Cyber resilience – protect, defend, recover

April 2024 Infrastructure

Kate Mollett.

Data has become a core business asset and protecting this asset from data loss is a strategic priority, especially as new threats are constantly emerging. The escalating sophistication of cyber threats will necessitate advancements in AI-powered data security technologies and strategies, and the ability to defend against the threat, protect critical information and recover rapidly from attack is paramount. In 2024, the ability to recognise and respond to cyber threats quickly will become a competitive differentiator, and companies focusing on cyber resilience – including data protection, security, data intelligence and recovery- will have the upper hand.

New security threats

Cybercriminals are on the attack, leveraging the same advanced tools and AI-driven analysis used to defend and protect data. They are harnessing the discovery of assets and vulnerability analysis across diverse assets to exploit vulnerabilities that maximise impact with minimal effort. This goes so far as to run predictive modelling to understand the degree of impact or discover new parameters and techniques that lead to creating a new emerging threat. The evolution of cyber threats in 2024 will mean that businesses need a new perspective on data protection as a foundation for business continuity.

The role of the Chief Information Security Officer (CISO) is evolving, and there is an increased understanding that cyber resilience is essential. While cybersecurity is vital – securing the perimeter with the correct monitoring and alerts – a strong recovery is an equally critical part of an effective cyber resilience strategy. As we approach a new year, there is increased emphasis on robust asset management, talent acquisition and development, and future planning – all fundamental elements to enhancing cybersecurity.

The burgeoning role of AI

With cybercriminals leveraging AI to advance their attacks, businesses must use the same technology to enhance cyber resilience. From this perspective, AI delivers advanced threat detection and response capabilities with success measured by reduced incident rates and faster recovery times. Thanks to tight, seamless integrations between data security and cybersecurity firms, AI will be used to detect threats earlier and, when necessary, to fight AI-driven threats.

The ever-expanding threat landscape is characterised by a diverse array of assets, and the ability to collect, analyse, and interpret data from these assets and surrounding systems is critical in identifying potential security threats or anomalies. AI will significantly impact this area and deliver quicker response times, better-focused resources, reduced alert fatigue, and more time to focus on effective threat mitigation strategies.

AI and machine learning (ML) will also be used more regularly to identify security gaps and make recommendations to IT and security leaders on reducing risk and complexity in their environments, subsequently reducing exposure to security incidents. Generative AI is in the perfect position to deliver actionable recommendations and suggestions in this area.

Companies will use AI to analyse, index, and classify data assets for various purposes, including securing their data, streamlining and minimising the attack surface, and ensuring data segmentation into well-governed domains through high-fidelity controls and responses from security automation and orchestration tools. Ongoing development of IT and security teams will be essential, especially as it relates to deploying, maintaining, and administrating new AI systems.

Human oversight will remain crucial, requiring companies to prioritise ongoing education and upskilling to ensure their teams can leverage AI technologies to their full potential, while maintaining vigilance over their systems. Companies will also focus more on bridging the gap between Incident Response and Recovery; assigning resources to create a Cyber Resilience Response Plan that addresses full-scale business continuity.

Shifting the approach

AI is forcing CISOs and Chief Information Officers (CIOs) to think about planning differently in 2024. As the threat landscape continues to evolve rapidly, prompted in part by the onslaught of AI-fuelled attacks, organisations must understand how they can use AI to fight AI. This includes deploying the latest technology to give users real-time threat analysis and report summaries that can automatically highlight detailed information about their cyber resiliency health and real-time predictive threat analysis to find AI-driven ransomware.

The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery. The odds are that, eventually, a bad actor will prevail. So, when that happens, the question becomes, can an organisation rapidly recover – and not in weeks or months, but in hours? In 2024, end-to-end security plans must look across the entire landscape, focusing on cyber resilience.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Top bets for backup and business continuity
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Next-gen solar-powered switches
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.

Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Cyberattacks the #1 cause of business outages
Editor's Choice Information Security Infrastructure
The latest survey by Veeam Software shows that 92% of organizations will increase their spending on data protection by 2024 to achieve cyber resilience due to continued threats of ransomware and cyberattacks.

Nology races to end 2023
Editor's Choice News & Events Infrastructure
Nology ended 2023 with an event highlighting its various products and services to the local market, followed by a few laps around the Kyalami Indoor Karting track.

Cybersecurity integrated with data protection
Technews Publishing News & Events Infrastructure
Last year's VeeamOn Tour conference in South Africa was a smaller version of the annual global Veeam conference, aimed at the company's regional partners and customers.