Loading...

10 Mar 2026 06:01

Media-Avataar Insights Tech & Start Up

Gartner Forecasts Security and Risk Management Spending in MENA to Grow 12% in 2024

Growth of Generative AI Is Augmenting Threat Landscape

End-user spending on security and risk management (SRM) in the Middle East and North Africa (MENA) region is forecast to total $3.3 billion in 2024, an increase of 12.1% from 2023, according to a new forecast from Gartner, Inc.

“The rapid growth of generative AI (GenAI) is expanding the threat landscape. At the same time, the evolving regulatory landscape and the alarming frequency of cyberattacks are prompting SRM leaders to increase their spending on security measures,” said Shailendra Upadhyay, Senior Research Principal at Gartner.

“Organizations are also strategically improving their defenses by adopting advanced technologies and security solutions which enable them to proactively identify potential vulnerabilities or malicious activities across various digital platforms.”

Gartner analysts are discussing ways to enhance the flexibility and responsiveness of SRM techniques and technology at the Gartner Security & Risk Management Summit, taking place in Dubai .

In 2024, spending on data privacy in MENA is projected to record the highest growth rate of all segments, increasing 24% year-over-year (see Table 1)

“In accordance with the European Union’s General Data Protection Regulation (GDPR), the Gulf Cooperation Council (GCC) has recently implemented data protection laws for handling personal data of identifiable individuals,” said Upadhyay. “These laws require MENA organizations to maintain a higher standard of data privacy and cyber security measures, resulting in an increase in spending on data privacy.”

Cloud security spending is expected to record an increase of 17.4%, the second highest growth rate in 2024. The growing use of infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), is projected to drive spending on cloud security resources. The adoption of multi-cloud environments has also resulted in increased security complexities, which has boosted the demand for cloud-based detection and response solutions, such as endpoint detection and response and management tools.

Most Critical Cybersecurity Trends in 2024 for MENA CISOs

The appearance of GenAI as a mainstream capability is causing significant disruptions in digital and business sectors. Gartner predicts that GenAI will cause a spike in the cybersecurity resources required to secure it, causing more than a 15% incremental spend on application and data security by 2025.

To effectively manage GenAI challenges and tackle other external factors, such as a shortage of security talent, growing regulatory concerns, and the rapid adoption of cloud technology, CISOs must prioritize two top cybersecurity trends. They will help improve organizational resilience and the performance of the cybersecurity function.

Exploring the Potential and Perils of GenAI – Large language model (LLM) applications, such as ChatGPT and Google Bard, have put GenAI on the agenda for inclusion in many business, IT and cybersecurity roadmaps.

“GenAI creates new attack surfaces, which security leaders must be ready to defend,” said Jon Amato, Senior Director Analyst at Gartner. “To reduce the risks of GenAI, application and data security programs must adapt to accommodate this new way of using the technology to do business.”

Organizations must establish policies that govern the use of GenAI applications and develop training and guidance modules. This will help minimize unauthorized use of GenAI and decrease the risks of privacy and copyright infringement. Additionally, companies should update their application and data security practices to incorporate new attacks, such as the prompts or orchestration layers used to control AI models.

Security Behavior and Culture Programs – The democratization of GenAI amplifies security challenges that organizations can face. Democratizing GenAI enables employees to have unrestricted access to powerful technical capabilities that, if used without due care, could result in data breaches.

Organizations need to implement security behavior and culture programs (SBCPs) to minimize cybersecurity incidents associated with employee behavior, whether inadvertent or deliberate. “Implementing effective SBCPs requires greater support and time commitments from senior executives and a shared vision of a secure enterprise that everyone in the organization can understand and support,” said Amato.

 

