It is harder than ever to stay one step ahead of cybersecurity threats. New, more sophisticated adversaries — some operating autonomously and learning from generative AI models - are thriving in a landscape with multiple attack surfaces opened by hybrid and distributed work, cloud computing at scale, and the digitalization of everything. The stakes are high for CISOs.
Here are four actions CISOs can take to better prepare for today and tomorrow:
-
Reduce technology complexity
Emerging technology presents opportunities and challenges for cybersecurity leaders. Most organizations have an average of 44 security products that are often poorly integrated, difficult to maintain and support, and offer no overall visibility.
How emerging technologies can usher in the dawn of pervasive intelligence
“Pervasive intelligence” will emerge through a massively distributed digital connectivity and cloud fabric, transforming our economy.
8 Aug 2023 Fuad Siddiqui
-
Reduce the attack surface
As organizations pursue digital transformation, they are coming to terms with increased cyber vulnerability. Cloud applications, 5G networks and the rise of remote and hybrid work arrangements, alongside infrastructures like VPNs, increase entry points for hackers. Software and physical supply chains increase risk, especially when the security of third-party partners isn’t guaranteed.
-
Align everyone behind cybersecurity
CISOs don’t have to advocate for budget as much as they used to. According to the survey, budget, once a top internal challenge, was only ranked sixth out of eight in a list of obstacles. With resources in hand, CISO communications have evolved to focus on cyber readiness and training.
Does cyber risk only become a priority once you’ve been attacked?
Cyber threats are evolving and escalating at an especially alarming rate for asset-intensive industries such as mining and metals (M&M).
8 Mar 2022 Paul Mitchell
-
Unleash value
Cyber-secure organizations can innovate to create value with fewer risks than their less-secure peers – Prone Enterprises. Organizations without Secure Creators may be hesitant to invest in unproven technologies that have the potential to be huge value drivers for early adopters.
Cybersecurity leaders are looking to improve capabilities in the following areas:
-
Generative AI and machine learning
AI is both friend and foe to CISOs. To tip the balance toward friendship, cybersecurity leaders are investing in AI- and machine learning-enabled tools to improve vulnerability testing, detect threats more quickly and build more adaptive security systems.
Generative AI models like generative adversarial networks (GANs) can create synthetic data that mimic real-word cyberattacks, making attack testing and response easier. In the real-world, generative AI-enabled threat detection tools are able to analyze large amounts of data in real time, allowing them to quickly detect anomalies and patterns that may indicate a cyberattack. If a threat is realized as a cyberattack, organizations can employ quickly-adaptive response systems that have been informed by huge datasets of historical breaches.
-
Passwordless authentication
No matter the complexity, passwords by themselves are not as secure as they used to be. Organizations are using passwordless authentication to eliminate the risks associated with traditional password-based authentication methods.
Passwordless authentication replaces passwords with more secure methods, such as biometric authentication, hardware-based authentication or one-time passcodes sent via email or text message. This reduces the risk of phishing attacks, credential stuffing and password-related vulnerabilities.
-
Zero trust
A growing tech stack brings an expanded attack surface. Cybersecurity leaders are building zero trust architectures to deal with the near constant threat posed by attackers.
Zero trust architectures use a mix of technology and protocols to identify and grant access to users within and outside an organization’s network. By default, users are not trusted and are given the least amount of privilege possible within a network. Networks are segmented to prevent widespread access if one wall is breached and barriers like multifactor authentication (MFA) are deployed to make unauthorized access more difficult.
Organizations must adopt technology, but doing so doesn’t mean they have to be less secure.
-
DevSecOps
Rapid technology development can create security gaps. DevSecOps (development, security and operations) can close these gaps by building cybersecurity into the development lifecycle, from design to production.
DevSecOps encourages collaboration and communication between developers, security professionals, and operations teams, allowing for a more holistic approach to cybersecurity. Building these practices into technology governance enables rapid deployment of security updates and patches, ensuring that systems are always up to date and protected against the latest threats.
How EY can help
Cybersecurity Transformation
Design, deliver and maintain your cybersecurity programs at the enterprise-level by embedding security by design at every step of the way.
Read moreCybersecurity, strategy, risk, compliance and resilience
EY Cybersecurity, strategy, risk, compliance and resilience teams can provide organizations with a clear picture of their current cyber risk posture and capabilities, giving them an informed view of how, where and why to invest in managing their cyber risks.
Read moreNext generation security operations centre
We can help you develop the organisational capability to react to foreseeable and unforeseeable security breaches.
Read moreCybersecurity Architecture, Engineering & Emerging Technologies
Our solutions help organisations protect themselves from adversaries that would seek to exploit weaknesses in the design, implementation and operation of their technical security controls.
Read moreData protection
We can help your business detect and prevent data breaches resulting from internal user activity.
Read moreIdentity and access management
Identity and access management (IAM) is a foundational element of any information security program.
Read more
Transformation Realized™
Consulting at EY is building a better working world by realizing business transformation through the power of people, technology and innovation.
Our latest thinking
The team
On the agenda (4)
SkipCybersecurity
Transformation Realised
Global Information Security Survey (GISS)
Technology
Contact us
Like what you’ve seen? Get in touch to learn more.