cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
Interviews, IT and Technology News India | CXO VOICE
No Result
View All Result
Home News Cyber Security

Top Seven Security and Risk Management Trends for 2022 By Gartner

News Desk by News Desk
March 7, 2022
Reading Time: 4 mins read
cybersecurity
Share on FacebookShare on TwitterShare on Linkedin

According to Gartner, security and risk management executives must address the following seven trends to defend the ever-expanding digital footprint of modern businesses against emerging cyberthreats in 2022 and beyond. Peter Firstbrook, research vice president at Gartner, said, “Organizations worldwide are facing sophisticated ransomware attacks on the digital supply chain and deeply embedded vulnerabilities, the pandemic accelerated hybrid work and the shift to the cloud, challenging CISOs to secure an increasingly distributed enterprise – all while dealing with a shortage of skilled security staff.”

These challenges lend themselves to three overarching trends impacting cybersecurity practices: (i) new responses to sophisticated threats, (ii) the evolution and reframing of the security practice, and (iii) rethinking technology. The following trends will have a broad industry impact across those three domains:

1. Attack Surface Expansion

Enterprise attack surfaces are expanding. Risks associated with using cyber-physical systems and IoT, open-source code, cloud applications, complex digital supply chains, social media, and more have brought organizations exposed surfaces outside of a set of controllable assets. Organizations must look beyond traditional security monitoring, detection, and response approaches to manage a wider set of security exposures.

Digital risk protection services (DRPS), external attack surface management (EASM) technologies, and cyber asset attack surface management (CAASM) will support CISOs in visualizing internal and external business systems, automating the discovery of security coverage gaps.

2. Digital Supply Chain Risk

Cybercriminals have discovered that attacks on the digital supply chain can provide a high return on investment. As vulnerabilities such as Log4j spread through the supply chain, more threats are expected to emerge. In fact, Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains, a three-fold increase from 2021.

Digital supply chain risks demand new mitigation approaches that involve more deliberate risk-based vendor/partner segmentation and scoring, requests for evidence of security controls and security best practices, a shift to resilience-based thinking, and efforts to get ahead of forthcoming regulations.

3. Identity Threat Detection and Response

Sophisticated threat actors are actively targeting identity and access management (IAM) infrastructure, and credential misuse is now a primary attack vector. Gartner introduced the term “identity threat detection and response” (ITDR) to describe the collection of tools and best practices to defend identity systems.

“Organizations have spent considerable effort improving IAM capabilities, but much of it has been focused on technology to improve user authentication, which actually increases the attack surface for a foundational part of the cybersecurity infrastructure,” said Firstbrook. “ITDR tools can help protect identity systems, detect when they are compromised and enable efficient remediation.”

4. Distributing Decisions

Enterprise cybersecurity needs and expectations are maturing, and executives require more agile security amidst an expanding attack surface. Thus, the scope, scale, and complexity of digital business make it necessary to distribute cybersecurity decisions, responsibility, and accountability across the organization units and away from a centralized function.

“The CISO role has moved from a technical subject matter expert to that of an executive risk manager,” said Firstbrook. “By 2025, a single, centralized cybersecurity function will not be agile enough to meet the needs of digital organizations. CISOs must reconceptualize their responsibility matrix to empower Boards of Directors, CEOs and other business leaders to make their own informed risk decisions.”

5. Beyond Awareness

Human error continues to be a factor in many data breaches, demonstrating that traditional approaches to security awareness training are ineffective. Progressive organizations are investing in holistic security behavior and culture programs (SBCPs), rather than outdated compliance-centric security awareness campaigns. An SBCP focuses on fostering new ways of thinking and embedding new behavior with the intent to provoke more secure ways of working across the organization.

6. Vendor Consolidation

Security technology convergence is accelerating, driven by the need to reduce complexity, reduce administration overhead and increase effectiveness. New platform approaches such as extended detection and response (XDR), security service edge (SSE), and cloud-native application protection platforms (CNAPP) are accelerating the benefits of converged solutions.

For example, Gartner predicts that by 2024, 30% of enterprises will adopt cloud-delivered secure web gateway (SWG), cloud access security broker (CASB), zero-trust network access (ZTNA), and branch office firewall as a service (FWaaS) capabilities from the same vendor. Consolidation of security functions will lower the total cost of ownership and improve operational efficiency in the long term, leading to better overall security.

7. Cybersecurity Mesh

The security product consolidation trend is driving the integration of security architecture components. However, there is still a need to define consistent security policies, enable workflows, and exchange data between consolidated solutions. A cybersecurity mesh architecture (CSMA) helps provide a common, integrated security structure and posture to secure all assets, whether they’re on-premises, in data centers, or in the cloud.

Also Read: TCS launches new cyber defense suite to secure enterprise digital transformation journeys

Tags: Cyber ThreatscybersecuritySecurity and Risk Management Trends
News Desk

News Desk

by CXO VOICE team memebrs, contact@cxovoice.com

Related Posts

Cloud Data Protection
Cyber Security

Data Protection, a Key Part of Business Continuity

April 18, 2022
digital transformation journey and cybersecurity of digital business
Cyber Security

Cybersecurity Leaders Join Hands To Launch Operational Technology Cybersecurity Coalition

April 13, 2022
Is A Private Cloud More Secure Than A Public?
Cloud

Is Private Cloud More Secure Than Public?

March 11, 2022
security automation
Cyber Security

What is security automation? And Why is it important?

May 10, 2022
Cyber Security

TCS launches new cyber defense suite to secure enterprise digital transformation journeys

February 24, 2022
Remote Access Trojan
Cyber Security

What is Remote Access Trojan (RAT)? How did an Indian hacking group infect itself with RAT

January 24, 2022
security threats in 2022
Cyber Security

How should business leaders address the cyber security threats in 2022?

January 24, 2022
UX Designing Product Security
Cyber Security

How UX Designing Strengthens Product Security and Improves ROI

December 13, 2021
Load More
Next Post
AI Cloud Enterprises

What can AI Cloud do for Enterprises?

ADVERTISEMENT

Expert Views

Jaganathan Chelliah
Technology

Installing CCTV Cameras? Here is What You Need to Know

May 17, 2022
Wipro's Digital Database Services (DDS)
Banking

Cloud trends in the BFSI sector set to drive digital transformation in the new financial year

April 26, 2022
Cloud Data Protection
Cyber Security

Data Protection, a Key Part of Business Continuity

April 18, 2022
AI Cloud Enterprises
AI

What can AI Cloud do for Enterprises?

March 9, 2022
Data Modernisation
Technology

4 Key Trends Driving Data Modernization Across The Enterprises

January 28, 2022

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Enterprises, and MSMEs IoT
Leaders Talk

IoT is now seen as an essential enabler for the enterprises to be future ready : Joyjeet Bose

-
Security While Working Remotely interview with Filip Coftas
Cyber Security

Security While Working Remotely [Interview]

-
Akita Security Device Help you Protect your Security During COVID-19 [Interview with Zakir Hussain]
COVID-19

Can Akita Security Device Help you Protect your Security During COVID-19 [Interview]

-
digital transformation and customer experience Newgen software
Interview

Digital Transformation Journey helps Newgen Software Improve Customer Experience [Interview]

-

Entrepreneur

Top 10 Richest Persons In India

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXO VOICE is a premier resource for the enterprises, SMBs and Startups CXOs and business leaders, It enables CXOs and business executives gain access key insights, experts views, analysis, business strategy, and leaders interviews on what’s happening in the market and its impact.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com

Newsletter

Subscribe to our mailing list to receives newsletter direct to your inbox!

  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2022 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security

© 2022 CXO VOICE