• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to footer

Before Header

Bryghtpath

Business Continuity and Crisis Management Consultants

  • About
        • About Bryghtpath

        • Our Core Values

        • Meet our Team

        • About Bryghtpath
          • Case Studies & Results
          • Certifications and Awards
          • Contact Bryghtpath
          • Contract Vehicles
          • Media & Professional Appearances
          • Our Clients
          • Our Proven Process
          • Security & Compliance
          • Strategic Partners
          • Work with Us
  • Capabilities
        • Our Capabilities
        • We help your organization strategically navigate uncertainty and disruption.

        • Case Studies & Results

        • Business Continuity as a Service

        • Business Continuity
          • Business Continuity - Overview
          • Business Continuity as a Service (BCaaS)
          • Business Continuity Software
          • Coaching
          • IT Disaster Recovery
          • Resiliency Diagnosis®️
        • Crisis Management
          • Crisis Management - Overview
          • Crisis Communications
          • Crisis Exercises
          • Cyber Crisis Exercises
          • Cyber Incident Response Planning
          • Crisis Playbook®️
          • Global Security Operations Center (GSOC)
          • Resiliency Diagnosis®️
        • Other Capabilities
          • Coaching
          • Intelligence & Global Security Consulting
          • Speaking
          • Training
        • Case Studies & Results
        • Industries
  • Insights
  • Products
        • Our Products

          College Classroom - Mature Teacher
        • Crisis Playbook™️

        • Exercise in a Box™️

        • Exercise in a Day™️

        • Books
          • From Panic to Poise: Crisis Management in the Modern World
          • The Continuity Code: Mastering Business Resilience
        • Crisis Playbook™️
          • Overview
          • Active Shooter Plan
          • Emergency Response Guide
          • Fatality
          • Food/Product Recall
          • Protest
          • Violent Attack
        • Maturity Models
          • Overview
          • ASIS Workplace Violence and Active Assailant
          • FFEIC Maturity Model – Business Continuity
          • ISO 22301 – Business Continuity
          • ISO 22361 – Crisis Management
          • ISO 27031 - IT Disaster Recovery
          • NIST 800-53 Contingency Planning Maturity Model
        • Templates & More
          • After-Action Process & Templates
          • Awareness Collateral
          • Business Continuity Plan Templates
          • Crisis Management Plan Templates
          • Disaster Recovery Plan Templates
          • Job Descriptions
  •  

Mobile Menu

  • About
    • About Bryghtpath
      • Case Studies & Results
      • Certifications and Awards
      • Contact Bryghtpath
      • Contract Vehicles
      • Media & Professional Appearances
      • Our Clients
      • Our Proven Process
      • Security & Compliance
      • Strategic Partners
      • Work with Us
  • Capabilities
    • Our Capabilities
    • Business Continuity
      • Business Continuity – Overview
      • Business Continuity as a Service (BCaaS)
      • Business Continuity Software
      • Coaching
      • IT Disaster Recovery
      • Resiliency Diagnosis®️
    • Crisis Management
      • Crisis Management – Overview
      • Crisis Communications
      • Crisis Exercises
      • Cyber Crisis Exercises
      • Cyber Incident Response Planning
      • Crisis Playbook®️
      • Global Security Operations Center (GSOC)
      • Resiliency Diagnosis®️
    • Other Capabilities
      • Coaching
      • Intelligence & Global Security Consulting
      • Speaking
      • Training
    • Case Studies & Results
    • Industries
  • Insights
  • Products
    • Books
      • From Panic to Poise: Crisis Management in the Modern World
      • The Continuity Code: Mastering Business Resilience
    • Crisis Playbook™️
      • Overview
      • Active Shooter Plan
      • Emergency Response Guide
      • Fatality
      • Food/Product Recall
      • Protest
      • Violent Attack
    • Maturity Models
      • Overview
      • ASIS Workplace Violence and Active Assailant
      • FFEIC Maturity Model – Business Continuity
      • ISO 22301 – Business Continuity
      • ISO 22361 – Crisis Management
      • ISO 27031 – IT Disaster Recovery
      • NIST 800-53 Contingency Planning Maturity Model
    • Templates & More
      • After-Action Process & Templates
      • Awareness Collateral
      • Business Continuity Plan Templates
      • Crisis Management Plan Templates
      • Disaster Recovery Plan Templates
      • Job Descriptions
  •  

The Cyber Threat Landscape Has Shifted Under You

You are here: Home / Crisis Management / The Cyber Threat Landscape Has Shifted Under You
Symbolic image of a digital insect representing a computer bug or malware over circuit board technology. Highlights the concept of cybersecurity threats and the importance of data protection.

May 2, 2026 By //  by Bryan Strawser

The cyberattack your organization planned for in 2024 is not the cyberattack you will face in 2026.

