Courtesy of high-profile breaches, AI-fueled advanced cyberattacks, and increasing regulatory scrutiny, cyber risk is one of those fun things that has successfully transcended into both a technical problem and a critical business issue.
As such, it is even more important to understand and align cyber risk appetite and tolerance with organizational objectives. Adopting mature, proactive, data-driven cyber risk management strategies will better protect data, assets, and users. By harnessing the potential of cyber risk management as a tool to be proactive instead of reactive, organizations can have better insight into their current state of risk.
The FAIR Institute recently issued a report (sponsored by GuidePoint Security and SAFE Security), based on its global survey of over 400 cybersecurity leaders. This blog will cover key insights from this “2025 State of Cyber Risk Management Report”, trends currently reshaping cyber risk management, and steps you can take to integrate cyber risk management into your organization to maximize impact.
By continually performing risk assessments, organizations can prioritize projects and analyze areas of improvement. Risk assessments should be conducted at major changes and no less than annually. A third party performing a risk assessment helps feed better data into risk registers and helps avoid tunnel vision.
Increasingly, organizations are managing third-party risks through their cyber risk management programs. This approach identifies critical dependencies and engenders trust. By joining these risk practices, organizations simplify risk analysis, reporting, and response.
By quantifying risks in monetary terms, leaders can optimize cybersecurity budgets and align investments with business objectives. Plus, cyber risk management dashboards enable real-time decisions by providing immediate insights to enable more effective resource allocation.
But it’s not all roses and sunshine. Even among well-established cyber risk management programs, obstacles remain. 90% report that their risk appetite and tolerance levels were approved by the board; however, 33% still report a lack of executive commitment or prioritization. And 34% face resistance from peers and stakeholders. This underscores the importance of sustained leadership support to drive cyber risk management initiatives forward. Even the best laid out risk program will not be fully effective if the organization does not foster an appropriate risk culture that aligns with appetite and tolerance statements.
They are also challenged by integrating cyber risk management into broader business operations due to insufficient support from business partners (22%) and change management concerns (26%).
The slogan “security is everyone’s job” has a nice ring to it and is great in theory. But ensuring the role of cyber risk management in the organization is integral to bridging those gaps between business partners and management. Therefore, cyber risk professionals need to be sure they are doing their part to explain their function and benefit to the organization. Most stakeholders want to do the right thing, but if they don’t understand the ‘why,’ it can be hard to balance security against other business needs.
These insights can guide you in creating a future-proof cyber risk management program.
The 2025 State of Cyber Risk Management Report paints a picture of this very important discipline that will be critical to organizational success. To stay ahead, businesses must:
High-maturity programs go beyond simple compliance; they can drive innovation, resilience, and trust while reducing costs.
Want to learn more actionable insights on cyber risk quantification, automation, and AI adoption? Read the full 2025 State of Cyber Risk Management report.
Will Klotz
Senior Security Consultant, Risk,
GuidePoint Security
Will Klotz is a Senior Security Consultant with over a decade of experience building and leading cybersecurity and risk management programs across a range of industries, including banking, fintech, federal, insurance, healthcare, and software. Since entering the security field in 2010, Will has developed and implemented enterprise-wide frameworks for information security, third-party risk, policy exception handling, and AI risk governance.
He has hands-on experience with a wide array of technologies, ranging from firewalls and endpoint detection to SIEMs and email security, and has delivered risk and compliance initiatives across global organizations. Will’s work spans major regulatory and industry frameworks including PCI DSS, HITRUST, GDPR, NIST, ISO, SOC 2, SOX, and FDIC guidelines.
Will holds an MBA and is a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and FAIR-certified risk analyst, among other credentials. He is passionate about translating complex security and regulatory challenges into clear, actionable strategies that drive business value.