CISOs Weigh In: Detection Across Attack Surfaces Is their Top Priority
Attivo Networks Blogs

CISOs Weigh In: Detection Across Attack Surfaces Is their Top Priority

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – Earlier this year, we worked with SINC to conduct a study on the state of cybersecurity in the United States today. The research focused on companies with over 1,000 employees and over $25 million in annual sales, and respondents were CISOs, CIOs, Cybersecurity Directors, and other high-level security executives within a wide range of industries such as legal, education, entertainment, and healthcare. Our goal was to learn about the highest priority concerns for these executives, how they prioritize and evaluate their activities, and what tools and resources they employ.

New Attack Methods Call for New Detection Tools

The study revealed that detection across a wide range of attack surfaces clearly remains a high priority for security executives, and cloud security continues to be top of mind. The reason for this—at least in part—is because of the shared nature of cloud security. It can often be a challenge to understand where the protections afforded by the cloud provider end and where the customer’s responsibility begins. The fact that many organizations now operate in a multi-cloud environment exacerbates this problem, necessitating a full understanding of each cloud provider’s often vastly different security procedures and processes. It is no surprise that as organizations move more business processes to the cloud, the primary concerns for security executives continue to be denial-of-service attacks and ransomware disruptions.

The primary security approach has long been IDS/IPS, and organizations continue to rely heavily on those tools. However, organizations are increasingly adopting EPP/EDR tools as they look for new ways to add detection coverage and explore multi-use security tools. Adding EDR to EPP will increase detection efficacy, but there will still be coverage gaps as attackers employ different attack vectors across multiple attack surfaces.

Organizations looking for more comprehensive detection are increasingly adding deception technology to their security stack. As attack methods have become more varied, cyber deception has emerged as the most effective way to quickly and efficiently detect the lateral movement of intruders across a wide range of attack surfaces and vectors. Deception has become an integral part of any comprehensive threat detection strategy, and the faster triage and response that it enables makes it a powerful complement to EPP/EDR, IPS/IDS, and other cloud security controls. SINC’s research indicated that security executives are highly focused on business continuity and service availability, prioritizing those solutions that can keep their operations running smoothly. Emphasis is placed on accurate detection, making a combination of reliable perimeter and in-network detection tools essential.

The New Normal, and What the Future Holds

It feels almost cliché to say at this point, but we are living in unprecedented times. The COVID-19 pandemic has forced millions of workers around the world to operate remotely, and security managers have had to adapt rapidly to cover a growing number of endpoints, credentials, and cloud environments. As organizations continue to adjust to this new normal, securing the remote communication channels (VPNs) that enable this shift to remote work will continue to be a high priority for security teams well into the future. Similar emphasis will likely be placed on cloud security, as well as identifying the new threat vectors likely to arise as cybercriminals look to exploit shared security models and this new way of working.

Where most see disaster, cybercriminals see opportunity—something made evident by the fact that even hospitals and pharmaceutical companies researching vaccines have not been immune from cyberattacks during the current pandemic. Although COVID-19 had been a significant disruption for almost every organization, security teams now have access to better tools than they have ever had before. It is more critical now than ever for security leaders to adjust their protection, detection, and recovery strategies to fortify their defenses as they settle into the new normal.

Download “The Cybersecurity Landscape” at https://go.attivonetworks.com/Cybersecurity-Landscape-Report-SINC_Registration.html.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Leave a Comment

Your email address will not be published. Required fields are marked *

three + 3 =

Ready to find out what’s lurking in your network?

Scroll to Top