In the second half of this year, we expect cyber risk management to continue to evolve as treasurers and organizations strengthen defenses. Here are six trends to keep an eye on:

 

Recommended For You

1. The greater interest from regulators related to threat intelligence and threat intel sharing.

Regulators and auditors are looking to every level of an organization to be engaged in the risk management of cybersecurity risk. This is now an area that the treasurer can expect to be asked about in regulatory reviews and by their board. Regulators want to see demonstrations that the treasurer is engaged in cybersecurity activities, and that the culture of security management has become part of every person's role.

 

2. The continuation of merging of cyber network and cyber fraud indicators of compromise.

Cyberattacks are becoming increasingly sophisticated and targeted; they combine elements of vulnerability across many areas to create opportunity. Just as attacks are gaining in complexity and breadth, our security responses have to gain in depth and variety and be multilayered.

 

3. The increase in mobile-device threats and attempts at exploitation.

Mobile devices are playing an increasingly important role within the portfolio of tools being used in the treasury space; mobile is also an easily and regularly targeted threat vector. This will continue to grow, and having an adequate mobile policy is critical, as it's not just the same as everything else we do.

 

4. The greater sophistication of the criminal infrastructure.

Cybercrime has become commercialized, with many elements of it being commoditized. It's effectively a business in its own right, and we need to acknowledge that in responding to that risk.

 

5. The availability of more vendor and sales information.

Organizations looking to undertake their own cyber risk management are faced with a multitude of point solutions in the cyber industry space that collectively are daunting—and the market is growing. Leveraging the scale of a technology vendor that is able to wrap this into their treasury solution package can be an effective way to help manage that complexity.

 

6. The maturation and evolution of the threat intel space.

Threat intelligence, near–real-time sharing of threat data, and threat knowledge collaboration are growing trends amongst corporate and government agencies where previously this information was jealously guarded. Engage with this trend, either independently or through your vendors, to prepare to manage the risks to your business.

 

NOT FOR REPRINT

© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.