31.01.2023 Views

Cyber Defense eMagazine February Edition for 2023

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In the coming months and beyond, one of the most difficult challenges will be to retain talent while<br />

simultaneously improving a trust-based system that extends beyond the perimeter of the organization.<br />

Service industry workers turn cybersecurity professionals.<br />

More businesses, in addition to large companies such as Amazon, will look to fill open positions within<br />

their own organizations, leading to the transition of workers in the service industry becoming<br />

cybersecurity professionals. These employees possess the fundamental skill sets needed <strong>for</strong> security<br />

roles.<br />

The most significant difference will be in the additional knowledge they require, which can be taught<br />

through on-the-job training. Companies may shift their focus and bet on individuals that understand the<br />

know-how of their organization, allowing them to become experts within the same institution. The<br />

question <strong>for</strong> this year is how organizations transitioning to this new model will train and reskill employees<br />

to fulfill the entire range of security skills required.<br />

Previously unthinkable breaches occurred.<br />

The expectation <strong>for</strong> this year is to see an increase on well-funded hacker groups target the ‘whales.’<br />

Those big companies – like Microsoft and Amazon – that people across the globe leverage at an<br />

individual and professional level. Future attacks by cybercriminals will concentrate on additional<br />

exploitation of credentials that have already been taken, as they have done with companies like Dropbox<br />

and SolarWinds.<br />

Companies will highlight the necessity <strong>for</strong> greater budget allocation toward programs that transfer security<br />

responsibilities from users to the company, choosing seamless use that also keeps their corporate<br />

perimeters tightly protected, to stay one step ahead of attackers. Identity-based security, with a focus on<br />

zero-trust framework, will prove essential <strong>for</strong> handling human-centric and device vulnerabilities that will<br />

continue to plague vulnerable remote and hybrid operations.<br />

Third-party risks will shift companies’ approach to ‘trust.’<br />

CISOs and companies’ security leaders will be compelled to pose more difficult questions about their<br />

next steps, strategies, and mitigation procedures <strong>for</strong> integrating third parties within their network. In fact,<br />

they will increase their attention to reviewing specific in<strong>for</strong>mation in their security audits and reports and<br />

take additional steps to implement more secure architectures, enhancing third parties' access.<br />

Budgets will not increase, but leaders will consistently shift to cost-saving activities, while other cyber<br />

hygiene tasks will become essential to protecting businesses’ expanding networks. Asking critical<br />

questions and eliminating trust will be critical <strong>for</strong> verifying their trustworthiness and granting certain<br />

access levels to external parties.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!