The 2018 Cyber Threatscape Report noted the clear need for more effective use of actionable threat intelligence. With state-sponsored activities a growing force to be reckoned with, extended supply chain threats, targets against critical infrastructure and a surge in miner malware and more financially motivated advanced persistent threats, CISOs have had their work cut out to budget and act effectively.
Despite strong investments, the relentless creativity of cybercriminals continues to put pressure on organizations to be defense ready. Cybercriminals are testing organizations’ resilience by layering attacks, updating techniques and establishing new, intricate relationships to better disguise their identities. Businesses need to re-evaluate cyber postures to include suppliers, partners and acquisition targets, alongside their own organizations, to ensure they are not opening up new security gaps or inviting in threat actors who are dormant or active on third-party networks.
What’s inside the 2019 Cyber Threatscape Report?
In this latest report, Accenture iDefense offers leading practices for mitigating ransomware, suggestions regarding employee cybersecurity training, evaluations of international events coming up in the next 12 months and outlines which threat actors might use such events for nefarious purposes. Accenture iDefense aims to help its clients, partners and community members by providing this information so that they can stay ahead of threats pertinent to their businesses, industries and geographies.
A security pivot
Cybercrime is not a one-time event. Just as one avenue of income has been blocked, cybercriminals will swiftly move on to another, often more sophisticated means of entry. Organizations must adapt their approach to meet the latest demands from a rapidly changing world by remembering that:
- Communications targeting a global stage may not be all they seem.
- Cybercriminals are shifting—and so should you.
- The mixed motives behind ransomware are making it more destructive.
- This is no time for splendid isolation—your ecosystem needs you.
- Beware of opening more than the back door.
Organizations must learn not to dwell on the vulnerabilities of the past and be consistent but flexible in their defense. In short, they must tackle cyber resilience with a security pivot mind-set.