• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»How new CISOs should take on today’s growing threatscape
Security

How new CISOs should take on today’s growing threatscape

August 30, 2022No Comments10 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How new CISOs should take on today's growing threatscape
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


So, you’re a new CISO (or you’ve just hired a new CISO) who has the opportunity to turn around a long-standing tech stack. You’d like to make that legacy stack more resilient, especially as cyberattacks become a bigger distraction every day. Where do you start? 

A good first step is to evaluate your new company’s current tech stack. See where the weaknesses are and how your team’s roadmaps can strengthen them. As a new CISO, chances are you’re going to inherit a legacy tech stack. One of your greatest challenges getting started is going to be securing IT infrastructure in a threatscape that continues to automate faster than defenses are being created. 

Unfortunately, only 40% of enterprises say they are evolving in response to the changing threatscape, with 60% acknowledging they are running behind. It’s also good to keep in mind that cyberattackers are quicker, more ingenious and faster than ever in adopting new automation techniques that execute breaches on APIs, deploy ransomware and target software supply chains. 

Don’t let the splashy news of high-profile attacks distract you from the business of securing your new company – remember that cybersecurity is a marathon, not a sprint.

Event

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Register Here

Consolidate security vendors 

The first challenge you’ll probably face as a new CISO is consolidating vendors to achieve greater efficacy and improved efficiency. A recent survey by Gartner [subscription required] found that 65% of organizations pursuing or planning to pursue consolidation expect to improve their overall risk posture and resilience. Your consolidation plans should also include improved real-time system integration with threat intelligence that’s contextually accurate. 

Roadblocks new CISOs face in achieving consolidation include the many digital transformation, virtual and hybrid workforce projects that were underway before you arrived. 

Below are suggestions for consolidating security vendors to address the three key cyberthreat areas of ransomware, automated API attacks and software supply chain vulnerabilities.

Threat 1: Ransomware attacks

Ransomware is one of the fastest growing criminal enterprises. CrowdStrike’s 2022 Global Threat Report found that ransomware incidents jumped 82% in just a year. Ransomware-as-a-service (RaaS), combining ransomware and distributed denial of service (DDoS) attack strategies, is an example of how advanced attackers have become. In March, the FBI issued a joint cybersecurity advisory, Indicators of Compromise Associated with AvosLocker Ransomware, explaining how one of the many RaaS groups work.  

Ransomware attacks are so pervasive that 91.5% of malware arrives over encrypted connections. In addition, Ivanti’s Ransomware Index Report Q1 2022 found a 7.6% jump in the number of vulnerabilities associated with ransomware compared to the end of 2021. Ivanti’s analysis also found 22 new vulnerabilities tied to ransomware (bringing the total to 310). Nineteen of those are connected to Conti, one of the most prolific ransomware gangs of 2022. 

See also  A deep dive into Capital One's cloud and knowledge technique wins
Ivanti’s Ransomware Index Report Q1 2022 illustrates the breakout of vulnerability by type that comprises the total National Vulnerability Database (NVD). Image source: Ivanti.

So this is a key area for new CISOs to address, quickly. Did you know that cyberattackers’ delivery method of choice is cloud enterprise software? Looking to capitalize on how widely distributed cloud or SaaS-based enterprise software applications are, ransomware attackers rely on advanced encryption techniques to remain stealthy until they’re ready to launch an attack. In addition, ransomware attackers regularly attempt to bribe employees of companies they want to breach. 

To start, it’s a good idea to revisit how effectively your new organization’s identity access management (IAM) and privileged access management (PAM) systems are secured. Both are targets for cyberattackers who want access to those servers so they can control identities network-wide. 

Next, as a new CISO pursuing the goal of consolidating vendors, it’s a good idea to know the ones who can help you reduce overlap in your tech stack. Fortunately, there are providers of ransomware solutions that are doubling down on R&D spending to add more value to their platforms. One example is Absolute, whose Ransomware Response builds on its successful track record of delivering self-healing endpoints by relying on Absolute’s Resilience platform. 

Additionally, CrowdStrike’s Falcon platform is the first in the industry to support AI-based indicators of attack (IOC) and was announced at Black Hat 2022 earlier this month. These AI-powered IOCs rely on cloud-native machine learning models trained using telemetry data from the CrowdStrike Security Cloud and expertise from the company’s threat-hunting teams. 

FireEye Endpoint Security is another example of a vendor that’s adding value by consolidating more functional areas. FireEye uses multiple protection engines and deployable customer modules to identify and stop ransomware and malware attacks at the endpoint. 

Sophos Intercept X relies on deep-learning AI techniques combined with anti-exploit, antiransomware and control technology to predict and identify ransomware attacks. Absolute, Cohesity, Commvault, CrowdStrike, Druva, FireEye, HYCU, Ivanti, McAfee, Rubrik, Sophos and others are doubling their R&D efforts to thwart ransomware attacks that originate at the endpoint while consolidating more features into their platforms.   

Threat 2: Automated API attacks 

Cyberattackers are becoming experts at using real-time scan and attack technologies. Malicious API calls rose from a monthly per-customer average of 2.73 million in December 2020 to 21.32 million in December 2021, according to Salt’s State of API Security Q1 2022 Report. In addition, Google Cloud’s The State of API Economy 2021 report shows that the rapid growth of the web and mobile APIs created for new apps is fueling a fast-growing threat surface.

