Estamos preparando el contenido...


Seguridad7 Top Trends in Cybersecurity for 2022 - BGH Tech Partner

30 mayo, 2022

The ever-expanding digital footprint of modern organizations drives this year’s top cybersecurity trends.

In short:

  • Rethink the security technology stack to address sophisticated new threats.
  • Push cybersecurity decision making out to the business units to improve your security posture.
  • Evolve and reframe the security practice to better manage cyber risk.

Security and risk executives face a critical juncture, as the digital footprint of organizations expands and centralized cybersecurity control becomes obsolete.

Hybrid work and digital business processes in the cloud have introduced new risks. At the same time, sophisticated ransomware, attacks on the digital supply chain and deeply embedded vulnerabilities have exposed technology gaps and skills shortages.

Those who understand these seven trends will be better able to address new risks and elevate their role, but it requires reframing the security practice and rethinking technology, as well as preparing to respond to new threats.

Trend No. 1: Attack surface expansion

Currently, 60% of knowledge workers are remote, and at least 18% will not return to the office. These changes in the way we work, together with greater use of public cloud, highly connected supply chains and use of cyber-physical systems have exposed new and challenging attack “surfaces.”

This leaves organizations more vulnerable to attack. BGH Tech Partner recommends security leaders look beyond traditional approaches to security monitoring, detection and response to manage a wider set of risks.


Trend No. 2: Identity system defense

Identity systems are coming under sustained attack. Misuse of credentials is now a primary method that attackers use to access systems and achieve their goals. For example, in the SolarWinds breach attackers used a supplier’s privileged access to infiltrate the target network.

BGH Tech Partner uses the term identity threat detection and response (ITDR) to describe a collection of tools and processes to defend identity systems. In the longer term, more consolidated solutions will emerge.


Trend No. 3: Digital supply chain risk


BGH Tech Partner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains, a three-fold increase from 2021.

Security and risk management leaders need to partner with other departments to prioritize digital supply chain risk and put pressure on suppliers to demonstrate security best practices.


Trend No. 4: Vendor consolidation

Security products are converging. Vendors are consolidating security functions into single platforms and introducing pricing and licensing options to make packaged solutions more attractive.

While it may introduce new challenges such as reduced negotiating power and potential single points of failure, BGH Tech Partner sees consolidation as a welcome trend that should reduce complexity, cut costs and improve efficiency, leading to better overall security.


Trend No. 5: Cybersecurity mesh

The cybersecurity mesh is a modern conceptual approach to security architecture that enables the distributed enterprise to deploy and integrate security to assets, whether they’re on premises, in data centers or in the cloud.

BGH Tech Partner predicts that by 2024, organizations adopting a cybersecurity mesh architecture will reduce the financial impact of individual security incidents by an average of 90%.


Trend No. 6: Distributed decisions

Executive leaders need a fast and agile cybersecurity function to support digital business priorities. However, as more aspects of the business are digitalized, the job is becoming too big for a centralized CISO role. Leading organizations are building the office of the CISO to enable distributed cyber judgment.


The CISO and the centralized function will continue to set policy, while cybersecurity leaders are placed in different parts of the organization to decentralize security decisions.


Trend No. 7: Beyond awareness

Human error continues to feature in most data breaches, showing that traditional approaches to security awareness training are ineffective. Progressive organizations are moving beyond outdated compliance-based awareness campaigns and investing in holistic behavior and culture change programs designed to provoke more secure ways of working.


No dudes en consultarnos, nuestros expertos están para ayudar!
contacto@bghtechpartner | Síguenos en LinkedIn | Síguenos Twitter