That is not hyperbole. It is what the data shows, and it is what we see in the resilience and crisis work we do with clients across financial services, healthcare, technology, and critical infrastructure.

The change is not a single new tactic. It is a structural shift in how cyber threats are constructed, delivered, and monetized. Programs built around the assumptions of even two years ago are now defending the wrong perimeter, against the wrong actor, for the wrong outcome.

This piece walks through what has changed across three threat fronts that matter most to executive leaders going into 2026: cyber extortion, insider risk, and AI-enabled identity attacks. Then it lays out where most resilience programs need to close the gap in the next 90 days.

Cyber extortion is no longer a ransomware problem

For most of the last decade, “ransomware” and “cyber extortion” were the same conversation. Encrypt the files. Demand payment for the key. Pay or restore from backup.

That model is on its way out.

In 2026, a growing share of extortion incidents do not involve encryption at all. Threat actors steal data, threaten to publish it, and skip the encryption step entirely. Backup-based recovery, the defense most business continuity programs were built around, no longer applies. There is nothing to recover from. The damage is the disclosure, not the outage.

Public reporting confirms the shift. Tracked extortion attacks rose roughly 47 percent from 2024 to 2025. The volume of victim organizations listed on dark web leak sites grew nearly 60 percent in the same period. Newer Ransomware-as-a-Service operators have normalized triple extortion: encrypt, exfiltrate, and contact the victim’s customers, partners, and regulators directly to amplify pressure.

Two changes follow for any organization reviewing its cyber response plan.

 

Old view New view
A ransomware response is a recovery exercise. A cyber extortion response is a disclosure decision under pressure.
Backups are the defense. Decision speed and pre-approved disclosure language are the defense.
Restoration timelines are the metric. Time to first verified external statement is the metric.

The first hour of a 2026 cyber extortion response is not about restoring systems. It is about deciding what to tell customers, regulators, and the press, often before the technical scope is fully understood. If your tabletop exercises are still focused on restoration timelines, you are practicing the wrong drill.

The third-party pressure layer is also new. Threat actors no longer wait for the victim organization to disclose. They contact your largest customers directly. They email your regulators.
They post your executives’ personal data on social media to escalate the news cycle. By the time your communications team is drafting an internal note, your CEO is already getting calls from reporters and from your top three accounts.

The second change is dwell time. Average attacker dwell time inside compromised environments has dropped from roughly nine days in 2023 to under 48 hours in 2026, driven by AI-assisted reconnaissance and automated lateral movement. Detection windows that were considered acceptable two years ago are now too slow to matter. Your incident response retainer needs to assume hours, not days, between initial detection and full compromise.

Insider risk has become an AI problem

The insider threat conversation used to be about a disgruntled employee with a USB drive.

That picture is now incomplete in two important ways.

First, the cost has climbed. The 2026 Ponemon and DTEX global report puts the average annual cost of insider risk at $19.5 million per organization, a 12 percent increase year over year and a 123 percent increase since 2018. Ninety percent of organizations report at least one insider incident in the past 12 months. More than half report six or more.

Second, the nature of insider risk has changed. About 55 percent of incidents come from negligent employees, not malicious actors. The fastest-growing category is what the 2026 report calls “shadow AI”: employees feeding sensitive corporate data into unauthorized AI tools, creating exfiltration channels that traditional DLP and monitoring tools were not built to detect.

The deliberate side is also evolving. Ransomware operators are now actively recruiting insiders, particularly native English speakers in target organizations. Some of those recruitment efforts are succeeding. Layoffs and workforce instability heading into 2026 are likely to widen the recruitment pool further.

The implication for resilience leaders is uncomfortable. Insider risk is no longer a quarterly DLP review. It is a real-time governance problem that touches HR, legal, IT, and security at the same time. Programs that treat it as a security-only function continue to miss the most expensive incidents.

Identity is the new perimeter

The third shift is the one most leaders are still underestimating.

In 2026, deepfake-as-a-service is operational. Voice cloning at executive quality requires three to five seconds of audio. Real-time video impersonation is no longer a research demo. Several publicly reported wire fraud and vendor payment fraud incidents in the past year began with a deepfake of a known executive, on a video call, asking for an exception to standard process.

The Palo Alto Networks 2026 forecast frames this directly: identity, not network or endpoint, is the primary battleground of the AI economy. Eighty-seven percent of cyber leaders surveyed last year identified AI-related vulnerabilities as their fastest-growing risk.

For business continuity and crisis management programs, this matters in a specific way. Identity attacks do not look like incidents on a SIEM dashboard. They look like a normal business transaction approved by a normal-sounding leader. By the time the incident is recognized, the money has moved or the data has left.

The defense is not technological alone. It is procedural. Out-of-band verification for any high-value action initiated by voice or video. Mandatory call-back protocols for wire transfers above a defined threshold. Tabletop exercises that include a deepfake injection. None of these are exotic. Most organizations have not updated their crisis playbooks to require them.

