Intelligent CISO Issue 58 | Page 67

decrypting myths

Vectra ’ s 2023 predictions warn more collaboration is needed to prevent supply chain attacks

Christian Borst , EMEA CTO at Vectra AI , and Brian Neuhaus ,
CTO , Americas at Vectra AI , have outlined a range of trends they believe will have a big impact on the cybersecurity industry over the course of the year . ectra AI , a leader

V in security AIdriven hybrid cloud threat detection and response , has released its predictions for 2023 , revealing the emerging trends that will shape cybersecurity this year and how to adapt .

Christian Borst , EMEA CTO at Vectra AI , said : “ Organisations will face more unknown cyberthreats targeting onpremises systems , cloud infrastructure and SaaS applications . The skills shortage is worsening too , causing analysts to becoming overloaded and burnt-out . Combined , this is creating a perfect storm , leaving organisations more vulnerable to a breach .
“ Organisations must adopt an effective detection and response strategy that reduces the burden on analysts , prioritising the most high-risk alerts . This means using tools that can identify the suspicious behaviours that an adversary will exhibit as part of an unfolding attack , flagging up these signals so organisations can stop an attack before it becomes a breach .”
Supply chain attacks will continue but hackers will look beyond the ‘ usual suspects ’ to cause havoc : Attackers will continue to cause maximum disruption in the form of supply chain attacks , but instead of targeting key suppliers , they will look beyond the ‘ usual suspects ’ to gain access into networks .
For instance , this could include legal or accounting firms . A holistic approach may help turn the tables on the matter : supply chain means partnership – partnership means collaboration and supporting each other . Only as a ‘ mesh ’ interconnected structure with consistent resiliency can companies thrive in the digital economy . This includes ensuring that they review the security policies of all those in the chain .
Organisations will use automation to recover from ransomware attacks : Traditional restoration procedures following a ransomware attack are both costly and time consuming for www . intelligentciso . com
67