Seven Security and Risk Management Trends for 2022
Date: Oct 28, 2022
Related Tags:1. Cloud Security
2. Security Center
Abstract: This article describes the experience of a function after entering the compiler.
Abstract: According to Gartner, there are seven trends that security and risk management leaders must address to protect the expanding digital footprint of modern organizations from new threats in 2022 and beyond.
"Organizations around the world are facing sophisticated ransomware attacks, attacks against digital supply chains, and deep breaches," said Peter Firstbrook, research vice president at Gartner. "The pandemic has accelerated the development of hybrid work models and the move to the cloud, giving chief information Security officers (CISOs) pose a conundrum: how to protect an increasingly fragmented enterprise while addressing the shortage of senior security personnel.”
These challenges have given rise to three overarching trends affecting cybersecurity practice: (1) new responses to sophisticated threats; (2) evolution and refactoring of security practices; and (3) rethinking of technology. The following trends will have a broad impact on the industry in all three areas.
The attack surface for businesses is expanding. Risks arising from the use of cyber-physical systems and the Internet of Things, open source code, cloud applications, complex digital supply chains, social media, etc., expose organizations to an attack surface beyond their controllable assets. Organizations must adopt more advanced approaches than traditional security monitoring, detection and response to manage a wider range of security risks.
Digital Risk Protection Services (DRPS), External Attack Surface Management (EASM) technologies and Cyber Asset Attack Surface Management (CAASM) will help CISOs visualize internal and external business systems and automatically detect security breaches.
Cybercriminals are finding that attacking digital supply chains can yield high returns. More threats are expected as vulnerabilities such as Log4j spread through the supply chain. Gartner predicts that by 2025, 45% of enterprises worldwide will experience software supply chain attacks, a threefold increase from 2021.
To reduce digital supply chain risks, organizations need to adopt new responses, including more deliberate, risk-based vendor/partner segmentation and scoring, requiring proof of security controls and best practices, and a shift to a resilient mindset, And trying to stay ahead of upcoming regulations.
Savvy threat actors are aggressively targeting identity and access management (IAM) infrastructures through credential abuse. Gartner coined the term "Identity Threat Detection and Response" (ITDR) to describe a collection of tools and best practices for securing identity systems.
"Organizations have put a lot of effort into improving IAM capabilities, but much of that has been focused on improving user authentication techniques, which actually expands the attack surface for a fundamental part of the cybersecurity infrastructure," Firstbrook said. ITDR tools can help protect identity systems, detect when they are compromised and take effective remedial action.”

Trend 4: Distributed Decision Making
Enterprise cybersecurity needs and expectations are maturing, and executives need more agile security measures as the attack surface continues to expand. Therefore, in order to meet the scope, scale and complexity of digital business, cybersecurity decision-making, responsibility and accountability need to be distributed throughout the enterprise organization, avoiding the centralization of functions.
Firstbrook said: “The role of the CISO has shifted from a technical domain expert to an executive risk manager. By 2025, a single, centralized cybersecurity function will not be able to meet the needs of the digital enterprise. CISOs must rethink themselves responsibilities to help boards, CEOs and other business leaders make informed risk decisions.”
Many data breaches are still caused by human error, proving the ineffectiveness of traditional security awareness training methods. Advanced corporate agencies are investing in holistic safety behavior and culture programs (SBCPs) to replace outdated compliance-focused safety awareness campaigns. The Holistic Safety Behavior and Culture program focuses on fostering new mindsets and behaviors that lead to safer ways of working across the organization.
Convergence of security technologies is accelerating, driven by the need to reduce complexity, reduce administrative overhead, and increase effectiveness. New platform strategies such as Extended Detection and Response (XDR), Secure Service Edge (SSE), and Cloud-Native Application Protection Platform (CNAPP) are accelerating the unlocking of the benefits of converged solutions.
For example, Gartner predicts that by 2024, 30% of enterprises will adopt cloud-based Secure Web Gateways (SWGs), Cloud Access Security Brokers (CASBs), Zero Trust Network Access (ZTNA), and branch-office firewalls from the same vendor. Service (FWaaS) capabilities. The integration of safety features will reduce the total cost of ownership and improve long-term operational efficiency, thereby increasing the overall safety factor.
The consolidation trend of security products is driving the integration of security architecture components, but organizations still need to define unified security policies, enable workflows, and exchange data between integrated solutions. The Cyber Security Mesh Architecture (CSMA) helps provide a common integrated security architecture and posture to secure all on-premises, data center and cloud assets.
"The key cybersecurity trends published by Gartner do not exist in isolation, but are interdependent and reinforcing," said Firstbrook. "Together, they will help CISOs drive the evolution of their roles to meet future security and risk management challenges and continue to advance their position in the corporate body.”
Related Tags:1. Cloud Security
2. Security Center
Abstract: This article describes the experience of a function after entering the compiler.
Abstract: According to Gartner, there are seven trends that security and risk management leaders must address to protect the expanding digital footprint of modern organizations from new threats in 2022 and beyond.
