- The Splunk RSSI report presents the security team reflections for 2024
- The report details the increase in Genai in cyberfense and cyber attacks
- There is a notable gap between the reflections of the members of the board of directors and those of security experts.
The rise of generative AI (GENAI) in cybersecurity continues, with more than half (52 %) of RSSIs giving priority to innovation with emerging technologies, although only a third (33 %) Members of the board of directors agree, according to a new study.
The latest Splunk Ciso report presents the priorities and opinions of professionals in the sector, noting how much the cyber landscape evolves rapidly, but 41 % of security managers said that the requirements are easier and easier to meet, despite the ‘increased efficiency and frequency of cyber attacks.
Genai is used to protect companies against attackers’ threats, and RSSI use AI to identify risks (39 %), analyze threat information (39 %) and detect and prioritize threats (35 %), as well as to define the priorities of RSSIs. , This is what we know.
Play on both sides
It is not a secret for anyone that Genai becomes an integral part of cybersecurity, both on the defensive and offensive side, attackers using technology for various ends, in particular to make existing attacks more effective (32 %), by increasing the Volume of existing attacks (28 %), and creating new types of cybermenaces (23 %).
The report illustrates a gap between the RSSIs and the members of the boards of directors, not only in terms of attitudes, but also in terms of allocation, with only 29 % of RSSIs believing that they have an adequate budget for Protect their business, against 41 % of the boards of directors estimating that their budgets are insufficient. enough. This manifests itself as a serious risk factor, since almost two thirds (64 %) of RSSI associate the lack of support for the cyberattacs of which they are victims.
This is not the first report referring to a gap between the two, many RSSIs having the feeling of not obtaining the appropriate level of respect on the part of their board of directors, the members of the board of directors Minimizing the severity of the attacks and accusing the RSSI of being “too negative”.
But there are undoubtedly reasons to worry. Although AI is used in cyberprotection, it also makes cyber attacks even smarter and more dangerous, which happens to the list of RSSI concerns, with 36 % of them declaring that attacks based on the The main concern, followed by cyberxtory (24 %) and data violations (23 %).
“Individual employees play an essential role in data protection. Phishing scams and internal threats are becoming more and more sophisticated. Whether it is a large or a small business, education and awareness of all departments must be superimposed on AI -based technologies that detect threats, “said Greg Clark, director of the Product management, data security, OpenText Cybersecurity.
The shortage of skills also continues to be a critical problem in the field of technology, but 86 % of those questioned think that AI can help recruit more beginner talents to fill the current deficit in cybersecurity skills, and 65 % also believe that AI “will allow experienced security professionals to be more productive”.
The vast majority of security experts combine with compliance and law teams to intensify training, 91 % of them increasing safety training for legal and compliance workers, and 90 % providing legal training and compliance with safety professionals. The sector therefore takes measures to cover all aspects. bases.
Attack prevention
Cyberattack prevention is really the daily bread of cybersecurity teams, but if you start in a small business or if you want to be ultra safe, here are some tips for maintaining cyber-hygiene.
First of all, and this is probably the most important, strong passwords and multifactor authentication (MFA). About 80 % of data violations come from a bad security of passwords, which is therefore really crucial. Make sure that all business passwords are complex, varied and as long as possible while remaining memorable.
Implement password managers and authentication software to ensure that employee passwords are secure and make sure that a solid password policy is in place so that all workers include criteria solid identification and their importance.
Regular and complete training in cybersecurity for all employees is essential to allow your organization to recognize and mitigate potential threats. This should focus on employee training in risk management and security controls, such as antivirus software and firewalls, as well as cybersecurity executives on the company’s scale.
The evaluation of vulnerabilities of third -party suppliers is increasingly important. Companies and organizations are inevitably connected and it is practically impossible for companies to operate without using third -party software suppliers.
As impenetrable as your cybersecurity is, an attack on a third party can expose you, as illustrated by the “major incident” of the American Treasury, a cyber attack emanating from a compromise third party.
We know that the budgets are tight and that cybersecurity is not always a priority, but ransomware attacks can easily cost millions to an organization and can have repercussions on customer and business partners, as well as harm to reputation. Sure practices are therefore recommended. A profitable investment.