Cyber Defense eMagazine February Edition for 2023
Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
In the coming months and beyond, one of the most difficult challenges will be to retain talent while<br />
simultaneously improving a trust-based system that extends beyond the perimeter of the organization.<br />
Service industry workers turn cybersecurity professionals.<br />
More businesses, in addition to large companies such as Amazon, will look to fill open positions within<br />
their own organizations, leading to the transition of workers in the service industry becoming<br />
cybersecurity professionals. These employees possess the fundamental skill sets needed <strong>for</strong> security<br />
roles.<br />
The most significant difference will be in the additional knowledge they require, which can be taught<br />
through on-the-job training. Companies may shift their focus and bet on individuals that understand the<br />
know-how of their organization, allowing them to become experts within the same institution. The<br />
question <strong>for</strong> this year is how organizations transitioning to this new model will train and reskill employees<br />
to fulfill the entire range of security skills required.<br />
Previously unthinkable breaches occurred.<br />
The expectation <strong>for</strong> this year is to see an increase on well-funded hacker groups target the ‘whales.’<br />
Those big companies – like Microsoft and Amazon – that people across the globe leverage at an<br />
individual and professional level. Future attacks by cybercriminals will concentrate on additional<br />
exploitation of credentials that have already been taken, as they have done with companies like Dropbox<br />
and SolarWinds.<br />
Companies will highlight the necessity <strong>for</strong> greater budget allocation toward programs that transfer security<br />
responsibilities from users to the company, choosing seamless use that also keeps their corporate<br />
perimeters tightly protected, to stay one step ahead of attackers. Identity-based security, with a focus on<br />
zero-trust framework, will prove essential <strong>for</strong> handling human-centric and device vulnerabilities that will<br />
continue to plague vulnerable remote and hybrid operations.<br />
Third-party risks will shift companies’ approach to ‘trust.’<br />
CISOs and companies’ security leaders will be compelled to pose more difficult questions about their<br />
next steps, strategies, and mitigation procedures <strong>for</strong> integrating third parties within their network. In fact,<br />
they will increase their attention to reviewing specific in<strong>for</strong>mation in their security audits and reports and<br />
take additional steps to implement more secure architectures, enhancing third parties' access.<br />
Budgets will not increase, but leaders will consistently shift to cost-saving activities, while other cyber<br />
hygiene tasks will become essential to protecting businesses’ expanding networks. Asking critical<br />
questions and eliminating trust will be critical <strong>for</strong> verifying their trustworthiness and granting certain<br />
access levels to external parties.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 73<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.