The connective tissue: speed and convergence

Step back from the three fronts and one pattern emerges across all of them.

The threat is not new actors. The same criminal ecosystems and nation-state groups are operating with new speed, new tools, and new monetization models. Ransomware operators are recruiting insiders. Insider events are amplified by shadow AI. Identity attacks are weaponized inside extortion campaigns. A single 2026 incident can include all three vectors at once.

The lines between these categories have collapsed. Your security operations center cannot solve this alone. Your business continuity team cannot solve it alone. Your communications team cannot solve it alone. The response that works is the one where all three of those functions, plus legal and the executive team, are operating from the same playbook, in the same room (physical or virtual), inside the first hour.

This is what we wrote about in the Polycrisis Playbook earlier this year. Cyber risk no longer travels alone. It overlaps with reputational risk, operational risk, regulatory risk, and stakeholder trust, often in the same incident, often inside the same first hour.

Programs that were built to handle one of these things at a time are not built for 2026.

What to do in the next 90 days

Three concrete moves, in order.

Run a tabletop in the next 60 days that tests a data-theft-only extortion scenario, not an encryption event. The decisions are different. The legal exposure is different. Most executive teams have never practiced this version of the call.

Bring HR, Legal, IT, and Security into a single insider risk review this quarter. Map your shadow AI exposure. Identify your detection gap. Define what insider recruitment outreach looks like in your environment and how it gets escalated. This work cannot live solely in the security organization.

Update your executive verification protocols this month. Mandatory call-back for any executive-initiated financial action above a set threshold. A safe word, agreed in person, for high-stakes voice or video requests. A standing rule that no leader is offended by a verification call. These are five-minute decisions that prevent seven-figure losses.

A closing note

The defense in 2026 is not new technology alone. It is faster decisions, integrated teams, and crisis playbooks that match the threats we are actually facing.

Resilience is not a binder. It is a capability. And it can be built.

If your program is still organized around 2023’s threat model, this is the year to close the gap.

Keep Going

A few ways to go deeper if this was useful.

  • Read more. Resilience, crisis management, and continuity writing at Bryghtpath Insights, or the structured Ultimate Guide to Crisis Management.
  • Run that tabletop. Exercise in a Day™ is a fully designed executive tabletop, built and (optionally) facilitated in a single day. The data-theft-only scenario in this post is one we can stand up for you.
  • Get a maturity score. Our Resiliency Diagnosis® is a standards-based review that produces a maturity score and a prioritized roadmap.
  • Talk to us. Set up a call to think through your program with us.

Category: Crisis Management

About Bryan Strawser

Bryan Strawser is Founder, Principal, and Chief Executive at Bryghtpath LLC, a strategic advisory firm he founded in 2014. He has more than twenty-five years of experience in the areas of, business continuity, disaster recovery, crisis management, enterprise risk, intelligence, and crisis communications.

At Bryghtpath, Bryan leads a team of experts that offer strategic counsel and support to the world’s leading brands, public sector agencies, and nonprofit organizations to strategically navigate uncertainty and disruption.

Learn more about Bryan at this link.

Previous Post: « The 2025 Resilience Imperative: Lessons from the WEF Pulse Check and Bryghtpath’s Playbook

Footer

Contact

BRYGHTPATH LLC
+1.612.235.6435

PO Box 131416
Saint Paul, MN 55113
USA


contact@bryghtpath.com

  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

Our Capabilities

  • Business Continuity
    • Business Continuity as a Service (BCaaS)
    • Business Continuity Software
    • Coaching
    • IT Disaster Recovery Consulting Services
    • Resiliency Diagnosis®️
  • Crisis Communications
  • Crisis Management
    • Crisis Exercises
    • Cyber Crisis Exercises
    • Cyber Incident Response Planning
    • Global Security Operations Center (GSOC)
  • Speaking
  • Training

Our Free Courses

Business Continuity 101

Crisis Communications 101

Crisis Management 101

Our Products

After-Action Templates

Books

Business Continuity Plan Templates

Communications & Awareness Collateral Packages

Crisis Plan Templates

Crisis Playbook®

Disaster Recovery Templates

Exercise in a Box®

Exercise in a Day®

Maturity Models

Ready-Made Crisis Plans

Resilience Job Descriptions

Pre-made Processes & Templates

Site Footer

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Bryghtpath®, Crisis Management Academy®, Crisis Playbook®, Exercise in a Box®, Exercise in a Day®, Resiliency Diagnosis®, Resilience Operating Model®
and their respective logos are registered trademarks of Bryghtpath LLC in the United States and other countries.


About Bryghtpath LLC | Disclaimer | Privacy | Status Page | Terms of Use

Proudly powered by Mai Theme, the Genesis Framework, and Wordpress.