Cybersecurity Expert Urges Shift to Resilience, Highlights Key Strategies for Organizations
February 21, 2025
Wisniewski notes that smaller organizations often concentrate too heavily on prevention, while larger enterprises may neglect effective configurations of their security tools due to vendor disillusionment.
To enhance their security posture, organizations of all sizes need to improve their incident response and continuity planning by focusing on better detection and response times.
Finally, he recommends looking beyond vendor certifications to evaluate their security culture, transparency, and incident response history.
He argues that while perfect security is unattainable, continuous improvement is essential for effective cybersecurity strategies.
Wisniewski points out a shift in ransomware tactics, with cybercriminals increasingly moving toward data-centric extortion as ransomware payments decrease, although the total amounts paid may still rise.
Chester Wisniewski, Director and Global Field CISO at Sophos, emphasizes that organizations must prioritize cyber resilience over mere defense in today's cybersecurity landscape.
Wisniewski advocates for 24/7 monitoring and the establishment of trained response teams to address incidents promptly.
He highlights the importance of automation and artificial intelligence in processing large volumes of data, which allows security analysts to focus on more complex threat hunting tasks.
To combat alert fatigue from threat intelligence data, he suggests that small and mid-sized firms utilize managed detection and response (MDR) services to handle data triage.
Regarding quantum decryption threats, he advises that only organizations handling sensitive national security data need to assess the risk seriously.
Despite this, he stresses the importance of migrating to quantum-resistant cryptography (PQC) to prepare for potential future threats.
Additionally, organizations should start requiring PQC algorithms during software procurement to mitigate risks associated with outdated cryptographic standards.
He also discusses the challenge of monitoring third-party vendor security, recommending the early involvement of security teams in procurement processes to assess risks effectively.
Summary based on 1 source
Get a daily email with more Tech stories
Source

Help Net Security • Feb 20, 2025
Mastering the cybersecurity tightrope of protection, detection, and response - Help Net Security