{"id":59855,"date":"2025-12-15T00:00:00","date_gmt":"2025-12-15T00:00:00","guid":{"rendered":"urn:uuid:bb1885a8-decd-0473-1e31-0be307325b21"},"modified":"2025-12-15T00:00:00","modified_gmt":"2025-12-15T00:00:00","slug":"cyber-risk-management-defenders-tell-it-like-it-is","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/","title":{"rendered":"Cyber Risk Management: Defenders Tell It Like It Is"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/trend-micros-2025-defenders-survey-report:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/trend-micros-2025-defenders-survey-report.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Every year, members of the Trend team pack their bags, blow up their neck pillows, and jet off to share cybersecurity insights with customers and industry leaders across the globe as part of our Trend World Tour. In 2024, we decided to make the event more of a two-way conversation by surveying cybersecurity professionals on the challenges they face and what matters to them.<\/p>\n<p>The result was our first-ever Trend Micro Defenders Survey Report, a data-driven account of frontline perspectives on key issues and emerging opportunities for cybersecurity professionals. It was so well received, we repeated the exercise in 2025, tripling the scope with more than 3,000 responses from 88 countries.<\/p>\n<p>This time around, we heard from cybersecurity managers and leaders, as well as individuals in a range of hands-on roles, from security configuration to cloud security and threat detection and response. The resulting <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/core\/docs\/ebook\/eb-defender-survery.pdf\"><span class=\"bs-modal\">Trend Micro Defenders Survey Report 2025<\/span><\/a> paints a vivid picture of the realities cybersecurity teams are up against and the emerging importance of taking a holistic, strategic approach to cyber risk management.<\/p>\n<p>In this blog, we share some of the top-level findings, with follow-ups planned to drill down into the details.<\/p>\n<p><span class=\"body-subhead-title\">Cloud and AI are key cyber risk factors<\/span><\/p>\n<p>One of the first findings to jump out of this year\u2019s survey is that there\u2019s really no enterprise IT without cloud and AI these days, and both do double duty as business enablers and sources of risk.<\/p>\n<p>A clear majority of respondents\u201458%\u2014say they depend on hybrid cloud resources to meet their IT needs, with 41% adding that hybrid configurations will be essential to achieving their plans for AI adoption. The message seems to be that flexibility is crucial. Organizations want to balance the cost benefits of public cloud offerings with the control of on-premises IT resources. Once enterprises move IT into the cloud, they tend to stay there. Just 2% of respondents say they\u2019ve repatriated systems back to on-premises deployments after migrating to the cloud.<\/p>\n<p>While cloud plays a critical role in many organizations\u2019 plans for AI, security professionals continue to be wary of bad actors leveraging and targeting AI in novel attacks. When asked for their top AI-related cybersecurity priorities, more than a quarter said their big concern is defending against AI-driven impersonation and fraud perpetrated with the help of audio and video deepfakes. Business email compromise schemes are another top-of-mind area of AI fraud.<\/p>\n<p>Application attacks and data and intellectual property leaks round out the list of AI-related security priorities alongside getting a better grip on employees\u2019 use of AI tools, both sanctioned and unsanctioned, and strengthening data governance.<\/p>\n<p><span class=\"body-subhead-title\">Cyber risk management is a challenge for SecOps<\/span><\/p>\n<p>To manage risk, you have to be able to see it. Cloud environments generally and hybrid cloud in particular can make that difficult. In our Trend Micro Defenders Survey Report 2025 respondents confirmed this, with nearly 20% saying cloud assets are hardest to keep an accurate, up-to-date inventory on, followed by remote and hybrid work assets, network infrastructure, and identities, endpoints, and mobile devices.<\/p>\n<p>Security operations (SecOps) teams have other concerns as well when it comes to cyber risk management, two big ones being data protection and identity. Both are implicated in cybersecurity broadly and with respect to AI in particular. AI can be a source of inadvertent data exposures and, as more automated agents start to play a role in AI services, it will become increasingly critical to ensure they are who they say they are.<\/p>\n<p>The main tactics relied on to protect data include traditional methods like data loss prevention (DLP) and email\/content filtering, though more advanced, layered approaches are gaining traction, including data detection and response (DDR), secure service edge (SSE) solutions, and data security posture management (DSPM). Somewhat surprisingly, 5% of survey respondents say they have no formal data protection tools, a significant liability.<\/p>\n<p>Where identities are concerned, cybersecurity tools of choice include multi-factor authentication (MFA), identity and access management (IAM), SSE again, and approaches like attack surface management (ASM) and continuous threat exposure management (CTEM).<\/p>\n<p>A further concern, especially given the areas of specific concern for security teams, is that more than 60% of respondents say they don\u2019t have or don\u2019t know if they have documented and tested incident report plans to help them deal with breaches effectively.<\/p>\n<p><span class=\"body-subhead-title\">Cyber risk management is a people issue<\/span><\/p>\n<p>The cybersecurity field has been wrestling with skills shortages for years, and the toll of that perennial problem shows up in this year\u2019s Defenders survey as well. Nearly 20% of respondents say gaps in skills and training are their top challenge. Many also worry their teams are too small, with burnout a looming threat.