Cyber Security Priorities For The New Normal

The COVID-19 crisis has ushered in a new era, filled with challenges for cyber security professionals and while the world has battled a global health crisis, Chief Information Officers (CISOs) were fighting off an unprecedented number of cyber attacks and looking for ways to secure a remote workforce most weren’t prepared to support.

Over the past year, CISOs have had to grapple with the challenges of strengthening their organisation's security posture, minimising risks, and ensuring business continuity in the new normal. 

The Coronavirus has placed an enormous strain on the global economy, and cyber criminals took advantage of that and accelerated their activities and cyber security teams  were challenged to shore up their security posture in the new hybrid  environment characterised by a high level of risky remote working. 

The rise in volumes and sophistication of cyber attacks in the a hybrid working environment has only compounded the challenges and this necessitates a shift in cyber security priorities.

Cyber security has jumped up the list of corporate priorites  which has put CISOs in the hot seat as business leaders worry that it could be their names inthe headlines striggling to explain how a breach occurred. CISOs must focus on security fundamentals, including asset management, password management, cyber hygiene, configuration, patching, threat detection and prevention, user education, reporting and documentation.

Cyber security is a business issue and needs to be treated as one, instead of being looked at as an IT issue. CISOs need to be aware of the business risks. Similarly, the other business leaders need to be aware of the threat landscape, the security risks involved, and the level of investment required to counter them and strengthen the security posture. 

Without a solid foundation investment in cyber security will not yield the intended benefits. 

Organisations must redesign their security defenses in such a manner that it works, with or without the secure, controlled environment of the office premises. 

  • The security solution chosen must offer always-on, multi-layered, intelligent protection against existing and emerging threats.
  • Organisations need to create a culture of cyber security that starts with the CEO. Onle when the organisation's  decison makers display leadership employees are much better motivayed to adopting and maintain effective standards of security in their routine work. 

The level of sophistication of attacks has increased manifold in the past couple of years. Attackers leveraging advanced technology to infiltrate company networks and gain access to mission-critical assets. In this situation, organisations too need to leverage technology such as next-generation WAF, intelligent automation, behavior analytics, deep learning and security analytics to prevent even the most complex and sophisticated attacks. Automation of security processes enables organisations to gain speed and scalability in the broader IT environment with increased attack activity. 

Some 64% of CISOs fear their companies are at risk of a major cyber attack in the coming year and 66% feel their organisation is unprepared to handle it, according to the the 2020 CISO Report from security software maker Proofpoint.

Today,  CISOs need to redesign their security controls and identity and access management policies to reflect the current scenario.

  • CISOs  must have full visibility into connected devices and the rapidly expanding endpoints. They must have updated intelligence on what data is produced by the connected devices, who is connecting to company networks and from where, what are they accessing and exactly what they authorised to access.
  • Another challenge is the rapid adoption of cloud computing by a growing number of organisations and the almost instant surge in the use of public cloud and cloud-native resources driven by remote working. This isn't temporary and it looks like the shift to the cloud  is permanent.

All this means that CISOs need to rethink their security policies to secure the cloud infrastructure. They must deploy new intelligent tools & technology, holistic processes, and comprehensive governance models that provide visibility into the cloud environment and help secure the cloud infrastructure.

Developing Robust Strategy & Tactics

Organisations typically have security incident response plans and business continuity plans. But neither of these factored in the  worldwide impact of Coronavirus.Clearly, the cyber security priorities for 2022 and beyond require CISOs and business leaders to develop robust continuity and resilience plans for such events:- 

  • The effect of the Coronavirus has strengthened the case for creating autonomous teams in a hybrid work environment to ensure increased agility and responsiveness to the relentless pace of change.
  • Email is one of the largest and most vulnerable pipelines for malicious actors to enter an organisation and compromise its data. 2020 clearly showed that more than 20% of known threats routinely executed some form of an email-based phishing attack against industry networks. 

The cyber security priorities for 2022  provide a route map for how CISOs can redesign their organisation's cyber  security to be better equipped for the future.

For more specific cyber training suggestions please contact Cyber Security Intelligence for advice and recommendatsion  about cyber security employee training.

The Hacker News:     CSO Online:       Proofpoint:     Techtarget:     ArcServe:      CBI Secure

You Might Also Read:

Cyber Security Resolutions: (£)

 

« Europol Breaks Open Mafia Cyber Crime Group
Treason: Top Cyber Security Executive Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Engineering Ingegneria Informatica

Engineering Ingegneria Informatica

Ingegneria Informatica is a leading Italian provider of Information Technology consulting, services and solutions including cyber security.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

Smart Hive

Smart Hive

Smart Hive has created a platform that will allow organizations to share real-time, relevant and actionable threat intelligence among each other while maintaining confidentiality.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.