Alex Woodward

Alex Woodward

Senior Vice President - Consulting Delivery, Cyber Security, CGI in the UK & Australia

As cyber threats evolve at pace, so must our defences. 2025 underscored that resilience is no longer a “nice to have.” With regulatory pressure rising and threat-actors leveraging advanced tools, 2026 will demand organisations shift from ambition to execution, transforming cyber security from a function into a foundational business capability.

Where we are: key drivers heading into 2026

  • The incoming Cyber Security and Resilience Bill (CSRB) will tighten obligations around operational resilience and supply chain risk, making cyber readiness a business and regulatory necessity.
  • AI is no longer optional or experimental. It has already been bolted into many security toolchains, whilst powerful, results have been mixed.
  • Threat actors are exploiting AI to escalate the sophistication of phishing, social engineering, and supply-chain attacks. Attacks on AI implementations through prompt injection will continue to rapidly rise. At the same time, post-quantum cryptography (PQC) standards are stabilising, and early PQC deployments are underway.
  • Supply-chain complexity and shadow-IT continue to create blind spots. Many organisations lack real visibility into their true exposure, especially across third-party integrations.

 

What 2026 holds: key predictions

1. Resilience becomes enforceable, not optional

Under the cyber security resilience bill, organisations who are Operators of Essential Services will have new duties secure their supply chains. They will need to:

  • Demonstrate recovery capability via validated disaster-recovery and continuity plans.
  • Conduct regular resilience testing, not just maintain documentation.
  • Provide transparent oversight over third-party suppliers and Managed Service Providers (MSPs).
  • Report on risk posture and supply-chain dependencies, elevating cyber from an IT concern to board-level accountability.

 

2. Tactical AI, from buzzword to business utility

AI deployment in security will sharpen focus. In 2026, expect:

  • Targeted AI use cases, prioritising areas like alert correlation, dependency scanning, and automated response workflows.
  • Greater scrutiny on cost vs benefit, especially as compute and licensing costs rise.
  • A shift toward efficient, outcome-driven AI adoption, rather than broad experimentation.

 

3. Defence evolves as attacks become smarter

With adversaries deploying AI-enhanced phishing, deepfakes, and supply-chain tampering:

  • Defensive tooling will evolve, incorporating context-aware threat detection, real-time dependency evaluation, and behaviour-driven monitoring.
  • Security teams will need to manage increased variability as AI lowers the barrier to development, demanding robust code review and governance mechanisms.

 

4. Supply-chain risk gets quantified, not just assessed

Organisations will begin shifting from questionnaire-based supplier assessments to data-driven, continuous monitoring:

  • Supplier risk scorecards and real-time visibility tools will increasingly be used to manage exposure.
  • Focus will be on modelling and minimising risk through data-informed decisions, rather than attempting to eliminate supplier dependencies.

 

5. Post-quantum migration moves from theory to practice

PQC will go from “future-proofing” to live integration:    

  • Early-adopter industries (finance, defence, telecoms) will begin full-scale PQC migration.
  • Integration complexity, especially across legacy infrastructure, will emerge as the challenge. Planning for PQC will become a critical strategic project.

 

6. Vulnerability management becomes continuous, automated & board-visible

Traditional patch cycles and ad-hoc assessments are no longer sufficient. In 2026:

  • Continuous scanning and AI-led prioritisation of vulnerabilities will replace monthly patching and reporting methods. 
  • Automated regression testing and remediation orchestration to be used to reduce manual overhead.
  • Dashboards will summarise technical exposure and business risk, bridging the gap between security teams and executive leadership.

 

What this means for boardrooms and leadership

Cyber security is no longer a back-office concern, it is a strategic business enabler. In 2026, leadership must:

  • Demand evidence of resilience, not just compliance check-boxes.
  • Ensure budgets reflect real risk, including supply-chain dependencies, AI deployment costs, and PQC migration.
  • Embed security thinking into all aspects of operations, from procurement, to development, to third-party management.
  • Accept that cyber resilience is ongoing endeavour, not a one-off effort.

 

Navigating 2026 with intention

The path forward is clear: 2026 will be the year organisations move from reaction to resilience. By combining targeted AI adoption, continuous risk visibility, regulatory compliance, and strategic planning, organisations can build defences that are as dynamic and interconnected as the threats they face.

My advice: treat cyber security as a board-level strategic pillar, not an IT afterthought. It’s time to build for reliability and resilience, not just compliance.

If you want to discuss how to navigate to resilience:

Get in touch

About this author

Alex Woodward

Alex Woodward

Senior Vice President - Consulting Delivery, Cyber Security, CGI in the UK & Australia

Alex leads CGI’s UK cyber practice with responsibility for Security Advisory, Managed Security Services and Penetration testing capabilities.