• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Why global conflict is changing what it means to be cyber resilient

Chris Thomas by Chris Thomas
November 14, 2022
Photo by Kaboompics .com from Pexels: https://www.pexels.com/photo/marketing-strategy-6229/

Photo by Kaboompics .com from Pexels: https://www.pexels.com/photo/marketing-strategy-6229/

With Ukraine and Russia bringing their conflict to cyberspace, individuals, organisations, and governments beyond the borders of the two countries can also end up getting caught in the crossfire.

According to the Singapore Cybersecurity Agency (CSA), the participation of non-state actors in targeting digital infrastructure increases the risk of broadening and escalating the conflict. The CSA has documented how these private individuals and groups have taken part in the conflict on either side.

With other governments having launched cyberattacks against individuals and companies in the past, there is a risk that companies, other organisations, and entire countries could be indiscriminately targeted in retaliation. Cybercriminals using the conflict as a pretext for their activities pose an additional threat.

Better protection with NDR

Due to this, the CSA has issued guidelines to strengthen a company's cybersecurity posture. The recommendations include:

  • Enabling multi-factor authentication for all remote and administrative access to systems
  • Downloading the latest patches of their cybersecurity solutions
  • Updating all systems, applications, and software
  • Closely monitoring network traffic for suspicious communications and data transmissions.

 The last point is noteworthy considering how log-based and agent-based solutions create visibility gaps in a company's digital infrastructure which can be exploited by threat actors. These result in longer "dwell times" before the threat is discovered, increasing the likelihood of damage to valuable assets.

In comparison, network detection and response (NDR) solutions achieve full visibility throughout a company's entire digital infrastructure. Threats are unable to exploit visibility gaps because data traffic is monitored, not individual assets within the infrastructure.

Best-in-class NDR systems utilise machine learning and AI to continuously identify normal behaviour within systems and flag suspicious activity in real time. Together, these features enable users to detect faster threat detection by up to 50%, as well as faster threat resolution by up to 86%.

 IT and business must work together

However, as geopolitical tensions continue, it has never been more important for organisations to foster better collaboration between IT and the rest of the business, with the constant communication, and a two-way process.

Senior managers need to ensure that the importance of strong cybersecurity is understood across the board. IT security teams need to be given full support and the level of resourcing they require to effectively carry out their roles.

Senior managers must achieve full visibility in the following key areas to support and empower their IT security teams:

  1. The organisation's existing security posture:

Many businesses have governance structures that require periodic reporting but having a picture of their existing security posture at the granular level will enable them to fully support their security teams.
By being briefed on their organisation's strengths, weaknesses, and plans to address the latter, executives can provide IT with the resources it needs to withstand cyberattacks.

  1. The organisation's planned responses:

Executive leadership teams should also be fully briefed on their incident response, crisis management, and business continuity plans.
A full understanding of employee roles at all levels will enable leaders to minimise operational disruptions if an attack takes place. Incident response plans should also include assessments of each department's response readiness and be made available for the full executive team.

  1. The organisation's entire security infrastructure:

Other aspects that require full visibility on the part of senior managers are:

  1. Policies regarding security software updates. Patches and updates should be deployed as soon, especially in the Asia Pacific (APAC) region where 54% of organisations have last updated their cybersecurity infrastructure two years ago.
    Worse, 20% have last done so three years ago. Up-to-date software is a key pillar in any security strategy.
  2. How frequently critical systems and data are backed up, how quickly the former can be restored in the event of an attack, and measure to protect backups from compromise.
  3. Which identity management (IM) and multifactor authentication (MFA) tools and processes are being used, and their levels of operational readiness.
  4. How the organisation monitors, manages and protects endpoints: traditional ones such as servers and PCs, as well as Internet of Things (IoT) and mobile devices.
  5. Risk management strategies for organisations that use public-cloud applications and infrastructure.
  6. Security teams' effectiveness levels in detecting, addressing, and investigating potential cyberattacks.

Remember the wider security ecosystem

As senior executives undertake this thorough communication with their IT teams, they should also remember there is a wider ecosystem of parties involved in achieving effective security.

This includes systems integrators, managed services providers, channel partners, and technology vendors. Each brings a different element to the mix and all play an important role in ensuring security is as robust as possible.

As businesses turn to multi and hybrid-cloud solutions at increasing levels, the attack surface for cybercriminals and the potential damage they can inflict on organisations also increases.

Business leaders should achieve full visibility of their organisations' entire security posture and infrastructure as soon as possible and implement preventative steps to avoid significant disruption and damage in the future.

Related:  Security strategies among SEA businesses could be better
Tags: ExtraHopidentity managementmulti-factor authenticationNDR
Chris Thomas

Chris Thomas

Chris Thomas has over 20 years of experience in the Cybersecurity industry with roles in frontline incident response, technical sales engineering, and professional services including architecture and implementation consulting. As an incident response consultant Thomas actively utilised Network Forensics and Endpoint Detection and Response (EDR) tools to perform investigations into ransomware and APT-based intrusions. As senior security advisor, APJ in ExtraHop, he helps customers and partners across the region realise the benefits of visibility, detection, and response provided by the ExtraHop Reveal(x) platform.

No Result
View All Result

Recent Posts

  • Experts warn against AI-powered deepfake impersonation scams
  • Dropbox updates universal search and knowledge management product
  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe