Cyber Resilience
December 17, 2025
2025-12-17
2025-12-17
11:04

Are You Training for a Fight That’s Already Over?

Cyber Resilience Strategy
Contributors
Lead Cyber Security Engineer
Immersive
Share

Are You Training for a Fight That’s Already Over?

In our previous post, we explored the Confidence Illusion, the dangerous gap between how ready organizations feel and how ready they actually are. But as a threat researcher, I want to dig into why this is happening. Yes, teams are overestimating their skills, but they’re also often practicing the wrong ones entirely.

Preparing for yesterday’s threats won’t stop tomorrow’s attacks. Yet, the data from our 2025 Cyber Workforce Benchmark Report reveals a stark reality: many organizations are effectively training for a fight that is already over. While attackers are weaponizing AI and laying the groundwork for quantum decryption, defenders are still running the same playbooks for vulnerabilities that made headlines years ago.

So while a workforce might be technically proficient in certain known threats actors and their tactics, they remain dangerously unpracticed for the future.

The Comfort of the Familiar

We’re only human, and we practice what we know. It feels good to run a drill and see green checkmarks across the board. This desire for validation is driving a worrying trend in cyber readiness: a fixation on legacy threats.

Our data shows that 60% of training exercises still focus on vulnerabilities that are more than two years old, such as Log4Shell (2021) and SaltStack (2020). Don't get me wrong, these are still relevant and unpatched systems do exist. But if your team’s primary measure of readiness is how fast they can patch a known vulnerability from 2021, you aren't preparing them for 2026. You’re preparing them for a history exam.

This backward-looking approach contributes directly to the stagnation we’re seeing in resilience scores. The median response time to new Common Vulnerabilities and Exposures (CVEs) has stalled at 17 days. In a world where threat actors can reverse-engineer a patch and weaponize an exploit within hours, 17 days is an eternity.

The Post-Exploitation Blind Spot

We found that teams are heavily over-indexing on early-stage tactics like Initial Access and Defense Evasion. These are the "loud" parts of an attack, the phishing email, the firewall alert. But the data shows a critical lack of practice in the phases where the real damage happens: Collection and Command & Control (C2).

This creates a dangerous blind spot. We are raising a generation of defenders who are excellent at spotting a burglar trying to pick the lock, but have no idea what to do once the burglar is already inside the house. If an attacker bypasses the perimeter (and they will), teams that haven't practiced post-exploitation scenarios are left scrambling to understand how data is being staged for exfiltration or how C2 beacons are blending with legitimate traffic.

The Emerging Threat: AI and the Speed of Exploitation

While we practice against yesterday’s threats, the adversary is evolving. The most significant shift we are seeing isn't just new malware, it's the speed and scale  of it enabled by AI.

Attackers are already using LLMs to generate polymorphic code, automate vulnerability scanning, and craft socially engineered phishing campaigns that are indistinguishable from legitimate communication.

Our data uncovered a paradox here: Veteran practitioners often struggle more with these novel threats than newcomers. Experienced pros rely on pattern recognition built over years. When AI generates an attack that breaks those established patterns, that tendency can become a liability. If your training program doesn’t force your senior analysts to confront AI-generated anomalies or adversarial machine learning tactics, their "expert" status offers a false sense of security.

The Quantum Horizon: Harvest Now, Decrypt Later

Looking slightly further ahead, we face the quantum threat. It’s easy to dismiss quantum computing as a 2030 problem, but for threat researchers, the risk is already here.

Nation-state actors are currently operating on a "Harvest Now, Decrypt Later" strategy and stealing encrypted data today to unlock it once quantum computing breaks current encryption standards (like RSA).

Training for this doesn't require teaching every analyst quantum physics, but rather making sure teams are remaining agile. Can your team identify where your most sensitive encrypted data lives? How quickly could you rotate encryption keys or migrate to post-quantum algorithms if a standard was broken tomorrow? If you are still struggling to patch a 2020 vulnerability, the answer is likely "not fast enough."

Move Beyond the Check-the-Box Mindset

The 2025 Benchmark Report makes one thing clear: Compliance is not capability. Ticking a box that says "Drill Completed" means nothing if the drill didn't challenge your team with modern realities.

To close the gap, organizations need to shift their philosophy:

  1. Balance the Diet: Keep the fundamentals, but ensure at least 50% of your training focuses on threats from the last 12 months.
  2. Practice the "Boom": Spend more time on post-compromise scenarios. Assume the breach has happened—now stop the bleeding.
  3. Simulate the Future: regularly test your teams against AI-driven scenarios and novel attack vectors that break standard playbooks.

You cannot rely on muscle memory for a fight you’ve never experienced. It’s time to stop re-fighting the wars of the past and start preparing for the reality of the present.

Download the full 2025 Cyber Workforce Benchmark Report to see the complete data on emerging threats and readiness gaps

Trusted by top
companies worldwide

customer insights
"The speed at which Immersive produces technical content is hugely impressive, and this turnaround has helped get our teams ahead of the curve, giving them hands-on experience with serious vulnerabilities, in a secure environment, as soon as they emerge."
TJ Campana
Head of Global Cybersecurity Operations, HSBC
"Realistic simulation of current threats is the only way to test and improve response readiness, and to ensure that the impact of a real attack is minimized. Immersive’s innovative platform, combined with Kroll’s extensive experience, provides the closest thing to replication of a real incident — all within a safe virtual environment."
Paul Jackson
Regional Managing Director, APAC Cyber Risk, Kroll
"Exploring cybersecurity can feel like a huge challenge with so many skills to master, but Immersive has made the journey so much easier for me over the past five years. This practical, interactive approach hasn’t just improved my technical abilities—it’s given me a real sense of confidence. I truly recommend Immersive!"
Paul Blance
Specsavers
"I recently got the chance to try out Immersive, and it was an enlightening experience! The gamified learning made absorbing new information quite enjoyable. The community is welcoming, adding to the overall positive atmosphere. It would be fantastic to see more active users, which could enhance collaboration and discussions. Overall, a solid platform!"
Atakan Bal
Mercedes Benz

Ready to Get Started?
Get a Live Demo.

Simply complete the form to schedule time with an expert that works best for your calendar.