Home Technology Cyber Chiefs Brace for Major Attacks in Next 12 Months

Cyber Chiefs Brace for Major Attacks in Next 12 Months

by news

A survey of 1,600 chief information security officers found that more than two-thirds of them (68%) expect a “material cyberattack” on their organizations in the next 12 months.
The survey, which is the basis of the annual “Voice of the CISO Report” by Proofpoint, an enterprise security company, showed a pronounced shift in attitude among the security chiefs toward future threats to their organizations. Just 12 months earlier, less than half the CISOs (48%) saw a cyberattack on their horizon.
This pronounced shift suggests that security professionals see the threat landscape heating up once again, the report noted, and have recalibrated their level of concern to match.
“As we emerged from the pandemic, security leaders felt they had been able to implement more long-term controls to protect their work environment, so there was a sense of calm,” explained Proofpoint’s Global Resident CISO Lucia Milica Stacy.
“However, as the volume of attacks continued to increase, coupled with geopolitical tension and global economic uncertainty, a lot of that optimism wore off,” she told TechNewsWorld.
According to security experts, a number of factors could be contributing to the CISOs’ concerns about increased cyberattacks.
“New vectors of attack continue to emerge — software supply chain compromise, API-connected third parties and SaaS systems, AI-related security risks — each requiring new defensive strategies and skills,” observed Karl Mattson, CISO of Noname Security, a provider of a cloud-native API security platform, in Palo Alto, Calif.
“Meanwhile, traditional threats never go away, such as ransomware or web application attacks,” he told TechNewsWorld. “With security budgets and staffing levels largely remaining flat, the stage is set for more risk exposure this coming year.”


A proliferation of endpoints in the enterprise also gives CISOs increased reason for alarm.
“IT leaders are finding it increasingly difficult to gain comprehensive visibility, security, compliance, and control to protect every employee, on every device, from every location,” said Darren Guccione, CEO of Keeper Security, a password management and online storage company, in Chicago.
“The expanding attack surface is particularly concerning with cyberattacks on the rise and IT security teams competing for talent as macroeconomic conditions are tightening budgets,” he told TechNewsWorld.
Adoption of as-a-service models by threat actors also increases the likelihood of an organization coming under attack in the next 12 months. “Phishing-as-a-Service and Ransomware-as-a-Service enable a significant increase in the number and scale of cyberattacks,” explained Avishai Avivi, CISO of SafeBreach, a provider of a breach and attack simulation platform, in Tel Aviv, Israel.
“At that point, it becomes a statistical reality,” he told TechNewsWorld. “The more attacks, the higher likelihood of an attack succeeding.”
Proofpoint also reported that CISOs believe employee turnover has become a risk to data security. More than eight out of 10 of the security chiefs (82%) told researchers that employees leaving their organization has contributed to a data loss event.
“Resource constraints and the great reshuffle of employees are a potential underlying cause of the high percentage of CISOs being concerned about the loss of sensitive data because of employee turnover,” Stacy said.
The two sectors affected the most by turnover were retail (90%) and IT, technology, and telecoms (88%), the report noted.
These trends leave security teams with a near-impossible challenge, it continued. When people leave, stopping them from taking data is difficult.
Some organizations require written guarantees from former employees that they will delete all company data, it added. Others threaten new employers of potential liability if an employee shares any data from their old job. But neither is close to being a satisfactory solution.
“Many employees, upon their departure, attempt to take some aspect of their work with them,” said Daniel Kennedy, research director for information security and networking at 451 Research, which is part of S&P Global Market Intelligence, a global market research company.
“For salespeople, that can be contacts or customer account information. For other employees, it can be a form of intellectual property, models they worked on or code, for example,” he told TechNewsWorld.
“When I was a CISO,” he recalled, “I definitely correlated hits on our various data loss platforms and employees departing. I could generally predict when someone was going to give a resignation based on their behavior.”
The increased concern of CISOs about insiders contributing to data loss represents a departure from past thinking on the subject.
“What has changed recently is a shift in thought from ‘it’s wrong to distrust employees’ or ‘we hire the best’ to ‘we have to secure ourselves from all kinds of threats,” observed Sourya Biswas, technical director for risk management and governance at the NCC Group, a global cybersecurity consultancy.
“Recent U.S. defense leaks by insiders Jack Teixeira, Chelsea Manning, and Edward Snowden may have helped shape this narrative,” he told TechNewsWorld. “It’s not the prevalence of the malicious insider that changed, but rather the awareness around it.”

