Intelligent CISO Issue 51 | Page 75

drive even smarter and more insidious ransomware attacks as we look at the next six months .
Attack automation and Fraud-as-a-Service
More attacks are now automated and various attack styles are available for download or even as a service . Some threat actors have started monetising their fraudulent exploits by turning them into a cloud service that cybercriminals can simply subscribe to . These can even include AI-style features such as voice bots which impersonate businesses and embark on social engineering exploits in robotic fashion .
Organisations and workers attack surface is growing as networks expand
As organisations ’ networks expand and applications and devices increase , pushed by the rise in hybrid work policies , the attack surface likewise grows . The Internet of Things , cloud applications , digital supply chains , opensource code and even social media are bringing organisations ’ attack surfaces outside of a set of controllable assets .
More people are now security decision-makers , leading to a radical decentralisation of security-based decision-making
In an attempt to bring more digital assets under control , we ’ re seeing specific departments take control over their IT and by extension security decisions . These decisions are often carried out without any consultation with IT departments , leading to a growing decentralisation of security-based decision making . This prompts a change in the role of the CISO to a higher level and more strategic posts , as well as a www . intelligentciso . com
75