BACK
  • Series
    • CEO on the Spot
    • Three-minute explainer
    • Corporate Comebacks
    • CEO Index
    • Skills for tomorrowSponsored by AWS
    • Influencer success hubSponsored by Klear
  • Topics
    • HR
      • Talent
      • Culture
      • Diversity & Inclusion
      • CHRO
    • Business Tech
      • AI / Mastering AI
      • Digital Transformation
      • Cloud
      • Data
      • Cybersecurity
      • CTO
    • Finance
      • Growth
      • Risk
      • Fintech
      • CFO
    • Marketing
      • Brand
      • Advertising
      • CX
      • CMO
    • Leadership
      • C‑Suite
      • CEO
  • Opinion
  • Newsletter
  • Reports
    • The C‑Suite Agenda
    • Special Reports
    • Insights Reports
  • Infographics
  • Services
  • Advertising
  • Careers
  • Contact
Twitter Linkedin Instagram Facebook
Raconteur
NEWSLETTER My account Sign In
  • Human Resources
  • Business Tech
  • Finance
  • Marketing
  • Leadership
Sponsored content
Risk & Regulation

How to manage and mitigate cyber risk in an evolving threat landscape

Share on X
Share on LinkedIn
Share by email
✖
Save in your account
Paid for by

Ran­somware may be fright­en­ing boards, but chief infor­ma­tion secu­ri­ty offi­cers want to be viewed as guide dogs not guard dogs. Large organ­i­sa­tions must use trust­ed third par­ties to extend their secu­ri­ty teams and improve their threat-hunt­ing capa­bil­i­ties

PAID FOR BY

Oliv­er Pick­up
16 Dec 2021

Speak­ers:

Ali­son Dyer, CISO, Ure­n­co Group

Jonathan Hope, senior tech­nol­o­gy evan­ge­list, Sophos

Chris­t­ian Mar­torel­la, CISO, sky­scan­ner

David White­legg, Euro­pean secu­ri­ty offi­cer, Com­pass Group

What does the cyber threat land­scape look like now, and how might this devel­op in the near future?

DW: A num­ber-one con­cern for CISOs is ran­somware. Cyber­crim­i­nals are ever more dili­gent in prepar­ing such attacks, using sophis­ti­cat­ed meth­ods and, in some cas­es, nation-state qual­i­ty hack­ing tools. The pay­ing of ran­soms is also fuelling the threat, from SMEs to large glob­al enter­pris­es, every­one is in the crosshairs.

CM: Ran­somware is not par­tic­u­lar­ly new – organ­ised crime gangs have used mal­ware for more than a decade – but it has explod­ed recent­ly. This surge is part­ly because of ran­somware-as-a-ser­vice; even crim­i­nals who don’t know how to code can team up with those who do and divide the spoils. It’s also part­ly thanks to cryp­tocur­ren­cies. Bad actors can stay anony­mous by demand­ing cryp­to pay­ments, which are quick, easy and dif­fi­cult to trace. Reg­u­la­tion and gov­ern­ment actions are tight­en­ing, though, for exam­ple, all cryp­tocur­ren­cy trans­ac­tions have been banned in Chi­na. It will be inter­est­ing to see how ran­somware attacks devel­op there.

AD: The Euro­pean Union’s anti-mon­ey laun­der­ing and ter­ror­ism fund­ing rules will like­ly dri­ve an increase in ran­somware for a cou­ple of years until it comes into force. There are two busi­ness risks here, though. First is busi­ness resilience and con­ti­nu­ity of your IT. The sec­ond is the increase in ran­somware for oper­a­tional tech­nol­o­gy (OT).  When run­ning pro­duc­tion facil­i­ties which are part of crit­i­cal nation­al infra­struc­ture – you don’t want to be hit by ran­somware. Artic­u­lat­ing the risk and get­ting the mes­sage heard in the board­room is eas­i­er the big­ger your risk. Some­one once told me they had ‘risk envy’ because I have such a com­pelling case.

JH: Accord­ing to Sophos’ recent State of Ran­somware 2021 sur­vey, ran­somware is down­ward. In 2020, we saw 37% of glob­al respon­dents hit by ran­somware, and the year before, it was 51%. How­ev­er, while the per­cent­age went down, the recov­ery cost more than dou­bled. That’s because crim­i­nals are being more selec­tive about who they attack and get­ting bet­ter at siz­ing up their vic­tims; even work­ing out where CEOs’ kids go to school and where they play golf so that they can trick them more con­vinc­ing­ly than the usu­al phish­ing email. Thank­ful­ly, the indus­try is now bet­ter at work­ing out poten­tial rep­u­ta­tion­al dam­age, which means the board can under­stand the risk rather than it being intan­gi­ble.

What is state-of-the-art in threat hunt­ing, and how fea­si­ble is it in large organ­i­sa­tions?

JH: The fes­tive sea­son is usu­al­ly a good time for cyber­crim­i­nals to strike, as they know even the largest organ­i­sa­tions will not have their IT depart­ments at full strength. Today, it’s essen­tial to keep on top of cyber­se­cu­ri­ty at all times. This need for round-the-clock pro­tec­tion is one rea­son we’ve seen many busi­ness­es opt for out­sourced help, specif­i­cal­ly a man­aged ser­vice that cov­ers them 24 hours a day, 365 days a year. We had a cus­tomer call us on Christ­mas Day to be reas­sured some­one was watch­ing the busi­ness for them.

