Page 63 - SAMENA Trends - July-August 2023
P. 63

ARTICLE  SAMENA TRENDS

          perimeter.  This approach minimizes   offering a comprehensive view of the   of improper privileges  on organizations
          lateral movement and potential damage   attack chain for better threat detection.   resources and assets.
          from cyber incidents.  Employing  micro-  AI-driven  models,  leveraging  machine
          segmentation  enables  strict  access   learning,  will  identify  patterns  indicative   At  last, we  advise  organizations  to
          controls  within  network  segments,   of cyber threats and suggest adapting to   continuously  assess  the  impact of
          limiting  attackers' reach.  Treating  all   evolving attack techniques.   emerging  technologies  on  cybersecurity
          network objects as potentially malicious   •   Reinforce  authentication  and  by  augmenting  their  threat  intelligence
          and  using  multifactor authentication   authorization:  Reinforcing  identity  capabilities  with  an  emerging  tech
          and identity  and access management   and  access  management  is  crucial   observatory  and  collaborating  with  their
          solutions further enhances security.   in  transformation  context  where  relevant RDI ecosystem to identify ways to
        •   Enhance  detection  and  response  organization are sometimes dealing with   tackle evolving threats.
          capabilities:  Organizations  should  multiple  systems  from several  different
          migrate from traditional signature-based   providers and on different infrastructures.   In summary, organizations should embrace
          threat detection to behavioral-based, AI-  It  is very challenging  to orchestrate   cybersecurity as  a  strategic  asset,  and
          enabled  threat  detection  and  response.   the  identification,  authentication,  and   must proactively address  basics, adopt
          By utilizing one or more of technologies   authorization  across  all  these  systems   advanced  techniques  like  zero-trust
          such as SIEM (Security Information and   in  the  organization  and  intruders  can   principles  or  behavioral  AI-enabled  threat
          Event  Management),  SOAR (Security   take advantage of these complexities to   detection, and continually assess emerging
          Orchestration,  Automation,  and     impersonate real users and gain access   technologies'  impact on cybersecurity
          Response)  or XDR  (Extended  Detection   to systems  and  data  with  sometimes   to ensure secure and  successful digital
          and Response) and combining them with   elevated  privileges.  By  applying  transformations.  These  actions  should
          a cybersecurity data platform enhanced   behavioral and biometric authentication,   be driven by top leadership and boards of
          with  AI capabilities,  organizations  can   organizations  can mitigate  some of   public and private organizations, as well as
          significantly  bolster  their  detection  and   risks  of  intrusion. In  addition, using   from Nation states.
          response capabilities. For example, XDR   authorization  policies  based  on  trust
          can integrate data from multiple sources,   scoring will also help reducing the risks


          1   https://www.telecomreview.com/articles/telecom-operators/2985-stc-projects-that-iot-revenue-to-exceed-7bn-in-saudi-arabia-
          by-2030
          2  https://www.statista.com/statistics/463714/cost-data-breach-by-country-or-region/#:~:text=Among%20the%20examined%20
          countries%20and,was%204.35%20million%20U.S.%20dollars.
          3   https://www.kearney.com/service/digital/article/-/insights/ceo-proactiveness-a-winning-cyber-response-strategy
          4  https://www.kearney.com/service/digital/article/-/insights/cybersecurity-how-to-make-it-pay
          5   Percentage of customers that stopped using organization’s product or service
          6   https://www.kearney.com/service/operations-performance/article/-/insights/it-s-now-or-never-to-get-ahead-of-supply-chain-
          cyber-risk



































                                                                                                  63  JULY-AUGUST 2023
   58   59   60   61   62   63   64   65   66   67   68