Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » What Will Cybersecurity Be Like in 2030?
Cybersecurity

What Will Cybersecurity Be Like in 2030?

Chris HughesBy Chris HughesJune 6, 2022Updated:April 13, 20234 Mins Read
Facebook Twitter LinkedIn Email
Cybersecurity in 2030
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

While trying to predict the future is a futile endeavor, it is possible to look at current and emerging trends and make an educated guess as to what the future looks like. Activities of the present and the past can also help inform those predictions. In this article, we will take a look at three current and growing trends that will likely help shape the cybersecurity landscape of the future.

Software Supply Chain: Complexity and Regulation

One current trend that is nearly impossible to ignore is the growing concern about the software supply chain and the realization of just how complex and fragile the current ecosystem is. The ability of the software supply chain to severely damage the broader industry — everything from the Open Source Software (OSS) ecosystem to vendors such as SolarWinds — has quickly become apparent.

We’ve now seen a robust cybersecurity Executive Order (EO) with an entire section dedicated to the software supply chain. We’ve seen a White House software supply chain summit with many technology leaders and industry organizations present.

Subsequently, we now have a published OSS Security Mobilization Plan from The Linux Foundation and OpenSSF. NIST has published comprehensive updates to its flagship Cybersecurity Supply Chain Risk Management (C-SCRM) guidance, which includes sections for OSS as well as third-party service providers such as Managed Service Providers (MSP) and Cloud Service Providers (CSP).

With all of these factors considered along with the blatantly obvious convergence between software and our daily lives, it would be difficult to argue that we won’t see drastic changes to the software supply chain. We are and will continue to see emerging best practices, as well as efforts by the government to try and regulate the safety and security of its environments and their stakeholders.

One quick example is the Federal government’s plans to require self-attestation adherence to the NIST Secure Software Development Framework (SSDF) from NIST.

Cybersecurity as a Business Leadership Function

We have long heard calls for cybersecurity to have a “seat at the table” when it comes to the C-Suite and among organizational leadership. We’ve seen an increase in companies seeking Chief Information Security Officers (CISO) and vCISOs, particularly in the Small and Mid-Sized Business (SMB) market.

Now, we have calls from the Security and Exchange Commission (SEC) to require publicly traded companies to disclose the presence of cybersecurity leadership in their board makeup. We’ve also seen the CISO role evolving into more broad security-oriented roles such as Chief Security Officers (CSO) in some organizations.

These factors make it very likely that cybersecurity will continue to become a business requirement, especially as organizations evolve to continue to use technology as a business enabler. We now live in a digitally-driven society, with more than half of global Gross Domestic Product (GCP) tied to digital platforms.

Failing to secure this system risk will be absolutely devastating to global economies and it is a siren call being sung by groups such as the World Economic Forum (WEF) and Digital Directors Network (DDN), and others.

Cyberwork Workforce Shifts

Anyone who has been in cybersecurity for some time or who has actively sought cybersecurity talent can attest to the challenges and shortages we face as an industry. Organizations such as ISC2 release studies every year that point out the dire state of the cybersecurity workforce and the consequences this shortage has on securing digital efforts such as those discussed in the two previous sections.

That said, despite this knowledge, our hiring and talent management practices haven’t changed. We still widely require traditional academic credentials and extensive years of experience. I suspect we will see this change, with modern tech companies already starting to strip traditional degree requirements. Avenues of non-traditional tech education continue to prosper, with organizations such as Udemy, KodeKloud, and Pluralsight thriving.

We will see significant amounts of people looking to transition careers, especially with climbing inflation, and seek industries with better pay and benefits. Cybersecurity needs to take advantage of this reality by dropping antiquated hiring practices, allowing a bigger tent, and welcoming lifelong learners with open arms. Diversity of thought, backgrounds, and experiences will ultimately lead to more resilient systems, and that’s what we’re after.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

CISO Cybersecurity featured Featured Post leadership Open-Source Software supply chain
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

SAP Q2 Results: The Good News, and the Not-As-Good News

July 24, 2025

SAP Still #1 in Apps Growth, but Big Backlog Slowdown

July 24, 2025

U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers

July 23, 2025

Thailand Turns to Microsoft Azure AI for Legal System Overhaul

July 23, 2025
Add A Comment

Comments are closed.

Recent Posts
  • SAP Q2 Results: The Good News, and the Not-As-Good News
  • SAP Still #1 in Apps Growth, but Big Backlog Slowdown
  • U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers
  • Thailand Turns to Microsoft Azure AI for Legal System Overhaul
  • SAP Q2 Outlook: I Expect Cloud Revenue to Rise 27%, Cloud Backlog 29%

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }