolving, which means SRM leaders need to move their organization beyond reactive security models. Today, SRM leaders are…
Recent Posts
- Gartner: enabling cybersecurity amid geopolitical rifts
- Nothing makes sense: why the company’s new (3a) Pro is my favorite affordable premium smartphone over the Google Pixel 9a
- Suborbital Salvage is a thrilling endless runner for Playdate that pelts you with asteroids and insults
- Nike is facing a lawsuit from people who bought its NFTs
- Largest DDoS attack of 2025 hit an online betting organization with 1Tbps brute force: here’s what we know
Archives
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010