Cyber Security Priorities For The New Normal

The COVID-19 crisis has ushered in a new era, filled with challenges for cyber security professionals and while the world has battled a global health crisis, Chief Information Officers (CISOs) were fighting off an unprecedented number of cyber attacks and looking for ways to secure a remote workforce most weren’t prepared to support.

Over the past year, CISOs have had to grapple with the challenges of strengthening their organisation's security posture, minimising risks, and ensuring business continuity in the new normal. 

The Coronavirus has placed an enormous strain on the global economy, and cyber criminals took advantage of that and accelerated their activities and cyber security teams  were challenged to shore up their security posture in the new hybrid  environment characterised by a high level of risky remote working. 

The rise in volumes and sophistication of cyber attacks in the a hybrid working environment has only compounded the challenges and this necessitates a shift in cyber security priorities.

Cyber security has jumped up the list of corporate priorites  which has put CISOs in the hot seat as business leaders worry that it could be their names inthe headlines striggling to explain how a breach occurred. CISOs must focus on security fundamentals, including asset management, password management, cyber hygiene, configuration, patching, threat detection and prevention, user education, reporting and documentation.

Cyber security is a business issue and needs to be treated as one, instead of being looked at as an IT issue. CISOs need to be aware of the business risks. Similarly, the other business leaders need to be aware of the threat landscape, the security risks involved, and the level of investment required to counter them and strengthen the security posture. 

Without a solid foundation investment in cyber security will not yield the intended benefits. 

Organisations must redesign their security defenses in such a manner that it works, with or without the secure, controlled environment of the office premises. 

  • The security solution chosen must offer always-on, multi-layered, intelligent protection against existing and emerging threats.
  • Organisations need to create a culture of cyber security that starts with the CEO. Onle when the organisation's  decison makers display leadership employees are much better motivayed to adopting and maintain effective standards of security in their routine work. 

The level of sophistication of attacks has increased manifold in the past couple of years. Attackers leveraging advanced technology to infiltrate company networks and gain access to mission-critical assets. In this situation, organisations too need to leverage technology such as next-generation WAF, intelligent automation, behavior analytics, deep learning and security analytics to prevent even the most complex and sophisticated attacks. Automation of security processes enables organisations to gain speed and scalability in the broader IT environment with increased attack activity. 

Some 64% of CISOs fear their companies are at risk of a major cyber attack in the coming year and 66% feel their organisation is unprepared to handle it, according to the the 2020 CISO Report from security software maker Proofpoint.

Today,  CISOs need to redesign their security controls and identity and access management policies to reflect the current scenario.

  • CISOs  must have full visibility into connected devices and the rapidly expanding endpoints. They must have updated intelligence on what data is produced by the connected devices, who is connecting to company networks and from where, what are they accessing and exactly what they authorised to access.
  • Another challenge is the rapid adoption of cloud computing by a growing number of organisations and the almost instant surge in the use of public cloud and cloud-native resources driven by remote working. This isn't temporary and it looks like the shift to the cloud  is permanent.

All this means that CISOs need to rethink their security policies to secure the cloud infrastructure. They must deploy new intelligent tools & technology, holistic processes, and comprehensive governance models that provide visibility into the cloud environment and help secure the cloud infrastructure.

Developing Robust Strategy & Tactics

Organisations typically have security incident response plans and business continuity plans. But neither of these factored in the  worldwide impact of Coronavirus.Clearly, the cyber security priorities for 2022 and beyond require CISOs and business leaders to develop robust continuity and resilience plans for such events:- 

  • The effect of the Coronavirus has strengthened the case for creating autonomous teams in a hybrid work environment to ensure increased agility and responsiveness to the relentless pace of change.
  • Email is one of the largest and most vulnerable pipelines for malicious actors to enter an organisation and compromise its data. 2020 clearly showed that more than 20% of known threats routinely executed some form of an email-based phishing attack against industry networks. 

The cyber security priorities for 2022  provide a route map for how CISOs can redesign their organisation's cyber  security to be better equipped for the future.

For more specific cyber training suggestions please contact Cyber Security Intelligence for advice and recommendatsion  about cyber security employee training.

The Hacker News:     CSO Online:       Proofpoint:     Techtarget:     ArcServe:      CBI Secure

You Might Also Read:

Cyber Security Resolutions: (£)

 

« Europol Breaks Open Mafia Cyber Crime Group
Treason: Top Cyber Security Executive Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.