You are on page 1of 17

Keeping up

with a changing
cybersecurity
landscape
Keeping up with a changing cybersecurity landscape 2

Who this is for


CISOs and other decision makers responsible for Estimated reading time:
identifying, monitoring, assessing and mitigating internal Eight minutes
and external risks within an organisation who want to
stay on top of the latest trends in cybersecurity.

Contents

Keeping up with a changing cybersecurity landscape 3

Rethinking the nature of trust 4

Ransomware profits attract a sophisticated new class of attacker 7

Securing cloud services requires attention and investment 12

The cybersecurity talent shortage demands a decisive response 14

Automation, AI and ML enable in-depth defence 16


Keeping up with a
changing cybersecurity
landscape

As the workplace evolves This trend was accelerated by the COVID-19


health crisis and, for many organisations, the
at a faster pace, so do the
rapid shift to remote work. CISOs are tasked
cybersecurity threats that target it. with protecting a hybrid work environment
for the foreseeable future, meaning they must
The CISO’s job has never been easy, but in a enable employees to be productive from
context of increasingly frequent and complex anywhere while keeping data protected and
cyberthreats, it is even more challenging. complying with industry regulations.
Not only has the amount of data involved
continued to explode, but it is generated, Fortunately, new security approaches and
stored and used in more places than ever. technologies are available to help CISOs and
Insider threats persist. The regulatory other security leaders stay ahead of emerging
environment can change drastically and threats across the landscape. By adopting a
suddenly. And with so many people now Zero Trust approach and using AI, machine
working remotely, data lives well beyond the learning and automation to scale protection
traditional borders of business. and predict threats, CISOs can help their
organisations thrive in times of change. This
The days of securing assets behind a fortified briefing shares some of the key trends and
perimeter are gone. Data resides in the cloud, changes in the cybersecurity landscape and
in endpoints and across supply chains, greatly how CISOs can respond effectively.
expanding the potential attack surface.
Rethinking the
nature of trust

A Zero Trust framework is the once you logged in to a system, you were
considered a trusted entity. With a Zero
best way to prevent identity-
Trust strategy, users can access the data they
based attacks and secure data need, when they need it, and any anomalous
given the proliferation of behaviour will trigger alerts.
endpoints and remote work.
This framework is not a set of specific
products as much as a guide for optimising
When the defence paradigm centred on
an organisation’s security strategy. This
the perimeter and IT architecture shared a
allows security teams to balance deployment
common IP address range, security controls
of these strategies with maintaining a
were network oriented. As the cloud and
positive user experience. For example, by
mobile platforms have taken data outside the
adopting technology such as passwordless
perimeter, security protections must follow.
authentication, multifactor authentication
This changing world demands a new security
(MFA) or single sign-on (SSO) identity
framework for protecting systems and data.
management – which are all relatively simple
to implement – employees can use biometrics
The Zero Trust framework incorporates the
or personal devices to access applications and
key guiding strategies of explicit verification,
resources quickly and securely.
assume breach and least-privileged access. The
phrase “never trust, always verify” summarises
these strategies. With the perimeter paradigm,
Keeping up with a changing cybersecurity landscape 5

An integral part of the Zero


Trust strategy is orchestration
between the different risk
areas to create a unified threat
detection strategy via security
incident and event management
(SIEM) and extended detection
and response (XDR).
Keeping up with a changing cybersecurity landscape 6

SIEM works by gathering and analysing to their source, it allows organisations to


large amounts of data from across the entire better identify and prevent attacks before
organisation. The analysis happens in real time damage can be done. XDR enhances SIEM
and anomalies are identified and reported by providing depth of protection through
based on preconfigured rules. It improves access to investigations and analysis, along
incident detection by providing a wide breadth with automation that identifies and prioritises
of threat without creating alert fatigue. alerts and incidents for security staff and
recommendations for fixing vulnerabilities and
XDR helps break down silos to deliver a deeper misconfigurations. It’s an in-depth view of a
level of threat detection and response across particular area that adds valuable context to
multiple sources. By identifying hidden and the SIEM’s single dashboard.
sophisticated threats and tracking them

The Zero Trust framework incorporates the key guiding


strategies of explicit verification, assume breach and
least-privileged access. The phrase ‘never trust, always
verify’ summarises these strategies.
Ransomware profits
attract a sophisticated
new class of attacker

Fuelled by hefty profits and Three vectors are responsible for most
successful ransomware attacks. These include:
relatively low risk, ransomware
is seeing new levels of innovation, Remote desktop protocol
with threat actors adopting (RDP) brute force
advanced tactics to avoid
Phishing
traditional network defenses.
Vulnerable internet-
facing systems
Bad actors can now purchase Ransomware-as-
a-Service (RaaS) almost as easily as any other
cloud service. Attack chains have become
refined and commoditised, making it cheap
and easy to target valuable information and
exploit that information in new ways.
Keeping up with a changing cybersecurity landscape 8

Attack type
RDP Brute Force

Companies use RDP to enable access to


desktops from remote locations. Attackers
compromise these accounts to take control
of the physical or virtual desktops.

Penetration method Consequences Defences

Discovery of computers Unfettered access to Strong passwords,


running RDP via public internal resources and multifactor
IP address search, brute- the ability to deploy authentication, limited
force password guessing ransomware across password guesses,
the system cloud-based virtual
desktops instead of RDP
Keeping up with a changing cybersecurity landscape 9

Attack type
Phishing

Legitimate-seeming emails convince


employees to share identity and
authentication information.

Penetration method Consequences Defences

Increasingly Real but compromised Phishing detection,


sophisticated and credentials give malware protection,
targeted attacks tailored attackers difficult-to- threat isolation,
to individual users detect access to IT employee training
systems
Keeping up with a changing cybersecurity landscape 10

Attack type
Internet-facing systems

Attackers identify and compromise


misconfigured, outdated or poorly
protected internet-facing services.

Penetration method Consequences Defences

High-volume Access to platform Vulnerability


penetration testing of services and extensive scanning, cloud
internet-facing systems data stores vendor protections,
continuous patching
and updated
operating systems
Keeping up with a changing cybersecurity landscape 11

The most sophisticated ransomware attackers proxies. A combination of technology and


will penetrate a target, then look for a partner employee awareness training can be effective
who can deploy their ransomware into the against phishing-based ransomware attacks.
target in a customised fashion. For example,
developers of the LockerGoga ransomware, Attackers also use tools already installed on
which requires administrative rights for a system to spread across a network and
execution, so thoroughly analyse a target’s broaden infestation. These intruders ‘live
defences that they won’t even bother to hide off the land’ once they penetrate a system,
their malicious app because they know it will using publicly available tools and utilities
not be detected. Attackers may lurk inside to accomplish their ends. These attacks are
systems for months before deploying their difficult to detect because, to defenders, they
ransomware threat. appear to be normal network activity.

Phishing remains a popular threat, with threat While there is no silver bullet for security,
actors adopting advanced tactics to avoid these vectors can be mitigated with proper
traditional network defences. They′re hiding password protection, identity management
behind packet obfuscation, encryption, multi- and software updates in addition to a
phased payloads and fast flux DNS, where comprehensive security and compliance
botnets hide phishing delivery sites behind toolset. Keeping systems up-to-date and
a network of compromised hosts acting as regularly backing up data offline are strong
protections against ransomware.

According to the 2021 Ransomware Survey Report,


ransomware grew by 1,070% between July 2020 and
June 2021.¹
¹ Global Threat Landscape Report, Fortinet, 2021.
Securing cloud services
requires attention and
investment

Cloud security takes center stage Misconfiguration is one of the biggest


contributors to vulnerabilities in the cloud.²
as security leaders continue
The expanding threat landscape puts more
to adapt to the impact of past pressure on CISOs to modernise security
disruptions, prepare for increased operations to reduce inefficiencies, increase
uncertainty and support the shift visibility across the organisation and become
to hybrid work. more proactive in identifying and protecting
against threats.

Most organisations and industries recognise Cloud security efforts are often complicated
that the cloud can enable data security by an ever-increasing mix of security products
that is equal to or better than on-premises and services. Typically, these products
systems. However, cloud vendors can only take use different portals, data schemas and
responsibility for the security of systems under methodologies. Monitoring data across those
their control. Companies are still responsible products manually can delay response times
for proper configuration, identity and access and even miss elements of an attack itself.
management and security within their own
multicloud and hybrid environments.

² Misconfigurations are the Biggest Threat to


Cloud Security: Here’s What to Do, Infosecurity
Magazine, 24 May 2021.
Keeping up with a changing cybersecurity landscape 13

According to Rick Gehringer, Chief Information CISOs can also take advantage of the security
Officer at Wedgewood, a real estate services, capabilities and best practices
investment company, “That mix only makes provided by cloud vendors, who have a strong
the attack surface larger. It’s hard to know your interest in helping customers avoid costly
environment well and develop awareness of and reputation-damaging compromises.
associated risks when it’s sprawling.”3 By using optimal configurations and
minimising customisation to what’s necessary,
A better approach is to adopt a single organisations can reduce the likelihood of
platform that unifies the security toolset within exposing the elements of their systems under
a manageable, data-driven environment. This their control.
enables security teams to simplify security
across their entire portfolio. Improved visibility,
a clear cloud security architecture strategy
and proper configuration management also
contribute to both the streamlining and
improved effectiveness of cloud security.

