Cybersecurity, Artificial Intelligence

Cybersecurity has spent decades optimizing how quickly organizations can respond to attacks. We measure mean time to detect. Mean time to respond. Mean time to contain. But as threat intelligence, telemetry, and AI-driven analysis improve, a new capability is emerging: the ability to predict where attacks are likely to occur before they happen. And that shift changes the fundamental question in cybersecurity—from “How fast can we respond?” to “How early can we decide?”

In the first blog in this series, Reframing Cyber Risk, we argued that the traditional formula for cyber risk—Threat × Likelihood × Impact—is incomplete. It assumes organizations operate in a reactive model, where risk is evaluated after threats emerge and defenses respond.

But modern cybersecurity is increasingly moving toward a predictive model. With advances in threat intelligence, telemetry, and AI-driven analysis, organizations are beginning to identify where attacks are likely to occur before adversaries exploit them.

That shift changes how we think about cyber risk. Instead of measuring risk purely through threat probability and impact, organizations must also consider their ability to act before an attack materializes.

In other words, cyber risk becomes:

Cyber Risk = (Threat × Exposure × Impact) ÷ Preemption

In this case, preemption reflects the ability to anticipate threats, identify exposures, and remediate weaknesses before attackers exploit them. But once organizations develop this predictive capability, a new challenge emerges—one that is less about technology and more about decision-making.

Prediction Changes the Question Security Must Answer

AI and automation are often discussed in terms of improving detection and response. They make analysts faster, help triage alerts, and accelerate investigation workflows. Those improvements are important, but they largely enhance security after an attack has begun.

Predictive security introduces a much bigger shift. It shifts the fundamental question in cybersecurity from “How fast can we respond?” to “How early can we decide?” Once security teams can anticipate where attacks are likely to occur, they must determine whether to act before the threat becomes visible to the rest of the organization. And that decision is rarely purely technical.

The Preemptive Security Dilemma

Consider a practical example: A security team begins seeing credible intelligence indicating that attackers are increasingly targeting identity infrastructure—Active Directory, Entra ID, or other identity platforms. Threat analysts believe the campaign could expand quickly. When the team reviews their internal environment, they realize something uncomfortable: If attackers targeted their identity infrastructure today, the organization might not be fully prepared to defend it.

Addressing the risk would require significant changes:

  • tightening privileged access controls
  • rotating sensitive credentials
  • restricting legacy authentication protocols
  • deploying additional monitoring
  • modifying authentication workflows

None of these changes are trivial. Some may disrupt operations, affect application integrations, or slow down user workflows during a critical business period. And at this moment, the attack has not yet occurred, so leadership faces a difficult choice: Do they disrupt the business today to address a threat that might materialize? Or do they accept the risk that attackers could exploit the exposure before remediation occurs?

This is the preemptive security dilemma—a problem that becomes far more common as security programs become more predictive.

The Challenge Isn’t Prediction—It’s Alignment

Technology is rapidly improving our ability to identify threats and exposures early. Modern platforms can fuse:

  • external threat intelligence
  • internal vulnerability and configuration data
  • control effectiveness telemetry
  • asset context and business criticality

This fusion allows organizations to identify the attack paths that matter most, often before attackers begin exploiting them. But prediction alone does not reduce risk. Organizations must still decide to act. And that decision requires alignment between security and the business.

Security leaders must be able to answer questions such as:

  • How likely is this threat to materialize?
  • What systems or business processes could be impacted?
  • What would the operational or financial impact be if the attack succeeded?
  • What disruption would remediation cause today?

Without that context, predictive insights can stall because the organization lacks a framework for deciding when early action is justified.

The Next Evolution of Cyber Risk Management

As predictive security capabilities continue to mature, the nature of cyber risk management will change. Security teams will increasingly identify risks before they become incidents. The challenge will no longer be limited to detecting attacks or responding to alerts. Instead, organizations will face a new strategic question: When should we act on predicted risk?

Answering that requires combining predictive intelligence with clear business context—often measured in financial impact—so leaders can credibly weigh operational disruption against potential impact. Ultimately, the goal of cybersecurity is not simply to respond faster when attacks occur—it is to prevent the attack from succeeding in the first place. And that requires organizations to become not just reactive defenders, but predictive decision-makers.

What Comes Next

If predictive security changes the question from “How fast can we respond?” to “How early can we decide?”, the next challenge becomes operational. How do organizations actually make those decisions consistently and confidently? How do security teams translate predictive intelligence into clear, business-ready decisions about when to act? And how do leaders balance operational disruption today against the potential impact of an attack tomorrow?

Those are the questions we will explore in the next blog in this series: Reframing Cyber Risk, Part 3: Operationalizing Preemptive Defense.

Dataminr for Cyber Defense

Transform intelligence into a preemptive cyber advantage from first signal to risk-prioritized action.
Learn More
Author
Jerry Caponera, SVP, Risk and Threat Exposure Management
April 8, 2026
  • Cybersecurity
  • Artificial Intelligence
  • Cyber Risk
  • Blog