Gartner: Three top trends in cyber security for 2024 – ComputerWeekly.com

Security and risk management leaders face disruptions on multiple fronts: technological, organisational and human. Preparation and pragmatic execution are vital to address these disruptions and deliver an effective cyber security programme.
Gartner believes investing in effective risk management of third-party services and software, enhanced security for the identity fabric and continuous monitoring of hybrid digital environments can harden an organisation’s attack surface and strengthen its resilience.
Gartner also expects IT security leaders will improve the security function’s reputation and performance by using generative artificial intelligence (GenAI) in proactive collaboration with business stakeholders. This will help lay the foundations for ethical, safe and secure use of this disruptive technology. It recommends aligning security governance efforts with the use of business-aligned cyber security reporting, to improve the security function’s performance and reputation as a trusted partner and key enabler of an organisation’s strategic objectives.
In this article, these themes are explored further.
As Gartner points out, large language model (LLM) applications, such as ChatGPT, have put GenAI on the agenda for inclusion in many business, IT and cyber security roadmaps. The term GenAI describes techniques that learn from representations of data and model artefacts to generate new artefacts.
GenAI introduces new attack surfaces, which need protecting. This requires changes to application and data security practices and to user monitoring. GenAI will also change the cyber security market’s dynamics.
From a risk perspective, Gartner recommends IT security leaders start by tackling unmanaged and uncontrolled uses of ChatGPT to minimise risks. The most notable issues are the use of confidential data in third-party GenAI applications and the potential copyright infringement and brand damage from the use of unvetted, AI-generated content. Business initiatives have driven requirements to secure GenAI applications that add new attack surfaces to those defended by traditional application security.
Cyber security providers have made a wave of hyperbolic AI announcements designed to spark interest in what GenAI might be able to do. These early announcements mostly involve interactive prompts. These have raised expectations, mostly from leaders outside the security field, about the benefits for security teams’ productivity, although most of these announcements were only early previews, sometimes verging on “AI washing”.
Gartner analysts note that GenAI features are already used in security operations and application security, but they have yet to observe cyber security products using GenAI techniques directly to detect or prevent threats.
As IT security and risk management leaders plan for 2024, they are raising legitimate questions about new risks and threats, due to privacy issues and threat actors accessing LLM technologies.
As more teams – potentially almost every team – within organisations seize the opportunity to integrate GenAI capabilities into their systems, it’s critical for cyber security teams to keep adapting to changes in processes.
Although organisations with existing AI projects can tune their existing governance policies, those pivoting to GenAI will need to build policies from scratch. Among other things, determining responsibility for data confidentiality, output biases and drifts, copyright infringement, trustworthiness and explainability of GenAI applications requires new or updated governance principles.
Organisational attack surfaces have expanded enormously in recent years. According to Gartner, this growth has been driven notably by accelerated adoption of software as a service, expanding digital supply chains, increased corporate presence on social media, custom application development, remote working and internet-based customer interaction.
This increased attack surface has left organisations with potential blind spots, as well as huge numbers of potential exposures to address.
To cope, IT security and risk management leaders have introduced pilot processes that govern the volume and importance of threat exposures and the impact of dealing with them through continuous threat exposure management (CTEM) programmes. They are now expanding these pilots beyond cyber security validation activities. The more mature organisations are starting to offer security optimisations to better mobilise business leaders, not just short-term remediations.
Most organisations’ efforts to manage threat exposure focus too single-mindedly on finding and correcting technology-based vulnerabilities. This focus is encouraged by SecOps compliance initiatives, but often does not consider significant shifts in the operational practices of modern organisations, such as the move to cloud-driven applications and containers. Security teams must enhance their current model – in which patching and securing physical and self-managed software-based systems is the primary objective – and move beyond it.
IT security and risk management leaders have realised that existing practices are not broad enough and that staffing constraints limit the volume of work that can be completed. Gartner recommends they focus on relevant issues by aligning CTEM scope with business objectives.
Security and risk management leaders should aim for visibility into exposures and attract the interest of other senior leaders by highlighting the issues with the most potential impact on an organisation’s critical operations. They should define a narrower scope for CTEM, aligned with business objectives, using familiar language, and explaining the impact on the business, not technology.
Gartner also urges IT security and risk management leaders to reduce the number of prioritised issues through validation. Introducing validation steps and supporting technologies such as breach and attack simulation and automated penetration testing tools can reduce the burden imposed by the outputs of exposure assessment tools, such as vulnerability assessment solutions, by highlighting discovered issues that may result from genuine compromises using real-world techniques.
As part of a CTEM plan, security leaders should expand communication with other department heads, asset owners and third parties to have clear paths to mobilise responses and remediations. They should also get traction with business departments and asset owners by clearly articulating and discussing the residual risk associated with the postponement of remediation efforts, offering short-term and long-term options to reduce or eliminate exposure.