³ Real estate specialist Wedgewood


lists Microsoft Sentinel among its best
investments, Microsoft, 2022.

Improved visibility, a clear cloud security architecture


strategy and proper configuration management also
contribute to both the streamlining and improved
effectiveness of cloud security.
The cybersecurity talent
shortage demands
a decisive response

In the face of a growing shortage Security leaders must get innovative to address
this challenge. “Many CISOs are telling us that
of qualified security staff, CISOs
one of the most effective ways to address their
are getting creative. security challenges amidst staffing challenges
is to build a culture of security where security
Even before the pandemic, cybersecurity was is everyone’s job,” says Rob Lefferts, Corporate
struggling with a labour shortage. Now, CISOs Vice President, Programme Management for
are concerned not only about retaining the Microsoft 365 Security and Compliance.⁵ “CISOs
employees they already have but attracting are increasingly advocating for this notion
new talent as well. that the entire organisation can take on the
responsibility of security, especially as they are
In November 2021, a record 4.5 million people facing staffing shortages or funding challenges.”
in the US quit their jobs, with a historic rise
reported in all four US regions. More than By making sure development teams, system
40% of employees worldwide are considering administrators and non-IT employees all
quitting their jobs in 2022. Some people are understand security policies and risks,
leaving the workforce, while others are taking they can help lighten the workload of their
new positions or exploring new careers in existing security teams. Organisations are also
what has been termed the Great Reshuffle.⁴ deputising employees outside the security
What this means for the cybersecurity talent team, providing extra training and keeping
shortage is two things: first, as with other them connected to help identify and manage
fields, cybersecurity teams are facing higher- security risks in ways that are more scalable
than-average turnover. Second, this turnover than centralised approaches.
can increase insider risk.

⁴ The Next Great Disruption is Hybrid Work – ⁵ Developing security talent, Rob Lefferts,
Are We Ready?, Microsoft, 2021. Microsoft, 2022.
Keeping up with a changing cybersecurity landscape 15

Many CISOs are telling us


that one of the most effective
ways to address their security
challenges amidst staffing
challenges is to build a
culture of security where
security is everyone’s job.”
Rob Lefferts,
Corporate Vice President, Programme Management
for Microsoft 365 Security and Compliance.⁵

⁵ Developing security talent, Rob Lefferts,


Microsoft, 2022.
Automation, AI
and ML enable
in-depth defence

Security teams now have the signals in ways that human analysts can′t.
ML algorithms can turn raw data from multiple
ability to deploy advanced
sources into incidents that give defenders the
hunting capabilities to root out kind of visibility they need to understand the
sophisticated breaches. entire context of an attack and craft a targeted
response before it’s too late.
Modern threat protection requires security
controls that continuously cross-correlate AI, ML and automation also help organisations
and analyse relevant variables in near real become less reactive and more proactive
time, then decide whether an identity should in identifying and responding to threats.
be granted or denied access. This need is Security teams now have the ability to deploy
increasing the urgency for organisations to advanced hunting capabilities to root out
adopt automation, AI and machine learning sophisticated breaches or better understand
(ML) across their security stacks. how their organisation′s assets behave. This
approach increases an organisation′s ability to
AI and ML play critical roles across defend against persistent attacks and block
cybersecurity operations because they make attackers from gaining a foothold to exploit
it possible to analyse massive amounts of data data and systems.
for suspicious activity patterns and threat

With a clear view of the changing cybersecurity landscape


and access to evolving defence methods, businesses are
better able to thrive and stay one step ahead of threats.
Keeping up with a changing cybersecurity landscape

Discover the power of an integrated


approach to security that uses a
Zero Trust framework, advanced
AI and intelligent automation
to protect your business against
sophisticated threats.

Learn more >

© 2022 Microsoft Corporation. All rights reserved. This document is provided ‘as is’. Information and views
expressed in this document, including URL and other internet website references, may change without notice.
You bear the risk of using it. This document does not provide you with any legal rights to any intellectual
property in any Microsoft product. You may copy and use this document for your internal, reference purposes.

You might also like