7

Comprehensive Protection Strategies Against Cyber Threats | Gartner

 9 months ago
source link: https://www.gartner.com/en/cybersecurity/topics/cybersecurity-threats
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Three ways to move beyond managing cyber risk in isolation from the business

Lack of resources, siloed operations and poor tool implementation often prevent security and risk management (SRM) teams from detecting and responding to threats. Yet taking a risk-based approach can help improve efficiency in threat detection and increase your response time.

This research helps SRM teams:

  • Break down silos between SRM and business leaders
  • Enrich information and processes to save time and ensure successful execution
  • Prioritize for faster incident response

Stay effective against the most likely cyberthreats

Continuous technology changes driven by DX create an expanded attack surface that malicious actors can exploit. Protecting digital assets requires CISOs to monitor and respond to these changes.

  • Prioritize Threats
  • Top Threats
  • High-Momentum Threats
  • Uncertain Threats
  • From Threats to CTEM

Identify the highest impact cybersecurity threats to focus your resources

Addressing every potential threat has always been operationally infeasible. More so now, given the way digital transformation, cloud computing, hybrid work and other trends have expanded the attack surface (see also the From threats to CTEM tab). SRM leaders must focus their activity and resources on the most likely and impactful cybersecurity threats and threat exposures. These fall into the following three categories:

  • Top threats. Threats that organizations are highly aware of and remain relevant year after year as a result of changing tactics.
  • High-momentum threats. Threats that are growing, but for which awareness is lower than with the top threats.
  • Uncertain threats. “Low signal” threats, which may be emerging and dangerous, or overhyped and a distraction — it’s up to the organization to determine which.

Several factors guide security leaders in determining whether to invest, or not, in responding to a specific threat, regardless of the category they fall into:

  • Relevance: Could the threat impact our operational continuity?

  • Urgency: Could the threat affect our ability to operate, and to what degree?

  • Maturity: Do we have an effective response plan in case the threat affects us?

  • Opportunity cost: Does the cost to address the threat outweigh the cost of the threat impact itself?

  • Measurability: Can we demonstrate to business leaders the value of investing in protecting ourselves?

Leverage insights from the past and present to decide whether to divest or invest in managing a given cybersecurity threat.

Gather different types of information about past events to inform decisions about which threats scenarios to prioritize or deprioritize for the present and the future. Analyze stories, statistics and business changes to gain insights from the past. Then prepare for and arbitrate between trends in the threat landscape to make decisions on which controls to invest in, accelerate or divest for the present and the future.

The dynamic business environment should also influence which cybersecurity threats to prioritize. In addition, unknown inflection points can alter the threat landscape. Therefore, be sure to reserve some budget to address unpredicted threats.

Drive stronger performance on your mission-critical priorities.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK