Intelligent CISO Issue 58 | Page 68

Attackers are continuing to breach the castle walls , creating fatigue and eventual resignations among cybersecurity professionals . advantage , either by flooding end-users with requests to brute-force their way in , or by skilled phishing campaigns . Endusers will be the ones directly targeted by attackers . This means not just organisations , but also consumers will need to be more aware than ever of the risks to their digital identities . Meanwhile , organisations must ensure they have tools in place to detect suspicious login activity and stop it in its tracks .
decrypting myths organisations ; this is why in 2023 we will see organisations look to automation , via Infrastructure as Code ( IaC ), to reduce downtime . Through IaC , organisations can develop scripts that enable key infrastructure to self-heal so they can automatically return to action . Ultimately rebuilding broken infrastructure from scratch is a far quicker process than restoring as a result of automation .
Increased analyst fatigue and resignation will see the tides turn away from protecting the castle walls to detection and response : Attackers are continuing to breach the castle walls , creating fatigue and eventual resignations among cybersecurity professionals . Instead of working on preventing these attacks from happening and to prevent employee burnout , we will see a needed shift to focus on reducing the impact of an attack . This means building resilience within the organisation covering people , process and technology and focusing on early detection and sound response as opposed to protection and prevention .
Multi-Factor Authentication ( MFA ) will continue to be a prime target for attackers : With identity attacks on the rise , attackers will continue to take advantage of vulnerable MFA methods . As companies continue to rollout MFA , attackers will continue to take

Attackers are continuing to breach the castle walls , creating fatigue and eventual resignations among cybersecurity professionals . advantage , either by flooding end-users with requests to brute-force their way in , or by skilled phishing campaigns . Endusers will be the ones directly targeted by attackers . This means not just organisations , but also consumers will need to be more aware than ever of the risks to their digital identities . Meanwhile , organisations must ensure they have tools in place to detect suspicious login activity and stop it in its tracks .

Attackers will begin to steal and keep encrypted data to decrypt in a postquantum world : Advances in Quantum Computing will force the hand of security leaders in 2023 to start thinking about this sensitive encrypted data in a postquantum world . However , this approach will also grab the attention of attackers and instead of bypassing encrypted data that was previously safeguarded , they will attempt to grab the data and keep it stored for sale or to be later decrypted . Defenders should not rest on the laurels of encryption and start to take note of what NIST is doing in post-quantum encryption for action in the coming years .
As the war for talent increases , security companies will need to develop creative ways to recruit and retain workers : As an industry that is no stranger to burnout and stress , cybersecurity companies will have to ensure they can demonstrate they are an attractive outfit to work for . This is in order to fend off competition from
68 www . intelligentciso . com