The level of distrust of employees displayed in the survey probably says more about a company’s overall culture than anything else, maintained Daniel Schwalbe, CISO of DomainTools, an internet intelligence company in Seattle.
“But it can also be attributed to the increase in remote work, which makes some CISOs feel like they are losing visibility into where their data ends up,” he told TechNewsWorld. “The current realities of a remote workforce throw the pre-pandemic corporate network with tight edge controls out the window.”
Proofpoint’s report also found that most organizations are likely to pay a ransom if impacted by ransomware. Three out of five CISOs surveyed (62%) believed their organization would pay to restore systems and prevent data release if attacked by ransomware in the next 12 months.
The report added that the CISOs’ organizations were increasingly relying on insurance to shift the costs of their cyber risks, with 61% saying they would place a cyber insurance claim to recover losses incurred in various types of attacks.
“Over the past five years, there has been general encouragement by cyber insurance companies to pay ransoms and for the cost to be covered by their premiums,” said Chris Cooper, CISO of Six Degrees, a cybersecurity consulting company, in London and a member of the ISACA Emerging Trends Working Group.
“This is, fortunately, changing, as paying ransoms only further excites incidents,” he told TechNewsWorld.
“There is also increasing evidence that some groups are coming back for a second bite at the cherry,” he added.
Proofpoint Executive Vice President of Cybersecurity Strategy Ryan Kalember urged security leaders to remain steadfast in protecting their people and data, despite trying challenges.
“If recent devastating attacks are any indication, CISOs have an even tougher road ahead, especially given the precarious security budgets and new job pressures,” he said in a news release. “Now that they have returned to elevated levels of concern, CISOs must ensure they focus on the right priorities to move their organizations toward cyber resilience.”
John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.
Please sign in to post or reply to a comment. New users create a free account.

Should technology play a larger role in officiating sports events?
– select up to two –