<\/p>\n<p>This confluence of human factors has sparked fears that detections could be missed, especially since 30% of organizations also struggle with process optimization, and sizable numbers report challenges with automation, prioritization, and alert fatigue.<\/p>\n<p>Respondents are taking a two-pronged approach to deal with these issues, with a quarter saying they\u2019re investing in training and the same proportion also saying they\u2019re spending on AI-enabled tools to bridge the talent gaps. A good number also report using consultants and outsourced services to augment in-house capacity, including incident response, managed detection and response (MDR), SOC as a service, and managed security services.<\/p>\n<p>A third finding this year is that even with persistent skills shortages and cybersecurity team strain, more than 10% of organizations have no defined plans to address the issues. As threats evolve and intensify, the resulting cracks in their security posture will only continue to grow.<\/p>\n<p><span class=\"body-subhead-title\">What\u2019s needed to advance cyber risk management?<\/span><\/p>\n<p>In this blog, we\u2019ve sketched out the lay of the land\u2014the context global cybersecurity professionals are operating within. So, what are they doing about it, and how are organizations seeking to mature their approach to cyber risk management? We\u2019ll explore those questions in our upcoming blogs. For the full story, download the complete Trend Micro Defenders Survey Report 2025 <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/core\/docs\/ebook\/eb-defender-survery.pdf\"><span class=\"bs-modal\">here<\/span><\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/l\/trend-micros-2025-defenders-survey-report.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Based on more than 3,000 responses from cybersecurity professionals in nearly 90 countries, our Trend Micro Defenders Survey Report 2025 shines a bright light on the current state of cyber risk management. From the impact of cloud and AI on IT environments to top technical and human challenges, this year\u2019s findings have a lot to say about the pressures security teams are under and what organizations are doing to tighten their grip on cyber risk. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9765,9538,9562],"class_list":["post-59855","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-annual-predictions","tag-trend-micro-research-compliancerisks","tag-trend-micro-research-report"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Risk Management: Defenders Tell It Like It Is 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk Management: Defenders Tell It Like It Is 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-15T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/trend-micros-2025-defenders-survey-report:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Risk Management: Defenders Tell It Like It Is\",\"datePublished\":\"2025-12-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/\"},\"wordCount\":999,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/trend-micros-2025-defenders-survey-report:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Annual Predictions\",\"Trend Micro Research : Compliance&amp;Risks\",\"Trend Micro Research : Report\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/\",\"name\":\"Cyber Risk Management: Defenders Tell It Like It Is 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/trend-micros-2025-defenders-survey-report:Large?qlt=80\",\"datePublished\":\"2025-12-15T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/trend-micros-2025-defenders-survey-report:Large?qlt=80\",\"contentUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/trend-micros-2025-defenders-survey-report:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-defenders-tell-it-like-it-is\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Annual Predictions\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-annual-predictions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Risk Management: Defenders Tell It Like It Is\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Risk Management: Defenders Tell It Like It Is 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Risk Management: Defenders Tell It Like It Is 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-12-15T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/trend-micros-2025-defenders-survey-report:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Risk Management: Defenders Tell It Like It Is","datePublished":"2025-12-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/"},"wordCount":999,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/trend-micros-2025-defenders-survey-report:Large?qlt=80","keywords":["Trend Micro Research : Annual Predictions","Trend Micro Research : Compliance&amp;Risks","Trend Micro Research : Report"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/","name":"Cyber Risk Management: Defenders Tell It Like It Is 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/trend-micros-2025-defenders-survey-report:Large?qlt=80","datePublished":"2025-12-15T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/trend-micros-2025-defenders-survey-report:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/trend-micros-2025-defenders-survey-report:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-defenders-tell-it-like-it-is\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Annual Predictions","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-annual-predictions\/"},{"@type":"ListItem","position":3,"name":"Cyber Risk Management: Defenders Tell It Like It Is"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59855"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59855\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}