New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Two initiatives that can move the needle for cybersecurity in 2022

New York Tech Editorial Team by New York Tech Editorial Team
February 2, 2022
in Cybersecurity
0
Two initiatives that can move the needle for cybersecurity in 2022
Share on FacebookShare on Twitter

It’s no secret that 2021 was undoubtedly a difficult and stressful year to be a cybersecurity professional. The pandemic-driven remote/hybrid work paradigm and increased prevalence of ransomware caused many to fundamentally reevaluate their security strategies. This year will be no different, and we’ll likely see an even greater increase in threats as these malicious actors find new attack vectors to infiltrate—so it’s important for organizations to be well-equipped to address them.

initiatives cybersecurity

To mitigate these risks, companies must look to build a more standardized approach to measuring security effectiveness. Unfortunately, the lack of one remains the primary obstacle for organizations that want to implement effective security programs—and additional adjustments will be required for success in the new year. Moreover, the industry will see an increase in zero trust adoption at more rapid rates than in year’s past. While a little less than half of security leaders are currently prioritizing zero trust principles as part of their security strategy, we’ll see that number cross the halfway threshold by the end of 2022.

Below, I’ll dive a bit into each of these expectations and some tips organizations can take to make these initiatives more effective.

Establishing an effective, standardized metrics benchmark

After an unprecedented year of destructive cyberattacks, it’s clear that this year will be a defining moment in how organizations reset the fundamentals of their security programs. This must begin with standardizing security metrics that are actionable. The absence of a framework that is relatable to an organization’s business and a customizable approach are primary reasons organizations haven’t implemented effective security programs. What’s more, only a third of cyber leaders believe their teams are tracking the right metrics. Without benchmarks, many cyber leaders are facing issues relating progress to their business executives which ultimately lead to a communications gap and less investments into an organization’s security posture.

Some areas to consider developing actionable metrics around that every organization needs to prioritize this year include:

  • Level of preparedness: How well is a company prepared for an attack? The best way to measure this will vary across organizations, but the most effective method to track levels of preparedness ensures that the right security controls are in place and working. This requires security teams to run breach and attack simulation exercises that can point out failures or gaps that should be addressed.
  • Tool efficacy: Organizations have invested millions of dollars over the years in various security tools and technologies. But many are dormant, underutilized or suboptimized. It is important the security and operations teams have a way to ensure these investments are working and optimized to deliver the protection as part of a cohesive program.
  • Operational gaps in coverage: security teams should leverage leading frameworks such as Cyber Kill Chain and MITRE ATT&CK to measure coverage and identify gaps. By understanding the nature and level of detection you have against each technique, security teams can understand their vulnerabilities and prioritize their investments.
  • Coverage against risk scenarios: The primary purpose of cybersecurity programs is to protect an organization against cyber risk. Organizations should prioritize what risks are of most concern to them, the types of threats and attack vectors that could manifest them and understand what protection measures they have against them.
  • Meantime to detect, resolve and contain attacks: Tracking the time it takes to detect, resolve, and contain malicious attacks can help organizations prioritize which step in the security process needs attention and optimization the most.

Using these metrics as a benchmark will significantly improve a company’s security posture, but it’s important to consistently revisit these metrics to adjust to the ever-changing cybersecurity landscape. Once these metrics are aligned, organizations can start thinking about security more strategically, including adopting new mindsets like zero trust.

Changing the narrative around zero trust

Zero trust has been one of the biggest buzzwords of 2021. However, confusion still remains amongst the industry regarding its impact and how to take advantage of this security model. With less than half of security leaders saying they are prioritizing implementing zero-trust principles as part of their security strategy it is clear it is getting serious consideration. This year we will see conversations around and adoption of zero trust speed up—as long as organizations look at it through the proper lens.

For successful implementation, zero trust can’t be thought of as a single-packaged solution; it’s essentially rethinking enterprise security and cutting across silos. It’s an evolution of the security paradigm that requires continuous monitoring. With that said, the industry as a whole must do its part over the course of the upcoming year to educate organizations on the ins and outs of zero trust, especially with destructive attacks promised to increase in 2022.

The continuous shift toward remote work also means more companies should be adopting this framework, as organizational data and assets are not confined within the enterprise firewalls. Your security infrastructure is only as strong as your weakest link, and consumer-grade home networks are much easier to infiltrate. Of course, companies can insist employees use VPNs, but those are still easily hacked and the shift to remote work has exposed their weaknesses.

As 2022 progresses, companies will continue to take a step back and look at their security programs more holistically. Changing fundamental practices like adjusting which metrics to track or adopting entirely new mindsets will allow these companies to usher in new strategies or tactics they haven’t leveraged in the past. Although we’ll likely see an increase in cyber-attacks next year, I’m hopeful that more organizations will pave the path to be better prepared to address these threats.

Credit: Source link

Previous Post

Product showcase: Cybellum’s Product Security Lifecycle Platform

Next Post

How to measure security efforts and have your ideas approved

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
How to measure security efforts and have your ideas approved

How to measure security efforts and have your ideas approved

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Strengthening Cloud Security With Automation

May 22, 2025
How Local IT Services in Anderson Can Boost Your Business Efficiency

Why VPNs Are a Must for Entrepreneurs in Asia

May 22, 2025

Recommended

Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media