• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Identity security risks: Analysing danger zones in interconnected environments

Derrick Leau by Derrick Leau
August 1, 2023
Photo by Lewis Kang'ethe Ngugi: https://www.pexels.com/photo/turned-on-flat-screen-monitor-289927/

Photo by Lewis Kang'ethe Ngugi: https://www.pexels.com/photo/turned-on-flat-screen-monitor-289927/

Digital adoption continues to accelerate as businesses aim to perform and deliver innovative solutions faster. To support this development, Singapore's Minister of Communication and Information, Josephine Teo, announced the creation of a Digital Connectivity Blueprint (DCB) that will chart the island nation's technological future.

Specifically, the blueprint will outline priority areas and expansion strategies that will enable organisations to prepare for future challenges.

However, cybercriminals are constantly finding new ways to exploit vulnerabilities, which include weak and uncompromised identities, so they can disrupt business operations.

This is further complicated by economic headwinds that will slow Singapore's GDP growth, which the Ministry of Trade and Industry (MTI) forecasts could drop to as much as 0.5%. These developments pressure organisations to provide more effective security with less.

Doing that rests on cybersecurity leaders prioritising six key areas to mitigate the risk of highly damaging identity-based attacks.

1. People. While people form the backbone of business operations, they can also unintentionally open the door for attackers to move in. For instance, phishing techniques are designed to trick users into giving up their confidential information through a fake link or email. According to our own survey, the greatest risks originate from third-party identities, including those of partners, consultants, and service providers.

2. Workforce upheaval. Layoffs are not an ideal situation, but the current economic climate means they are a distinct possibility and businesses must account for security risks that can arise from workforce changes.

CyberArk’s 2023 Identity Security Threat Landscape Report found that 75% of Singaporean organisations expect more employee churn-related attacks throughout 2023. These types of attacks often count on security teams' inability to identify and de-provision accounts manually once an employee leaves the company.

3. Machine identities. The percentage of machine identities outranks that of humans at 46% to 42%. When put in context - i.e., 84% of local organisations indicate that they will adopt more SaaS tools within the next 12 months - this is cause for concern as it provides devices with unfettered access to business resources.

4. Business systems. When asked about which assets have the potential to cause the most damage, security leaders responded with business-critical applications, including enterprise resource planning (ERP) and financial management software.

Our survey found that only 34% of these applications have identity security controls in place. Furthermore, 65% of security leaders admit that their employees have unsecured, high-sensitivity access to applications. 

5. Software development. The pressure to stay ahead of the competition has pushed organisations to provide developers with seamless access so they can speed up go-to-market. This, combined with the lack of capacity by security teams to handle frequent access requests, makes their identities highly attractive targets for attackers to gain access to critical data.

6. Identity security toolsets. To protect against the ever-evolving threat landscape, organisations have resorted to deploying various security tools from multiple vendors. However, because these tools do not communicate with one another, this setup has created unaccounted gaps and overlapping functionalities.

Strategies to lower identity security risks

Most cyberattacks follow a similar process in which the user first acquires the right identities and credentials to get inside the system. From there, they either look for confidential files to steal or gain higher privileges by moving laterally through different accounts, allowing them to disrupt critical systems.

To overcome these attacks, it is imperative that organisations adopt identity-based security controls that uphold the principles of zero trust and can integrate seamlessly with the organisation's tech stack.

This should also be supported by other measures that protect company assets, without hindering access. These include just-in-time (JIT) access that is based on when the resource is most likely to be used, removing local admin rights, and adopting least privilege principles to prevent escalation. With these measures, security teams will be able to stay ahead of tactics such as phishing and malware.

An impenetrable cybersecurity strategy relies on organisations providing greater focus on user and device identities. Not only will this cut down the number of incidents they have to contend with, but it can also reduce the amount of cybersecurity debt they incur.

The stakes are high, and there is no room for error, especially as companies look to maintain their survivability in this tumultuous economy.


Related:  The many roads to business transformation in 2022
Tags: CyberArkidentity security
Derrick Leau

Derrick Leau

Derrick Leau is the Country Manager of Singapore at CyberArk; he leads a team of identity security professionals and is responsible for driving CyberArk’s growing customer base and channels in Singapore. Derrick is an experienced leader with a passion to help organisations to resolve their business and cybersecurity challenges. He has over 10 years of leadership and operations experience, having worked at FireEye, VMware and Dell EMC.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe