This brief provides a concise supervisory view of 2024 as a year where identity abuse, structural workforce risks and governance choices became more predictive of severe incidents than traditional hygiene indicators. It documents how organisations with similar CVE profiles and toolsets experienced very different outcomes depending on the quality of identity controls, the stability and seniority of security teams, and whether risk models went beyond CVSS/KEV and patch rates. Particular attention is given to availability-focused attacks, long dwell times and the difficulty many boards faced in interpreting technical dashboards in business terms.
The brief translates these observations into a minimal, actionable predictive backbone based on OSPCRM and ORG-GOV. It recommends that boards, regulators and senior practitioners prioritise: (1) a clear P0–P4 impact language shared across business and security; (2) systematic use of context factors (asset criticality, data sensitivity, exposure and resilience); (3) explicit workforce indicators (turnover, seniority balance, overload); and (4) incident-linked performance metrics such as False Negative Rate and precision of the “critical” bucket. The note also outlines how supervisors can ask for evidence of these capabilities without prescribing specific tools.
Citation suggestion:
PASC (2025). Yearly Brief YB-2025-01 – State of Predictive
Cyber Risk, Governance & Workforce Health (Based on trends
observed in 2024). Pan-African Standards Council (PASC).
Disclaimer – This document is provided for informational and governance purposes. It does not replace legal advice, national regulations or binding supervisory guidance.