See also  APIs and zero trust named as top priorities for CISOs in 2023

Automation techniques are becoming more commonplace as hackers look to scale API attacks across as many unsecured APIs as possible. Cyberattackers are also looking for APIs with little-to-no defined authentication, including those that don’t have added security for authorizing access requests. As an incoming CISO, conducting an audit of where API security is in your organization is essential. Knowing if and how APIs are being monitored or scanned is key. 

Google’s research found that employee- and partner-based APIs are also a significant risk. Microservices traffic often uses APIs that aren’t documented or secured. Postman’s 2022 State of the API Report reflects how rapidly API architectural styles are changing, further complicating API security. The Postman study found that REST dominates the developer community, with 89% of survey respondents saying it was their preferred architecture, followed by Webhooks, GraphQL and gRPC. As a new CISO, you’ll need to drive your team to show how current and planned API security can also adapt or flex for rapidly changing supporting architectures. 

VentureBeat asked Sandy Carielli, principal analyst at Forrester, what organizations should look for when evaluating which API security strategy would work best for them. “There are an ever-growing number of API security offerings available – traditional security tools like web application firewalls (WAFs) and static application security testing (SAST) that are extending to address APIs, API gateways, and many specialty API tools,” Carielli said. “We also see tools like service mesh, application shielding and microsegmentation addressing API security use cases. The market has done a bit of consolidation, with some WAF vendors acquiring specialist tools, but it’s still confusing,” she said. 

Carielli advises new CISOs in the process of reviewing their API strategy to “work with the dev team to understand the overall API strategy first. Get API discovery in place. Understand how existing app sec tools are or are not supporting API use cases. You will likely find overlaps and gaps. But it’s important to assess your environment for what you already have in place before running out to buy a bunch of new tools.”

Threat 3: Software supply chain attacks  

Verizon’s latest report shows that third-party supply chain partners are responsible for 62% of system intrusion events. In addition, it’s common knowledge after the recent series of high-profile supply chain attacks that cyberattackers know how to infect malicious code in widely used open-source components.

Criminals routinely target cloud providers, managed service providers, and operations and maintenance companies serving asset-intensive industries. The goal is to infect their software supply chains using compromised open-source components with wide distribution, as the Log4j vulnerability did. 

VentureBeat asked Janet Worthington, senior analyst at Forrester, what’s holding organizations back from improving software supply chain security. She cited “a lack of transparency into what software organizations are buying, acquiring and deploying is the biggest obstacle in improving the security of the supply chain. The U.S. Executive Order [14028] called attention to our nation’s lack of visibility into the software supply chain and mandated that NTIA, NIST and other government agencies provide guidance for a more secure future. Government agencies, and more and more private sector [organizations], require transparency into the software they purchase during the procurement process and throughout a product’s lifecycle.” 

See also  Howard University suffers cyberattack, suspends online classes in aftermath

Worthington said that, due to current and new security regulations, “Organizations will need to provide information not only on direct suppliers but also their suppliers’ suppliers, tier-2, tier-3 and tier-n suppliers. In the software world, this means having an inventory of your direct and indirect dependencies for any software you use, create, assemble and package.”

As the new CISO in your organization, you can make a quick positive impact by requiring security teams to create software bills of materials (SBOMs) for products, services and components that contain software, firmware or hardware to gain the visibility and control they need to keep supply chains secure. Worthington advised that an SBOM that “provides a list of the components for a product is the starting point. Don’t wait until you are asked to supply an SBOM to generate one; this will be too late.” 

She continued: “Shift left and include SBOM generation into your software development lifecycle. Software composition analysis [SCA] tools can generate SBOMs, provide visibility into component licenses, find and remediate vulnerable components and block malicious components from entering the SDLC. SCA tools should be run at multiple stages of the lifecycle.” 

“Once you have visibility into the building blocks of your supply chain,” Worthington said, “you begin to understand the security posture of the individual components and take the needed action.”

A suggested sequence for designing in resilience 

Ransomware, malicious API calls and software supply chain attacks reflect how real-time the threatscape is becoming. As you know, legacy tech stacks can’t keep up, and that’s especially the case in API and supply chain security. One of the most urgent tasks you have as a new CISO is to build ransomware, API and supply chain attack playbooks if they’re not already in place. 

Of the three threats, unprotected APIs present a significant threat to software supply chains. Defining an API security strategy that integrates directly into devops workflows and treats the continuous integration and continuous delivery (CI/CD) process as a unique threat surface is one priority that you need to deal with in the first 90 days of your role. 

Finally, as a new CISO, API detection and response, remediation policies, risk assessments and API-usage monitoring are essential tools you will want to re-architect your tech stack.

Source link

CISOs growing threatscape todays
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Newsroom To Delivery Room, How These Journalists Help Today’s Families

August 24, 2023

9 Lessons From Unicorn-Builder Marc Andreessen For Growing Ventures

May 19, 2023

Staying Resilient And Growing Your Mindset

May 5, 2023

The Biggest Problem For Today’s Entrepreneurs

February 21, 2023
Add A Comment

Comments are closed.

Editors Picks

Find out how to use Magic Eraser on Google Pixel 6, Pixel 6 Professional, and Pixel 6A

July 22, 2022

Cyber criminal forum targets only Russia

August 12, 2022

Instax Square Link review

January 27, 2023

How to watch the CD Projekt Red 20th anniversary stream today

July 6, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.