cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

Top Seven Security and Risk Management Trends for 2022 By Gartner

News Desk by News Desk
March 7, 2022
Reading Time: 4 mins read
cybersecurity
Share on FacebookShare on Twitter

According to Gartner, security and risk management executives must address the following seven trends to defend the ever-expanding digital footprint of modern businesses against emerging cyberthreats in 2022 and beyond. Peter Firstbrook, research vice president at Gartner, said, “Organizations worldwide are facing sophisticated ransomware attacks on the digital supply chain and deeply embedded vulnerabilities, the pandemic accelerated hybrid work and the shift to the cloud, challenging CISOs to secure an increasingly distributed enterprise – all while dealing with a shortage of skilled security staff.”

These challenges lend themselves to three overarching trends impacting cybersecurity practices: (i) new responses to sophisticated threats, (ii) the evolution and reframing of the security practice, and (iii) rethinking technology. The following trends will have a broad industry impact across those three domains:

1. Attack Surface Expansion

Enterprise attack surfaces are expanding. Risks associated with using cyber-physical systems and IoT, open-source code, cloud applications, complex digital supply chains, social media, and more have brought organizations exposed surfaces outside of a set of controllable assets. Organizations must look beyond traditional security monitoring, detection, and response approaches to manage a wider set of security exposures.

Digital risk protection services (DRPS), external attack surface management (EASM) technologies, and cyber asset attack surface management (CAASM) will support CISOs in visualizing internal and external business systems, automating the discovery of security coverage gaps.

2. Digital Supply Chain Risk

Cybercriminals have discovered that attacks on the digital supply chain can provide a high return on investment. As vulnerabilities such as Log4j spread through the supply chain, more threats are expected to emerge. In fact, Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains, a three-fold increase from 2021.

Digital supply chain risks demand new mitigation approaches that involve more deliberate risk-based vendor/partner segmentation and scoring, requests for evidence of security controls and security best practices, a shift to resilience-based thinking, and efforts to get ahead of forthcoming regulations.

ADVERTISEMENT

3. Identity Threat Detection and Response

Sophisticated threat actors are actively targeting identity and access management (IAM) infrastructure, and credential misuse is now a primary attack vector. Gartner introduced the term “identity threat detection and response” (ITDR) to describe the collection of tools and best practices to defend identity systems.

“Organizations have spent considerable effort improving IAM capabilities, but much of it has been focused on technology to improve user authentication, which actually increases the attack surface for a foundational part of the cybersecurity infrastructure,” said Firstbrook. “ITDR tools can help protect identity systems, detect when they are compromised and enable efficient remediation.”

4. Distributing Decisions

Enterprise cybersecurity needs and expectations are maturing, and executives require more agile security amidst an expanding attack surface. Thus, the scope, scale, and complexity of digital business make it necessary to distribute cybersecurity decisions, responsibility, and accountability across the organization units and away from a centralized function.

“The CISO role has moved from a technical subject matter expert to that of an executive risk manager,” said Firstbrook. “By 2025, a single, centralized cybersecurity function will not be agile enough to meet the needs of digital organizations. CISOs must reconceptualize their responsibility matrix to empower Boards of Directors, CEOs and other business leaders to make their own informed risk decisions.”

5. Beyond Awareness

Human error continues to be a factor in many data breaches, demonstrating that traditional approaches to security awareness training are ineffective. Progressive organizations are investing in holistic security behavior and culture programs (SBCPs), rather than outdated compliance-centric security awareness campaigns. An SBCP focuses on fostering new ways of thinking and embedding new behavior with the intent to provoke more secure ways of working across the organization.

6. Vendor Consolidation

Security technology convergence is accelerating, driven by the need to reduce complexity, reduce administration overhead and increase effectiveness. New platform approaches such as extended detection and response (XDR), security service edge (SSE), and cloud-native application protection platforms (CNAPP) are accelerating the benefits of converged solutions.

For example, Gartner predicts that by 2024, 30% of enterprises will adopt cloud-delivered secure web gateway (SWG), cloud access security broker (CASB), zero-trust network access (ZTNA), and branch office firewall as a service (FWaaS) capabilities from the same vendor. Consolidation of security functions will lower the total cost of ownership and improve operational efficiency in the long term, leading to better overall security.

