Gartner Releases Seven Security and Risk Management Trends for 2022

Editor | Song Hui

Produced | CSDN Cloud Computing

According to Gartner, there are seven trends that security and risk management leaders must address to protect the expanding digital footprint of modern organizations from new threats in 2022 and beyond.

"Organizations around the world are facing sophisticated ransomware attacks, attacks against digital supply chains, and deep breaches," said Peter Firstbrook, research vice president at Gartner. "The pandemic has accelerated the development of hybrid work models and the move to the cloud, giving chief information Security officers (CISOs) pose a difficult question: how to protect an increasingly fragmented enterprise while addressing the shortage of senior security personnel.”

These challenges have sparked three general trends affecting cybersecurity practices: (1) new responses to sophisticated threats; (2) evolution and refactoring of security practices; and (3) rethinking of technology. The following trends will have a broad impact on the industry in all three areas.

Trend 1: The attack surface is expanding

The attack surface for businesses is expanding. Risks arising from the use of cyber-physical systems and the Internet of Things, open source code, cloud applications, complex digital supply chains, social media, etc., expose organizations to an attack surface beyond their controllable assets. Organizations must adopt more advanced approaches than traditional security monitoring, detection and response to manage a wider range of security risks.

Digital Risk Protection Services (DRPS), External Attack Surface Management (EASM) technologies and Cyber ​​Asset Attack Surface Management (CAASM) will help CISOs visualize internal and external business systems and automatically detect security breaches.

Trend 2: Digital Supply Chain Risk

Cybercriminals are finding that attacking digital supply chains can yield high returns. More threats are expected as vulnerabilities such as Log4j spread through the supply chain. Gartner predicts that by 2025, 45% of enterprises worldwide will experience software supply chain attacks, a threefold increase from 2021.

To reduce digital supply chain risk, organizations need to adopt new responses, including more deliberate, risk-based vendor/partner segmentation and scoring, requiring proof of security controls and best practices, and a shift to a resilient mindset, And trying to stay ahead of upcoming regulations.

Trend 3: Identity Threat Detection and Response

Savvy threat actors are aggressively targeting identity and access management (IAM) infrastructure with credential abuse. Gartner coined the term "Identity Threat Detection and Response" (ITDR) to describe a collection of tools and best practices for securing identity systems.

"Organizations have put a lot of effort into improving IAM capabilities, but most of that has been focused on improving user authentication techniques, which actually expands the attack surface of a fundamental part of the cybersecurity infrastructure," Firstbrook said. ITDR tools can help protect identity systems, detect when they are compromised and take effective remedial action.”

Trend 4: Distributed Decision Making

Organizations' cybersecurity needs and expectations are maturing, and executives need more agile security measures as the attack surface continues to expand. Therefore, in order to meet the scope, scale and complexity of digital business, cybersecurity decision-making, responsibility and accountability need to be distributed throughout the enterprise organization, avoiding the centralization of functions.

Firstbrook said: “The role of the CISO has shifted from a technical domain expert to an executive risk manager. By 2025, a single, centralized cybersecurity function will not be able to meet the needs of the digital enterprise. CISOs must rethink themselves responsibilities to help boards, CEOs and other business leaders make informed risk decisions.”

Trend 5: Beyond Security Awareness Training

Many data breaches are still caused by human error, proving the ineffectiveness of traditional security awareness training methods. Advanced corporate agencies are investing in holistic safety behavior and culture programs (SBCPs) to replace outdated compliance-focused safety awareness campaigns. The Holistic Safety Behavior and Culture program focuses on fostering new mindsets and behaviors that lead to safer ways of working across the organization.

Trend 6: Vendor Consolidation

Convergence of security technologies is accelerating, driven by the need to reduce complexity, reduce administrative overhead, and increase effectiveness. New platform strategies such as Extended Detection and Response (XDR), Secure Service Edge (SSE), and Cloud-Native Application Protection Platform (CNAPP) are accelerating the unlocking of the benefits of converged solutions.

For example, Gartner predicts that by 2024, 30% of enterprises will adopt cloud-based Secure Web Gateways (SWGs), Cloud Access Security Brokers (CASBs), Zero Trust Network Access (ZTNA), and branch-office firewalls from the same vendor. Service (FWaaS) capabilities. The integration of safety features will reduce the total cost of ownership and improve long-term operational efficiency, thereby increasing the overall safety factor.

Trend 7: Cybersecurity Grid

The consolidation trend of security products is driving the integration of security architecture components, but organizations still need to define unified security policies, enable workflows, and exchange data between integrated solutions. The Cyber ​​Security Mesh Architecture (CSMA) helps provide a common, integrated security architecture and posture to secure all on-premises, data center and cloud assets.

"The key cybersecurity trends published by Gartner do not exist in isolation, but are interdependent and reinforcing," said Firstbrook. "Together, they will help CISOs drive the evolution of their roles to meet future security and risk management challenges and continue to advance their position in the corporate body.”

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=324211718&siteId=291194637