Navigating The Evolving Threat Landscape

When it comes to the threat landscape, cyber criminals are growing in sophistication, and it’s no secret that businesses are battling against increasing cyber-threats. It’s become not a question of ‘if’ an organisation will be attacked, but ‘when’.

It's critical that organisations are able to identify these threats and mitigate against them, without any disruption to business continuity. To do so effectively, the responsibility lies with the CISO to be aware of the nuances within the threat landscape, and changes affecting it.

When assessing this, it becomes clear that prioritising regulation and insurance policies and enforcing operational resilience is key to safeguarding the future.

The Evolving Threat Landscape 

External factors have a significant impact on cybercrime. Uncertainty brought about by geopolitical events, such as the war in Ukraine, create an environment for cybercrime to thrive. Oil, gas and food famine resulting from the war is demonstrating in real time how threat actors will abuse new threat vectors and pull on the strings of a globalised supply chain to cause widespread instability. Similarly, at the beginning of the pandemic, cybercrime soared by 600% as threat actors took advantage of a new vulnerability. 

With geopolitical factors encouraging cybercrime, the costs associated are becoming astronomical. This is causing premiums to skyrocket as insurance companies are struggling to cover the volume and costs of a cyber-attack. Cybercrime is estimated to increase in cost for companies to $10.5 trillion by 2025, which makes it even more important for organisations to have the ability to respond at pace. When it comes to defence against ever-sophisticated cybercrimes, reacting fast is critical to mitigating disruption to business operations and avoiding a serious loss of income. 

In light of this, what should the CISO’s top two priorities be to navigate the evolving threat landscape successfully?

Priority One: Regulation & Insurance 

Regulation sits far behind where we need to be to mitigate risk across all industries. Often, new measures don’t come in until after a world impacting event requires it to do so. The devastating events of 9/11 is a prime example of this, with some companies having one Data Centre in the North Tower and one in the South. Following the event, new regulations mandating data proximity between two sites were introduced, to avoid them being exposed to the same regional risks. This demonstrates why we must be cognisant to the fact that regulation lags behind logical standards to mitigate threats, and why we must educate organisations to advocate action that goes beyond meeting the bare minimum. 

Insurance companies are realising the gap is too big - hence the rise in cyber premiums. Some companies, such as water utility and chip manufacturers, are finding themselves increasingly uninsurable because insurance providers are demanding higher standards, but regulation still sits far behind where it should be. This is a problem because a lot of businesses completely rely on insurance policies to cover recovery costs against these kinds of attacks and some insurers, such as Lloyds London, are even withdrawing their policies altogether because of this. CISOs need to start thinking about how confident they are in their ability to recover and the financial implications they would face from prolonged downtime – which now faces the very real threat of not being covered by insurance.

Priority Two: Operational Resilience 

Resilience needs to become more proactive. Whether it’s geopolitical, cyber, or environmental, businesses need to realise that responsibility for the concentrated risk and operational resilience lies with CISOs, IT Directors and Risk Officers, not with regulators and insurers. Here however lies a critical opportunity to push incremental progress, helping build organisational and industry stability.

It begins with understanding where you are today. Where are the gaps and where do you want to get to? Investing in automating and orchestrating recovery processes, enhancing recovery time and recovery point objectives, while simultaneously mitigating human error in restoring from backups should be a focus in all organisations. Continuous testing and cyber simulation exercises can support this, ensuring you have confidence in your ability to act and recover at pace when the worst happens.

Proactive Action

As the threat landscape continues to expand and the growing volume of attacks are increasing in sophistication, organisations are facing longer downtime and rising recovery costs.

To effectively safeguard for the future, there needs to be a realisation that regulation lags behind where it needs to be for mitigating risk. Insurance policies are shifting that risk and the responsibility is now back into the hands of the CISO. In addition to this, organisations must adopt a culture of becoming operationally resilient to survive the evolving threat landscape, which should be driven by the CISO. 

Tom Goodwin is Business Continuity Specialist at Kyndryl

You Might Also Read: 

Guilty: A Criminal Conviction For One CISO Has Consequence For Others:

 

« Shifting Left In Enterprise Cloud Security
Five Ways Executives Can Optimize Cyber Security Spending »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.