Loading ... Loading …




Yes – to help ensure fairness and objectivity.
Yes – but humans must always have the final say.
No – using tech disrupts the natural game flow.
No – the chance of human error adds excitement to sports.
Doesn’t matter to me, I don’t watch sports.
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/Ubuntu-Lunar-Lobster.jpg
https://www.technewsworld.com/story/ubuntu-23-04-lunar-lobster-lands-with-newly-minted-cinnamon-desktop-flavor-177026.html
Ubuntu 23.04 ‘Lunar Lobster’ Lands With Newly Minted Cinnamon Desktop Flavor
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/Sonos-Era-300.jpg
https://www.technewsworld.com/story/sonos-bets-on-spatial-audio-as-a-key-brand-differentiator-177987.html
Sonos Bets on Spatial Audio as a Key Brand Differentiator
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/Apple-Mac-Mini-M2-M2-Pro.jpg
https://www.technewsworld.com/story/mac-mini-macbook-pro-refreshed-with-latest-apple-silicon-177671.html
Mac Mini, MacBook Pro Refreshed With Latest Apple Silicon
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/server-racks-data-center.jpg
https://www.technewsworld.com/story/are-mainframes-an-indicator-of-banking-reliability-178260.html
Are Mainframes an Indicator of Banking Reliability?
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/bartender.jpg
https://www.technewsworld.com/story/could-bartenders-close-the-growing-tech-skills-gap-in-cybersecurity-178255.html
Could Bartenders Close the Growing Tech Skills Gap in Cybersecurity?
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/remote-worker.jpg
https://www.technewsworld.com/story/personal-data-harvesting-and-how-to-reduce-your-digital-footprint-178046.html
Personal Data Harvesting and How To Reduce Your Digital Footprint
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/open-source-pen-1.jpg
https://www.technewsworld.com/story/business-conditions-prime-for-more-open-source-contributors-176940.html
Business Conditions Prime for More Open-Source Contributors
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/computer-user-perplexed.jpg
https://www.technewsworld.com/story/clickbait-news-sites-turn-to-ai-for-content-178249.html
Clickbait News Sites Turn to AI for Content
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/ai-robot.jpg
https://www.technewsworld.com/story/the-ai-revolution-is-at-a-tipping-point-178143.html
The AI Revolution Is at a Tipping Point
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/student-computer.jpg
https://www.technewsworld.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html
EdTech Developer’s Study Game Approach Aces Med School Testing Curve
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/ai-cybersecurity-lock.jpg
https://www.technewsworld.com/story/researchers-instantly-crack-simple-passwords-with-ai-178233.html
Researchers Instantly Crack Simple Passwords With AI
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/HP-Amplify.jpg
https://www.technewsworld.com/story/hp-affirms-better-together-at-its-amplify-event-178127.html
HP Affirms ‘Better Together’ at Its Amplify Event
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/telehealth-provider.jpg
https://www.technewsworld.com/story/digital-health-care-flourishing-despite-legal-logistical-hurdles-177497.html
Digital Health Care Flourishing Despite Legal, Logistical Hurdles
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/smart-home-2-story.jpg
https://www.technewsworld.com/story/leverage-the-power-of-data-to-monitor-home-energy-efficiency-178147.html
Leverage the Power of Data To Monitor Home Energy Efficiency
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/04/internet-user.jpg
https://www.technewsworld.com/story/tips-to-help-mask-your-identity-online-177846.html
Tips To Help Mask Your Identity Online
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/iot.jpg
https://www.technewsworld.com/story/unresolved-conflicts-slow-esim-upgrade-path-to-better-iot-security-176886.html
Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/business-meeting-1.jpg
https://www.technewsworld.com/story/generative-ai-is-here-forrester-offers-tech-execs-tips-on-next-steps-178204.html
Generative AI Is Here: Forrester Offers Tech Execs Tips on Next Steps
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/cyberwarfare-3.jpg
https://www.technewsworld.com/story/lazarus-hackers-linux-malware-linked-to-3cx-supply-chain-attack-177020.html
Lazarus Hackers’ Linux Malware Linked to 3CX Supply-Chain Attack
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/pet-app.jpg
https://www.technewsworld.com/story/leaky-pet-app-dilemma-can-lead-to-serious-cybersecurity-problems-178116.html
Leaky Pet App Dilemma Can Lead to Serious Cybersecurity Problems
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/computer-dual-monitors.jpg
https://www.technewsworld.com/story/new-distro-makes-running-arch-linux-very-cachy-176997.html
New Distro Makes Running Arch Linux Very ‘Cachy’
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/phone-charging-station.jpg
https://www.technewsworld.com/story/fbi-issues-warning-about-juice-jacking-at-public-usb-charging-stations-178151.html
FBI Issues Warning About ‘Juice Jacking’ at Public USB Charging Stations
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/AnkerWork-SR500-Speakerphone.jpg
https://www.technewsworld.com/story/ankerwork-sr500-speakerphone-near-nirvana-for-pc-use-phones-heck-no-177679.html
AnkerWork SR500 Speakerphone: Near Nirvana for PC Use, Phones Heck No
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/online-psychology.jpg
https://www.technewsworld.com/story/is-chatgpt-smart-enough-to-practice-mental-health-therapy-178064.html
Is ChatGPT Smart Enough To Practice Mental Health Therapy?
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/Bard-wait-list.jpg
https://www.technewsworld.com/story/google-invites-public-to-test-drive-its-ai-chatbot-bard-178066.html
Google Invites Public To Test Drive Its AI Chatbot Bard
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/ThinkStation-P7.jpg
https://www.technewsworld.com/story/lenovo-builds-a-workstation-james-bond-would-love-178003.html
Lenovo Builds a Workstation James Bond Would Love
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/Bark-app.jpg
https://www.technewsworld.com/story/bark-and-calix-partner-to-combat-cyberbullying-178093.html
Bark and Calix Partner To Combat Cyberbullying
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/Silicon-Valley-Bank.jpg
https://www.technewsworld.com/story/social-media-fueled-the-run-on-silicon-valley-bank-study-178230.html
Social Media Fueled the Run on Silicon Valley Bank: Study
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/Space-BACN.jpg
https://www.technewsworld.com/story/darpa-moves-forward-with-project-to-revolutionize-satellite-communication-177003.html
DARPA Moves Forward With Project To Revolutionize Satellite Communication
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/vr-female.jpg
https://www.technewsworld.com/story/gen-ai-and-ar-vr-unintended-consequences-unproven-mainstream-appeal-178156.html
Gen AI and AR/VR: Unintended Consequences, Unproven Mainstream Appeal
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/Holiday-Shopping-Couple-1.jpg
https://www.technewsworld.com/story/mozilla-releases-gift-guide-with-privacy-in-mind-177407.html
Mozilla Releases Gift Guide With Privacy in Mind
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/AI-chip.jpg
https://www.technewsworld.com/story/3-big-generative-ai-problems-yet-to-be-addressed-178213.html
3 Big Generative AI Problems Yet To Be Addressed
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/legal-gavel.jpg
https://www.technewsworld.com/story/meta-lowers-legal-hammer-on-law-enforcement-data-scraper-177669.html
Meta Lowers Legal Hammer on Law Enforcement Data Scraper
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/evs-charging.jpg
https://www.technewsworld.com/story/study-finds-ev-battery-replacement-rare-most-covered-by-warranty-178257.html
Study Finds EV Battery Replacement Rare, Most Covered by Warranty
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/metaverse-future.jpg
https://www.technewsworld.com/story/why-nvidia-is-winning-the-race-to-dominate-the-metaverse-178079.html
Why Nvidia Is Winning the Race To Dominate the Metaverse
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/apple-airpods.jpg
https://www.technewsworld.com/story/health-features-could-be-in-airpods-future-178022.html
Health Features Could Be in AirPods’ Future
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/female-soldier-soluting.jpg
https://www.technewsworld.com/story/female-army-veteran-uses-tech-to-help-create-a-better-future-177372.html
Female Army Veteran Uses Tech To Help Create a Better Future
Copyright 1998-2023 ECT News Network, Inc. All Rights Reserved.
Enter your Username and Password to sign in.

source

Related Posts