(Visited 82 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETkincir88ABC1131ABC1131 LOGINanalisa dalam teknik taktik mahjong wild deluxe dadu sicbo gates of olympus untuk maksimalisasi peluang menang perihokimengoptimalkan peluang jackpot perihoki dengan strategi dan analisa mahjong ways 2 pgsoft baccarat starlight princesspanduan interaktif teknik dan strategi bermain mahjong wins 3 pragmatic sweet bonanza perihokipeta pola efektif dan strategi jitu perihoki rtp live mahjong ways 2 pgsoft roulette wild bounty showdownmenguraikan jalur keberuntungan dan taktik mahjong wins 3 pragmatic blackjack sugar rush sv388 perihokieksperimen peluang terstruktur duta76 teknik analisa mahjong wild deluxe dadu sicbo gates of olympustaktik cerdas dan pola unik rtp live mahjong ways 2 pgsoft baccarat starlight princess duta76teknik menguasai strategi dan pola tersembunyi mahjong wins 3 pragmatic sweet bonanza duta76analisa peluang dan strategi lengkap mahjong ways 2 pgsoft roulette wild bounty showdown duta76simfoni peluang dan manipulasi rng mahjong wins 3 pragmatic blackjack sugar rush sv388 duta76mahjong tampak seimbang scatter permainanmahjong wild penentu momen emas pemainperpaduan mahjong scatter nuansa responsifputaran bergejolak scatter hitam mahjong winsputaran mulus scatter nahkoda mahjong winsaws alasan mahjong wins3 media sosialaws analisa teknikal scatter mahjongways2aws jadwal jam mahjong waysaws kisah nyata kebaikan mahjong wins3aws panduan mitigasi risiko digitalaws perjuangan pola mahjongways2aws rahasia kemenangan beruntun mahjongwins3aws rtp tinggi gaya bermain mahjongways2aws strategi simbol spesial mahjongwins3aws teknik volatilitas mahjongways2dekomposisi parameter mahjong ways 2 sistem hiburanrahasia pola gates of olympus 27 jutametodologi ritme starlight princess target terukurevolusi motivasi sweet bonanza aktivitas digitalsolusi efisiensi malam sugar rush 1000pembaruan algoritma gates of gatot kaca 30 jutabedah sistem pembayaran wild west goldformulasi strategis wild bandito 97 perseninovasi visual lucky neko platform premiumtinjauan pola buffalo win stabilitas hasilaws dinamika progresif mahjong winsaws integritas sistem mahjong waysaws pergeseran spin mahjong winsaws scatter wild mahjong waysaws sinkronisasi proses mahjong winsaws akselerasi spin mahjong winsaws analisis scatter hitam mahjongaws data akurat mahjong waysaws desain progresif mahjong waysaws sinkronisasi struktur mahjong winsmenguasai strategi dan pola tersembunyi mahjong wild deluxe dadu sicbo gates of olympus perihokieksperimen peluang terstruktur dan analisa mahjong ways 2 pgsoft baccarat starlight princess perihokipanduan interaktif teknik dan strategi mahjong wins 3 pragmatic blackjack sweet bonanza perihokisimulasi probabilitas intergalaksi mahjong ways 2 pgsoft roulette wild west gold perihokinavigasi multi dimensi fortuna dan strategi terapan mahjong wins 3 pragmatic blackjack sugar rush sv388 perihokipola canggih mahjong wild deluxe sicbo gates of olympus dengan pendekatan modern duta76teknik rahasia dan taktik terapan mahjong ways 2 pgsoft baccarat starlight princess duta76analisa peluang jitu dan strategi lengkap mahjong wins 3 pragmatic blackjack sweet bonanza duta76transmutasi intuisi ke algoritma menang mahjong ways 2 pgsoft roulette wild west gold duta76strategi transformatif dan peta peluang tersembunyi mahjong wins 3 pragmatic blackjack sugar rush sv388 duta76aws logika terstruktur mahjong winsaws time window mahjong waysaws taksonomi scatter hitam pgsoftaws sinkronisasi bertahap mahjong waysaws perbandingan mahjong baccarataws rtp mahjong super scatteraws analisis scatter gates olympusaws ritme permainan mahjong waysaws siklus rtp mahjong winsaws animasi jatuh scatter olympusstrategi teknik dan taktik cerdas menang mahjong wild deluxe dadu sicbo dengan analisa pola dan rtp live gates of olympus perihokicara efektif menang mahjong ways 2 pgsoft baccarat starlight princess taktik strategi pola dan analisa perihokipanduan cerdas peluang dan strategi mahjong wins 3 pragmatic blackjack sweet bonanza teknik analisa rtp live perihokicara efektif dan profesional menguasai mahjong wild deluxe dadu sicbo dengan taktik strategi pola dan analisa rtp live gates of olympus duta76rahasia taktik pro dan strategi mahjong ways 2 pgsoft baccarat starlight princess analisa pola rtp live duta76teknik advanced strategi dan taktik mahjong wins 3 pragmatic blackjack sweet bonanza peluang analisa pola rtp live duta76komparasi sesi treasures of aztec arena interaktifindikator harian fortune dragon sesi ketangkasanstudi balikan mingguan roma legacy rotasi optimaleksplorasi taktik pola golden dragon digitalkalkulasi saldo blood diamond 15 jutaaws korelasi parameter mahjong waysaws teori permainan mahjong ways3aws manajemen risiko gates olympusaws breakdown volatilitas mahjong winsaws model stokastik sweet bonanzaaws tren rtp intensitas scatteraws metode analisis mahjong winsaws pemantauan rtp live pgsoftaws fase tenang mahjong waysaws wild emas olympus multiplieraws evaluasi sesi mahjong waysaws grid terbuka reaksi berantaiaws diskusi komunitas mahjong waysaws jadwal bermain mahjong waysaws tren digital mahjong waysaws sinkronisasi reel mahjong waysaws perilaku pemain mahjong winsaws atmosfer malam mahjong ways Top