20.12.2023 Views

CS Jan-Feb 2024

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>2024</strong> predictions<br />

activity independently and accurately, to<br />

effectively escalate to infosecurity teams as<br />

appropriate. Likewise, infosecurity teams<br />

will have at their disposal capabilities that<br />

automate time- and resource-intensive<br />

processes across the cybersecurity spectrum.<br />

All this combined will make a marked stride<br />

in helping to alleviate the global cyber talent<br />

shortage.<br />

Investment in security will see an upsurge to<br />

reflect generative AI. As much as AI is a tool<br />

that will help to make strides in strengthening<br />

cybersecurity defences, it is also a technique<br />

that is being widely deployed by threat actors<br />

to breach those safeguards with success.<br />

Following a period of relatively stationary<br />

budgets, enterprises will increase spending<br />

in security, investing especially in generative<br />

AI-based products, services and cybersecurity<br />

skills.<br />

Aaron Kiemele, CISO at Jamf<br />

In <strong>2024</strong>, cybersecurity teams will need to be<br />

extra vigilant about nation state threats. Major<br />

elections taking place across the world, as well<br />

as the continued conflict in Ukraine and Israel,<br />

will drive increased cyberattacks from statesponsored<br />

groups. Advanced persistent threat<br />

(APT) groups linked to foreign governments<br />

will expand their targets beyond large organisations<br />

in critical infrastructure or sensitive<br />

industries. Smaller businesses in the supply<br />

chain or partner ecosystem will increasingly<br />

be attacked as vectors to the true targets.<br />

Collaboration, management and cloud tools<br />

used by smaller suppliers will be attractive<br />

targets for nation state actors. These tools<br />

hold sensitive data and access that could<br />

provide an easy pathway for lateral movement<br />

towards a larger primary target. Organisations<br />

of all sizes will need to ensure they are not<br />

the weak link that allows adversaries access<br />

to their partners and customers. Cybersecurity<br />

teams should expand their protection, detection<br />

and response capabilities, with nation<br />

state campaigns in mind. Partnering closely<br />

with governments and information-sharing<br />

organisations will also be key to identify and<br />

defend against threats early.<br />

Ultimately, the APT landscape in <strong>2024</strong> will be<br />

highly complex. But with robust preparation<br />

and cooperation, organisations can develop<br />

appropriate resilience against even significant<br />

nation state capabilities.<br />

Simon Hodgkinson, former BP CISO<br />

and strategic adviser to Semperis<br />

Businesses are finally starting to understand<br />

that cyber isn't a topic for the IT department,<br />

but an enterprise risk. Earlier this year, Uber's<br />

former chief security officer was sentenced for<br />

his role in covering up a data breach. Such<br />

headlines drive home an important message:<br />

Organisations are waking up to the fact that<br />

security and operational resilience need to<br />

be owned by the boardroom. Incoming<br />

regulations such as NIS2, as well as the<br />

general rise in cyber awareness, reinforce<br />

this. Operational technology is one area<br />

that's particularly difficult to protect and<br />

organisations will need to put mitigating<br />

controls in place to counter the risks.<br />

Guido Grillenmeier, principal technologist,<br />

Semperis<br />

Attackers are still exploiting basic vulnerabilities<br />

- with the help of AI. The core weak<br />

spots used by attackers haven't changed<br />

over the years and are still being exploited<br />

successfully. Take Active Directory as an<br />

example, Microsoft's core identity service,<br />

which is used by hackers to gain user<br />

privileges and penetrate deeper into their<br />

victim's network. Attackers' initial entry<br />

methods are evolving, though, with Artificial<br />

Intelligence allowing cybercriminals to create<br />

ever more sophisticated and convincing<br />

phishing campaigns that play tricks with<br />

users' emotions. Even users with a high level<br />

of security awareness can now get caught out<br />

by such incredibly well-engineered phishing<br />

attempts. The release of Windows Server<br />

2025 towards the end of <strong>2024</strong> recognises<br />

the need to reinforce identity security, with<br />

the introduction of some additional security<br />

Yvonne Bernard, Hornetsecurity: with the<br />

advent of new technology also comes<br />

new opportunities for criminal activity<br />

from bad actors.<br />

Usman Choudhary, VIPRE: generative AI will<br />

drive self-service security and help to alleviate<br />

the cyber talent shortage.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Jan</strong>/<strong>Feb</strong> <strong>2024</strong> computing security<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!