An identity-first approach to security shifts the focus from network security and other traditional controls to identity and access management (IAM). It makes IAM a key contributor to organisations’ cyber security outcomes, and therefore to business outcomes.
Gartner urges organisations adopting this approach to pay closer attention to fundamental IAM hygiene and the hardening of IAM systems to improve resilience. This includes closing long-standing gaps in prevention capabilities by, for example, expanding control over cloud entitlements and machine identities, and introducing advanced capabilities for identity threat detection and response (ITDR).
IAM architecture is evolving towards an identity fabric and taking on new functions to enable real-time identity controls in a composable manner.
To support these trends, Gartner says IT security leaders should redouble efforts to implement proper identity hygiene and make this a priority for the security programme by using outcome-driven metrics to provide directional guidance and set the bar for improvement.
Looking at ITDR, Gartner advises IT security leaders to implement security posture assessments and threat detection and response capabilities for key enterprise identity systems such as Microsoft Active Directory and cloud-delivered access management services.
Gartner also recommends that IT security teams refactor identity infrastructure to support identity-first security principles to evolve towards an identity fabric. IT security leaders should start by improving integration between IAM tools using a composable tool strategy.
Overall, Gartner advises IT security leaders to improve organisational resilience by implementing continuous, pragmatic, business-aligned risk management efforts across their organisations’ digital and third-party ecosystems. This includes expanding the role that identity and access management plays in reducing cyber security risk.
To support decentralised technology projects, IT security leaders will need to coordinate cyber security decision-making. Gartner recommends that they measure the security function’s performance using business-aligned, outcome-driven metrics aligned with protection-level agreements.
They should also take a strategic, human-centric approach to improving the security function’s performance by reskilling existing security talent, using GenAI to augment – not replace – human efforts, and implementing contextually appropriate security behaviour and culture programmes.
Gartner analysts will explore the topic and the most significant challenges that security and risk leaders face as they respond to and drive change with a global community of experts and peers at the Gartner Security & Risk Management Summit, which will take place on 23-25 September 2024 in London.
This article is based on the Gartner report “Top trends in cyber security for 2024” by analysts Richard Addiscott, Jeremy D’Hoinne, Chiara Girardi, Pete Shoard, Paul Furtado, Tom Scholtz, Anson Chen, William Candrick and Felix Gaehtgens.
Enterprises might look more closely at workload allocation and explore alternative platforms amid ongoing cloud price hikes. …
The next U.S. president will set the tone on issues such as AI regulation, data privacy and climate tech. Where do prominent …
The human capital management company and the retailer have taken different roads to GenAI deployment. But both enterprises aim to…
Apple said its new PQ3 protocol for iMessage is the first of its kind and addresses both future threats from quantum computing as…
Coalition said enterprises faced more substantial fallout from attacks on Citrix Bleed and Progress Software’s MoveIt Transfer …
This year’s report covered cloud intrusions, data extortion attacks and the ongoing conflict between Israel and Hamas.
This network compliance checklist for remote work provides best practices on establishing remote policies and procedures, help …
A 12% drop in networking revenue contributed to the company’s overall revenue decline and its decision to cut 5% of its workforce.
Cisco has launched a SaaS product for applying policy controls to AI model-bound data and an Nvidia partnership to bolster Cisco …
The rise in digital information is causing a shortage in data center storage space. Containerized data centers can be for …
There are regulated requirements to maintain data center equipment and functionality. ISO 14644 cleanroom standards lay out …
With rising demand for data space, companies must plan to expand their data centers in an eco-friendly way. 2024 data center …
The data catalog specialist’s new tool examines four key criteria, including literacy and governance, in assessing an …
AI’s effectiveness is limited by data quality. Building strong data management and governance programs are crucial to handling …
Pipelines and platforms capable of managing volume and combining information from disparate sources in real time are key to the …
All Rights Reserved, Copyright 2000 – 2024, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information

source

Related Posts

After 6 months and little explanation, Norton Healthcare patients, employees still feeling effects of cyber attack – WDRB

Spotty shower possible. Storms after midnight Updated: April 16, 2024 @ 12:31 pmNorton Healthcare, a company serving about 600,000 patients a year with nearly $5 billion in assets, continues to…

Read more

CA's top cybersecurity job has been vacant for almost 2 years – CalMatters

Technology Californians get hacked all the time. The state’s top cybersecurity job is vacant In summaryGov. Newsom has yet to appoint a commander who is tasked with informing businesses and…

Read more

13 Cyber Security Measures Your Small Business Must Take – Tech.co

Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn MoreCybersecurity has been important to…

Read more

AVG Antivirus Free review – Ghacks

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code.One interesting fact about AVG is that it maintains…

Read more

Vlog Episode #247: Chris Long on Improving Technical SEO Skills & Playing Offense SEO – Search Engine Roundtable

In part one, we learned about Chris Long and his experience working with Bill Slawski. Then, in part two, we spoke about helping people with SEO on LinkedIn and using…

Read more

Information Security Vs. Cybersecurity: What's The Difference? – Forbes

Information Security Vs. Cybersecurity: What’s The Difference?  Forbessource

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *