How does activereach address Gartner’s key cyber predictions for 2022/23?

The ability to manage cyber risk is key and with regulations on the response to ransomware likely to affect a third of the world within the next 3 years tech analyst Gartner say business leaders should build the following predictions into their security strategies for the next two years.

Read on for details of how activereach can help you specify the right security tooling to support your cybersecurity strategy now and into the future.

“Through 2023, government regulations requiring organizations to provide consumer privacy rights will cover 5 billion citizens and more than 70% of global GDP”. Gartner recommends that organisations track subject rights request metrics, including cost per request and time to fulfil, to identify inefficiencies and justify accelerated automation.

activereach, together with Information Security Management System providers ISMS.Online, can help you maintain and monitor compliance with GDPR and ISO 27001 – including privacy impact assessments and subject access rights requests. Keeping track of all work and actions, including your planning and any mistakes or errors that occur, is an essential part of GDPR compliance. Integrating your GDPR work into a wider information security management system will make that much easier for you. Also, if you provide your staff with a clear work-flow to follow where they can keep track of their work, you are more likely to succeed.

“By 2025, 80% of enterprises will adopt a strategy to unify web, cloud services and private application access from a single vendor’s SSE platform” Gartner says with a hybrid workforce and data everywhere accessible by everything, vendors are offering an integrated security service edge (SSE) solution to deliver consistent and simple web, private access and SaaS application security. Single-vendor solutions provide significant operational efficiency and security effectiveness compared with best-of-breed solutions, including tighter integration, fewer consoles to use, and fewer locations where data must be decrypted, inspected and re-encrypted.

activereach, together with Netskope, helps you reduce risk, accelerate performance, and provide unrivalled visibility into any cloud, web, and private application activity. To empower safe collaboration, we balance trust against risk with granular controls that adapt to changes in your environment. Netskope SSE protects against advanced and cloud-enabled threats and safeguards data across all vectors (any cloud, any app, any user). A single-pass architecture delivers a fast user experience and simplified operations. Netskope has recently been named a Leader in Gartner’s inaugural Magic Quadrant for Security Service Edge (SSE). For more information also read our Blog “Understanding Security Service Edge (SSE) and SASE”.

“60% of organizations will embrace Zero Trust as a starting point for security by 2025. More than half will fail to realize the benefits”.  As Gartner says, Zero trust is both a security principle and an organisational vision, it requires a cultural shift and clear communication that ties it to business outcomes to achieve the benefits.

activereach, together with Guardicore, support IT teams in implementing Zero Trust with the support of four high level principles. Together, they create an environment where you are best-placed to glean the benefits of Zero Trust. These are 1) A least privilege access strategy 2) Secure access to all resources 3) Access control at all levels 4) Audit everything. With a Zero Trust model that starts with deep visibility, you can automatically identify all resources across all environments, at both the application and network level. At this point, you can work out what you need to enforce, turning to technology once you know what you’re looking to build as a strategy for your business.

“By 2025, 60% of organizations will use cybersecurity risk as a primary determinant in conducting third-party transactions and business engagements” Gartner believes organisations will start to mandate cybersecurity risk as a significant determinant when conducting business with third parties, ranging from simple monitoring of a critical technology supplier to complex due diligence for mergers and acquisitions.

activereach, together with ISMS.Online, can help you address risk in the supply chain. You might already have a process for managing your supply chain, but it might currently sit outside of your management system as it can be difficult to integrate. ISMS.Online has built a management system that works for you, making it easy to integrate your supply chain and therefore evidence that your suppliers agree to your cybersecurity policies, all in one place. This enables you to demonstrate your security stance to suppliers and ensure that they work to the same processes within your management system. Not only does this make things easier for you and your suppliers it also ensures your other stakeholders are kept informed – without the need for any extra work.

“Through 2025, 30% of nation states will pass legislation that regulates ransomware payments, fines and negotiations, up from less than 1% in 2021” The decision to pay the ransom or not is a business-level decision, not a security one. Gartner recommends engaging a professional incident response team as well as law enforcement and any regulatory body before negotiating.

activereach, together with MDR and incident response providers Crowdstrike and eSentire, are able to offer the world’s fastest threat suppression, including mean time to respond (MTTR) to ransomware. Enterprises can stop attackers in their tracks with eSentire’s breakthrough 4-hour remote threat suppression commitment. In our opinion, no one moves faster to contain an incident and bring your business back to standard operation. eSentire’s Digital Forensics & Incident Response services are available for On-Demand 24/7 Incident Response as a retainer offering, or for Emergency Incident Response support. See our Blogs “Seven Key Ingredients of Incident Response to Reduce the Time and Cost of Recovery” and  ” XDR: Separating Truth from “We Do That Too”

“By 2025, threat actors will have weaponized operational technology (OT) environments successfully to cause human casualties” Attacks on operational environments are becoming more frequent and hazardous. Security and risk management leaders should be more concerned about real world hazards to humans and the environment, rather than information theft, according to Gartner.

activereach together with Mission Secure, a Gartner Cool Vendor and OT cybersecurity leader are setting a new standard in OT cyber-protection. Delivering military strength, industrial grade operational technology (OT) protection, Mission Secure safeguards industrial control systems (ICS), supervisory control and data acquisition (SCADA), distributed control system (DCS), cyber-physical systems (CPS), industrial internet of things (IIoT), and more. With Mission Secure, customers keep critical operations up and running and safe from harm. The Mission Secure Platform, backed by 24/7 expert Managed Services, is the first to seamlessly integrate OT visibility, segmentation, protection, threat hunting, and incident response, down to Purdue Levels 1 and 0. Mission Secure is the only vendor in the market to offer this level of OT network protection and process validation. Download the activereach + Mission Secure Operational Technology (OT) Cybersecurity eBook

“By 2025, 70% of CEOs will mandate a culture of organizational resilience to survive coinciding threats from cybercrime, severe weather events, civil unrest and political instabilities” The recent Pandemic exposed the inability of traditional business continuity management planning to support the organisation’s response to a large-scale disruption. Gartner suggests this disruption is likely to continue and that risk leaders recognise organisational resilience as a strategic imperative and build an organisation-wide resilience strategy that also engages staff, stakeholders, customers and suppliers.

activereach, together with security testing, red teaming and breach attack simulation partners Cymulate, can help you maintain a proactive security posture. The first step to hardening your security posture is to understand exactly how easy or, hopefully, how difficult it is for cyber attackers to gain an initial foothold into your infrastructure and progress laterally and vertically once they are in. Security gaps that weaken your security posture hide in several places, from unmonitored shadow IT to poorly configured security controls. Instead of adding more detection tools that increase complexity and false positives and completely ignore unmonitored exposed assets, it is far more efficient to continuously check the comprehensiveness of your defensive array and the performance of its security controls. See our Blog “How Do You Harden Security Posture With A Shrinking Security Budget?”

“By 2026, 50% of C-level executives will have performance requirements related to risk built into their employment contracts” Gartner expects to see a shift in formal accountability for the treatment of cyber risks from the security leader to senior business leaders as most boards now regard cybersecurity as a business risk rather than solely a technical IT problem,

How can activereach help?

activereach’s end-to-end portfolio of network security solutions can protect your business from advancing threats, enhance network performance, and optimise operational efficiencies. Our independent consultative approach helps organisations maximise business value from their technology investments, providing a platform for businesses to grow, reinvent and transform. To book a security assessment and to discuss our best-of-breed portfolio, call 0845 625 9025.