7. Cybersecurity Mesh

The security product consolidation trend is driving the integration of security architecture components. However, there is still a need to define consistent security policies, enable workflows, and exchange data between consolidated solutions. A cybersecurity mesh architecture (CSMA) helps provide a common, integrated security structure and posture to secure all assets, whether they’re on-premises, in data centers, or in the cloud.

Also Read: TCS launches new cyber defense suite to secure enterprise digital transformation journeys

News Desk

News Desk

by CXO VOICE team memebrs, contact@cxovoice.com

Related Posts

Cybersecurity While Working from Home amid Coronavirus outbreak
Cyber Security

Hackers targeted Google, Microsoft products via zero-day exploitation in 2022: Report

March 22, 2023
AI chatbots
Cyber Security

Avoid AI chatbots that don’t appear on the company’s website or app: warn researchers

March 14, 2023
security
Cyber Security

US issued new cybersecurity strategy, puts onus on Big Tech firms

March 3, 2023
80% of Indian firms face cyber attacks due to miscommunication in IT security
Cyber Security

80% of Indian firms face cyber attacks due to miscommunication in IT security

February 20, 2023
Cyber Criminals
Cryptocurrency

Cyber agency warns of huge global attack

February 6, 2023
How to remove a virus from a phone?
Cyber Security

How to remove virus from phone?

January 23, 2023
Zero click attacks
Cyber Security

T-Mobile data breach, 37 mn customer’s data stolen

January 20, 2023
Cyber security is a major concern for enterprises, How to fight sophisticated cyber threats
Cyber Security

Cyber security is a major concern for enterprises, here is how to fight sophisticated cyber threats

January 13, 2023
Load More
ADVERTISEMENT

Expert Views

SaaS Rising: India is Ready for its Next IT Moment
Opinion

SaaS Rising: India is Ready for its Next IT Moment

January 31, 2023
Technology remains the main driver for insurance companies to scale and grow in 2023
News

Technology remains the main driver for insurance companies to scale and grow in 2023

January 10, 2023
Supply Chain Attacks – The Open Source Effect
Cyber Security

Supply Chain Attacks – The Open Source Effect

January 3, 2023
Technology Trends to Watch in 2023
Opinion

Top Technology Trends to Watch in 2023

December 21, 2022
Startups should embrace a down-round and restructure their firms: Flipkart CEO
Business

Startups should embrace a down-round and restructure their firms: Flipkart CEO

November 22, 2022

Latest Updates

AI-driven B2B marketplace Fashinza raises $30 mn to enhance supply chain

AI-driven B2B marketplace Fashinza raises $30 mn to enhance supply chain

by IANS
22 hours ago

SUN Mobility and Zomato collaborate to power 50K electric 2-wheelers for food delivery

SUN Mobility and Zomato collaborate to power 50K electric 2-wheelers for food delivery

by IANS
2 days ago

Will never share US user data with China, says TikTok CEO

TikTok CEO says, will never share US user data with China

by IANS
5 days ago

China's smartwatch shipments declined by 9.3% in 2022: Report

China’s smartwatch shipments declined by 9.3% in 2022: Report

by IANS
6 days ago

Hybrid workplace

78% of professionals heading back to the office by choice

by IANS
6 days ago

Adobe

Adobe unveils generative AI to enhance customer experiences

by IANS
1 week ago

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Rising cyber attacks pose a serious threat to Indian SMBs, says Zakir Hussain
Cyber Security

Rising cyber attacks pose a serious threat to Indian SMBs, says Zakir Hussain

-
Axis Bank's Cloud-driven digital banking solutions
Banking

Axis Bank doubles down on cloud based digital banking solutions

-
digital-first strategy
Banking

Jana Small Finance Bank’s digital-first strategy enhances customer experience

-
email security interview
Cyber Security

What is email security? and its importance in securing enterprise networks

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

We bring business leaders' opinions and unique ideas on what’s happening in the market and its impact. Also, get the daily news, analysis, and insights.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com
  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2023 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk

© 2023 CXO VOICE

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/