DW: Large enter­pris­es can use economies of scale to cen­tralise and focus their secu­ri­ty efforts, such as using a secu­ri­ty oper­a­tions cen­tre (SOC) to enable effec­tive threat hunt­ing across their entire IT estate. While the vol­ume of mon­i­tor­ing data col­lect­ed is stag­ger­ing, arti­fi­cial intel­li­gence is increas­ing­ly used to pro­vide real-time analy­sis, lead­ing to the faster detec­tion and con­tain­ment of inci­dents. Trust­ed third-par­ty part­ner­ships are also impor­tant, but giv­en a finite bud­get to spend on the cyber defence, a good under­stand­ing of the threat land­scape is essen­tial when select­ing part­ners, to max­imise all secu­ri­ty con­trols effec­tive­ness at the best val­ue.

Dri­ving a cul­ture of cyber­se­cu­ri­ty is eas­i­er when peo­ple see you as enablers. We are aim­ing to be guide dogs, not guard dogs

CM: Even at a large organ­i­sa­tion, you might not always have the skills in-house to keep on top of threat hunt­ing at all times. The main chal­lenge for any organ­i­sa­tion is hav­ing skilled indi­vid­u­als with a cer­tain mind­set, and right now there are not many in the mar­ket. Per­son­al­ly, a man­aged ser­vice for threat hunt­ing is the way to go in the future. There also needs to be improved infra­struc­ture because you need high per­for­mance to move and process data; if you have to man­age that in-house, then costs could be pro­hib­i­tive.

AD: When it comes to out­sourc­ing SOC capa­bil­i­ties, par­tic­u­lar­ly threat hunt­ing, I think it’s vital that you go back to the first prin­ci­ples. Because you can out­source the ser­vices, but a breach will still cause rep­u­ta­tion­al dam­age to your busi­ness, and as much as you’re out­sourc­ing the ser­vices, you can­not out­source respon­si­bil­i­ty. It’s impor­tant that when you’re con­sid­er­ing an out­sourc­ing part­ner, you have to think of that team as an exten­sion of your own team. Do they have the same val­ues that you need for your com­pa­ny to pro­tect it from a rep­u­ta­tion dam­age per­spec­tive?

What is the best prac­tice for cyber­at­tack inci­dent response plan­ning and exe­cu­tion?

DW: The old Mike Tyson quo­ta­tion, “every­one has a plan until they get punched in the mouth” comes to mind, while techies love play­books, noth­ing focus­es the mind more than deal­ing with a cri­sis sce­nario. Con­duct­ing desk­top inci­dent response exer­cis­es are an effec­tive method to help busi­ness­es pre­pare for cyber­at­tacks, but it’s cru­cial to involve all busi­ness func­tions – not just IT.  A bonus out­come of such exer­cis­es is improv­ing the busi­ness lead­er­ship under­stand­ing of the poten­tial busi­ness impact of a major cyber­at­tack

CM: I agree that for cri­sis man­age­ment to work, every­one needs to be involved, includ­ing the pub­lic rela­tions team, which must com­mu­ni­cate exter­nal­ly. You need to know who does what, the chain of com­mand, and the role for all the key stake­hold­ers. There are so many things that under pres­sure could go wrong. That’s why you need to per­form sim­u­la­tions and table­top exer­cis­es to test your plans and ensure that every­one knows to do their part. And these exer­cis­es need to hap­pen reg­u­lar­ly, and the play­book should be updat­ed all the time because change is hap­pen­ing quick­ly.

AD: Prac­tice cer­tain­ly makes per­fect. You can’t plan for every sce­nario, though, because you don’t exact­ly know what the attack is going to be, where it will hap­pen, how fast it’s going to go. But if you have done the prop­er prepa­ra­tion and are clear on the deci­sion rights, roles, and respon­si­bil­i­ties, then as a CISO, you are doing your job. Dri­ving a cul­ture of cyber­se­cu­ri­ty is eas­i­er when peo­ple see you as enablers. So we are aim­ing to be guide dogs, not guard dogs.

JH: You can look at your users in one of two ways: either con­sid­er them to be your worst ene­mies, because these are the peo­ple that click on the links and inter­act with the mal­ware in the wrong way; or con­sid­er them your best friends – if you empow­er them they will be able to recog­nise what’s phish­ing and what’s ran­somware and not inter­act with it in the wrong way, so they actu­al­ly become an exten­sion of your secu­ri­ty team. Ulti­mate­ly, the best organ­i­sa­tions are the ones that have great inter­nal com­mu­ni­ca­tions.

To find out more, please vis­it sophos.com


Ransomware may be frightening boards, but chief information security officers want to be viewed as guide dogs not guard dogs. Large organisations must use trusted third parties to extend their security teams and improve their threat-hunting capabilities

Speakers:

Alison Dyer, CISO, Urenco Group

Commercial featureRisk & RegulationCybersecurityRoundtable

Want to read on?

Simply sign in or register to continue.
Registration is free and takes seconds.
Register

Subscribe to our newsletter

Gain access to our extended article trial, and receive the latest insights direct to your inbox.
  • About us
  • Contact us
  • Write for us
  • Work for us
  • Advertise with us
  • Partner with us
  • Cookie Policy
  • Privacy Policy
  • Terms & Conditions

Subscribe

Raconteur

© Copyright 2025 Raconteur. All rights reserved.