Global Cyberattacks on the Rise: A Growing Concern for Businesses
As the digital landscape continues to evolve at an unprecedented pace, global cyberattacks have become an increasingly pressing issue. According to a recent report by Check Point, cyberattacks have risen sharply in the last few years, with a 38% increase in 2022 alone. Combine this with the soaring cost of a data breach, averaging $9.44 million in the US and $4.25 million globally in 2022, and it becomes evident that preventing cyberattacks is at the top of everyone’s mind going into 2024.
NIST’s Updated Cybersecurity Framework 2.0: A Step Towards Mitigating Cyber Risk
In early August, the National Institute of Standards and Technology (NIST) released an update to its renowned Cybersecurity Framework (CSF). Known as CSF 2.0, this new draft reflects NIST’s inclusive and responsive attitude towards risk management in the face of growing cyber threats. The framework incorporates feedback from Fortune 500 companies, which are on the front lines of cyberattacks, making it a gold standard for building a cybersecurity program and reducing cyber-risk.
CSF 2.0 highlights four major themes that have direct business impacts on managing risk:
Emphasize Continuous and Quantitative Risk Assessment
Underpinning a robust cybersecurity program is the cornerstone of continuous risk assessment. Regularly conducting cyber-risk assessments enables organizations to understand their most critical IT assets, the threats affecting them, security weaknesses, and the likelihood of these weaknesses being exploited. The Cybersecurity and Infrastructure Security Agency (CISA) recommends organizations to conduct these assessments regularly to improve cyber resiliency and meet cyber insurance requirements.
To keep up with the sheer volume of risks in near real-time, organizations must embrace automation and artificial intelligence (AI)-based tools. These tools allow enterprises to discover assets, prioritize vulnerabilities, and define the likelihood and potential impact of risks, even as the attack surface evolves. It is important to note that as bad actors increasingly exploit AI for malicious purposes, organizations must also learn to leverage AI for positive cybersecurity outcomes.
However, implementing a continuous risk assessment process requires investments and buy-in from all departments within an organization. It should be viewed as a means to leverage data effectively and enhance overall security posture.
Prioritize Continuous Improvement
Creating a culture of continuous improvement is essential in cybersecurity. It goes beyond implementing incremental category or subcategory recommendations from NIST, emphasizing the need for a holistic approach to risk management. Cybersecurity is an ever-evolving field, and constant adaptation and improvement are necessary to stay ahead of emerging threats.
NIST’s updated draft introduces a new Improvement category within the Identify function. The draft also includes updates to the definitions of implementation tiers and considers factors such as cybersecurity risk management, governance, and third-party risks. These additions showcase NIST’s commitment to a comprehensive and proactive approach to managing risk.
Strengthen Supply Chain Risk Management
Supply chain attacks have become a focal point for cybercriminals in recent years, highlighted by incidents like the SolarWinds attack and the Log4j exploitation. The potential impact of supply chain attacks is alarming, with Gartner predicting that 45% of global organizations will be affected by them by 2025. One major vulnerability lies in organizations’ ability to create a software bill of materials (SBOM) for their in-use applications.
In the updated draft, NIST addresses supply chain risk management by emphasizing the need for agility and accuracy. The framework suggests that organizations contractually require suppliers to provide and maintain a component inventory, which essentially functions as an SBOM. To protect against attacks that may disrupt critical operations, precision and attention to supply chain risk management are crucial.
Enhance Implementation Examples
In its initial draft, the NIST framework provided some suggested implementation examples, but lacked sufficient detail. Feedback from the cybersecurity community emphasized the need for more practical application examples. Understanding this demand, NIST added additional examples in the updated draft, empowering organizations seeking cybersecurity guidance to apply best practices outlined in the framework.
By incorporating additional implementation angles, NIST demonstrates its commitment to creating a functional, real-world, and responsive cybersecurity management process. Given the increasing complexity of the cybersecurity landscape, tools harnessing automation and AI that offer a unified view become critical to the successful implementation of cybersecurity measures.
Advice for Chief Information Security Officers (CISOs)
CISOs play a pivotal role in securing their organizations and reducing cybersecurity risk. In light of the evolving cyber threat landscape, CISOs should keep the following principles in mind:
- Emphasize continuous and quantitative risk assessment to understand critical assets, threats, and vulnerabilities.
- Create a culture of continuous improvement by constantly adapting and improving security measures.
- Strengthen supply chain risk management by maintaining an SBOM and prioritizing accuracy and agility.
- Refer to the NIST framework for guidance and utilize the enhanced implementation examples to implement best practices.
Furthermore, CISOs should invest in automated and AI-powered tools that provide a unified view of the cybersecurity landscape. These tools can aid in discovering assets, prioritizing vulnerabilities, and better aligning organizations with the dynamic nature of cyber threats in 2024 and beyond.
Cybersecurity is no longer just a technical issue; it is a strategic imperative for organizations worldwide. The collaboration between industry leaders and cybersecurity professionals, as exemplified by NIST’s CSF 2.0, is crucial in combating the growing threat of cyberattacks and protecting vital digital assets.
<< photo by Anna Shvets >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- Is the US Government’s Security Guidance for Open Source Software in OT, ICS Effective Enough?
Title: Evaluating the Effectiveness of US Government’s Security Guidance for Open Source Software in OT, ICS
- Exploring the Importance of US Government’s Security Guidance for Open Source Software in OT, ICS
Title: Safeguarding Critical Infrastructure: US Government Champions Security Guidance for Open Source Software in OT, ICS
- “The Rising Threat of Cybercrime: Air Europa’s Breach Highlights Vulnerability of Payment Card Data”
- Reevaluating Risk Management: Unpacking the Significance of NIST Framework 2.0
- The Evolving Landscape of Car Cybersecurity: A Promising Decade of Decreasing Critical Vulnerabilities
- The Evolving Landscape of AI in Software Development
- The Evolving Landscape of Cloud Security: Exploring the Projected $62.9B Market by 2028