WWW.INFORMATIONWEEK.COM
Quit Fooling Yourself:How to Actually Be Ready for a Cyberattack
Max Vetter, VP of Cyber, Immersive April 3, 20254 Min ReadZdenek Sasek via Alamy StockJust a few months into the year, organizations have already been rocked by massive breaches, high-stakes settlements, and disruptive LLMs. The pace of these events isnt just alarming -- its a warning sign. If these early shockwaves are any indication, cyber professionals are in for a year of unprecedented challenges and shifts in the threat landscape.Cyberattacks arent just likely anymore -- theyre practically inevitable. With the rise of GenAI, ever-expanding threats, and hostile nation-state actors, the game has changed. Yet, most organizations continue to play defense the same way: relying on outdated training, investing in cyber insurance policies, and adopting the latest tech tools, believing the tick boxes required by compliance actually help them be secure.But are they actually ready? Organizations must go beyond simply claiming readiness to prove it.This will be imperative for overall business operations and their bottom lines, as the global average cost of a breach was $4.88 million, with the vast majority (68%) of breaches involving the human element. Organizations must start from within to ensure theyre doing all they can to protect themselves from threat actors.Security leaders can strengthen their readiness by focusing on these key actions:Related:1. Out with the old, in with the newIts past time to ditch painful traditional training (like anti-phishing videos) and other outdated methods that dont measure what people will do in the event of a threat, which can lead to a false sense of security. It's time to shift focus to the continuous development of your team's skills through hands-on crisis exercising. And this doesnt mean one-and-done training will cut it. Regularly pressure test your people to ensure they can adapt and communicate effectively. Regular cyber drills will ensure your people are ready.2. Focus on your people over tech stacksJust recently, MGM agreed to pay $45 million following breaches in 2019 and 2023. They were impacted by malicious actors taking advantage of the human element of their security posture. This example underscores the bottom-line need to uplevel the knowledge, skills, and judgment of their entire workforce to ensure no one is taken advantage of as a weak or missing link and instead empower everyone to be an asset for the security and bottom line of the organization.That said, it would be naive to overlook technologys role as the bridge between malicious actors and their victims. To stay ahead, organizations should consider using newer tools, like GenAI, to strengthen their defenses. Integrating these tools into hands-on exercises allows your team to concentrate on remediation and enhancing defenses. Humans should also always be kept in the loop because its critical to remember GenAI can be a double-edged sword: while DevSecOps teams can use it to automate and accelerate vulnerability detection, bad actors will exploit these same tools to generate malicious code and enhance phishing or fraud tactics, increasing overall risk.Related:3. Involve your execs, not just techsInvolving all executives in a company's cybersecurity strategy is crucial for creating a holistic and effective approach to security. Cyber threats are not limited to IT; they can affect every aspect of a business, from financial systems and customer data to supply chain operations. Keeping these conversations siloed is a missed opportunity. Instead, leaders like the CEO, CFO, and legal team should be involved to ensure security strategies align with the companys broader business objectives. The industry agrees, as 96% of cyber leaders believe communicating cyber-readiness to senior leadership and boards will be crucial this year.This cross-departmental involvement helps create a unified approach where security is seen as a technical challenge but also as a core part of the company's overall strategy, influencing decision-making at all levels. A modern, comprehensive cybersecurity strategy requires leadership engagement across departments to ensure resilience, compliance, and long-term business success.Related:4. Treat cyber risk like any other business riskApproaching cyber risk like any other business risk is essential for a companys long-term stability and success. Like how businesses monitor financial performance, competitive threats, and legal liabilities, cyber risk should be tracked with the same level of attention. An organization must continually assess its cybersecurity posture, identify vulnerabilities and evaluate potential threats.This means not only implementing technical defenses, but also establishing policies, processes, and training programs that foster a culture of security awareness. By treating cyber risk as an ongoing priority, companies can address weaknesses before they become breaches, ensuring their cybersecurity efforts are integrated into the broader risk management framework.As we navigate the tumultuous technological landscape, its clear that a reactive approach is no longer enough. Organizations must evolve beyond checking off boxes for compliance or relying on outdated solutions that offer limited protection. The best way to stay ahead of malicious actors is to encourage a culture of proactive, holistic cybersecurity -- where technology, human capabilities, and leadership all play integral roles.Cybersecurity should not be an afterthought or siloed responsibility. Instead, it should be embedded in an organization's strategy at every level. By focusing on the right people, technology, and approach to risk management, businesses can better position themselves to be ready for whats to come.About the AuthorMax VetterVP of Cyber, Immersive Max Vetter leads a team of cyber experts at Immersive Labs, helping customers stay ahead of threats and be resilient against cyber-attacks. Max spent seven years with Londons Metropolitan Police Service as a police officer, intelligence analyst, and covert internet investigator, including working in the money laundering unit in Scotland Yard. He also worked as Assistant Director of the ICC Commercial Crime Services investigating commercial crime, fraud, and serious organized crime groups. Before joining Immersive Labs Max spent three years training the private sector and government agencies including the UKs GCHQ and its cyber summer school in ethical hacking and open-source intelligence and was the subject matter expert in darknets and cryptocurrencies.See more from Max VetterWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
0 Comments 0 Shares 65 Views