"Organizations around the world are facing sophisticated ransomware attacks, attacks against digital supply chains, and deep breaches," said Peter Firstbrook, research vice president at Gartner. "The pandemic has accelerated the development of hybrid work models and the move to the cloud, giving chief information Security officers (CISOs) pose a conundrum: how to protect an increasingly fragmented enterprise while addressing the shortage of senior security personnel.”
These challenges have given rise to three overarching trends affecting cybersecurity practice: (1) new responses to sophisticated threats; (2) evolution and refactoring of security practices; and (3) rethinking of technology. The following trends will have a broad impact on the industry in all three areas.
Trend 1: The attack surface is expanding
The attack surface for businesses is expanding. Risks arising from the use of cyber-physical systems and the Internet of Things, open source code, cloud applications, complex digital supply chains, social media, etc., expose organizations to an attack surface beyond their controllable assets. Organizations must adopt more advanced approaches than traditional security monitoring, detection and response to manage a wider range of security risks.
Digital Risk Protection Services (DRPS), External Attack Surface Management (EASM) technologies and Cyber Asset Attack Surface Management (CAASM) will help CISOs visualize internal and external business systems and automatically detect security breaches.
Trend 2: Digital Supply Chain Risk
Cybercriminals are finding that attacking digital supply chains can yield high returns. More threats are expected as vulnerabilities such as Log4j spread through the supply chain. Gartner predicts that by 2025, 45% of enterprises worldwide will experience software supply chain attacks, a threefold increase from 2021.
To reduce digital supply chain risks, organizations need to adopt new responses, including more deliberate, risk-based vendor/partner segmentation and scoring, requiring proof of security controls and best practices, and a shift to a resilient mindset, And trying to stay ahead of upcoming regulations.
Trend 3: Identity Threat Detection and Response
Savvy threat actors are aggressively targeting identity and access management (IAM) infrastructures through credential abuse. Gartner coined the term "Identity Threat Detection and Response" (ITDR) to describe a collection of tools and best practices for securing identity systems.
"Organizations have put a lot of effort into improving IAM capabilities, but much of that has been focused on improving user authentication techniques, which actually expands the attack surface for a fundamental part of the cybersecurity infrastructure," Firstbrook said. ITDR tools can help protect identity systems, detect when they are compromised and take effective remedial action.”

Trend 4: Distributed Decision Making
Enterprise cybersecurity needs and expectations are maturing, and executives need more agile security measures as the attack surface continues to expand. Therefore, in order to meet the scope, scale and complexity of digital business, cybersecurity decision-making, responsibility and accountability need to be distributed throughout the enterprise organization, avoiding the centralization of functions.
Firstbrook said: “The role of the CISO has shifted from a technical domain expert to an executive risk manager. By 2025, a single, centralized cybersecurity function will not be able to meet the needs of the digital enterprise. CISOs must rethink themselves responsibilities to help boards, CEOs and other business leaders make informed risk decisions.”
Trend 5: Beyond Security Awareness Training
Many data breaches are still caused by human error, proving the ineffectiveness of traditional security awareness training methods. Advanced corporate agencies are investing in holistic safety behavior and culture programs (SBCPs) to replace outdated compliance-focused safety awareness campaigns. The Holistic Safety Behavior and Culture program focuses on fostering new mindsets and behaviors that lead to safer ways of working across the organization.
Trend 6: Vendor Consolidation
Convergence of security technologies is accelerating, driven by the need to reduce complexity, reduce administrative overhead, and increase effectiveness. New platform strategies such as Extended Detection and Response (XDR), Secure Service Edge (SSE), and Cloud-Native Application Protection Platform (CNAPP) are accelerating the unlocking of the benefits of converged solutions.
For example, Gartner predicts that by 2024, 30% of enterprises will adopt cloud-based Secure Web Gateways (SWGs), Cloud Access Security Brokers (CASBs), Zero Trust Network Access (ZTNA), and branch-office firewalls from the same vendor. Service (FWaaS) capabilities. The integration of safety features will reduce the total cost of ownership and improve long-term operational efficiency, thereby increasing the overall safety factor.
Trend 7: Cybersecurity Grid
The consolidation trend of security products is driving the integration of security architecture components, but organizations still need to define unified security policies, enable workflows, and exchange data between integrated solutions. The Cyber Security Mesh Architecture (CSMA) helps provide a common integrated security architecture and posture to secure all on-premises, data center and cloud assets.
"The key cybersecurity trends published by Gartner do not exist in isolation, but are interdependent and reinforcing," said Firstbrook. "Together, they will help CISOs drive the evolution of their roles to meet future security and risk management challenges and continue to advance their position in the corporate body.”
Related Articles
-
A detailed explanation of Hadoop core architecture HDFS
Knowledge Base Team
-
What Does IOT Mean
Knowledge Base Team
-
6 Optional Technologies for Data Storage
Knowledge Base Team
-
What Is Blockchain Technology
Knowledge Base Team
Explore More Special Offers
-
Short Message Service(SMS) & Mail Service
50,000 email package starts as low as USD 1.99, 120 short messages start at only USD 1.00