SlideShare a Scribd company logo
5 Security Concerns for CISOs
and How to Address Them
CISOs, Are You Incident Ready?
Table of Contents
Introduction 3
Did You Know? 4
The 5 Areas of Concern 5
Concern #1: Supply Chain Attacks 6
Concern #2: Multifactor Authentication (MFA) 8
Concern #3: Cloud Security and Identity and Access Management (IAM) 10
Concern #4: A Growing Attack Surface 12
Concern #5: Overloaded Security Teams 14
How to Prepare with Unit 42 16
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 2
To keep your organization ready to handle rising threats, you must
motivate your entire organization to have a strong security culture.
This is hard. You have an expansive and dynamic attack surface to
defend, supply chain risks to consider, and limits on your budget.
Our โ€œCISOโ€™s Guide to Incident Readiness and Responseโ€ sheds light on
todayโ€™s evolving threat landscape. It will help you better understand the
most prevalent risks your organization faces, not to mention prepare for
todayโ€™s most significant threats.
In the following pages, you will find expert guidance and insights
from our 2022 Unit 42 Incident Response Report, Unit 42 Cloud Threat
Report, Volume 6, and 2022 Attack Surface Threat Report on protecting
your organization without stifling its innovation. And we start by
shining a light on the methods and security shortcomings threat
actors exploit to great success. Unit 42 researches and investigates
hundreds of incidents a year, and weโ€™ve evaluated those incidents to
determine the most prevalent attack methods used by threat actors to
successfully compromise organizations. We share many of our findings
within this guide.
You will also find recommendations for securing your organization
against these attack methods, as well as advice on how to stay ahead
of the evolving cyberthreats that exist today and those still taking shape
on the horizon.
It is also critically important that your peersโ€”fellow leaders who are
also responsible for ensuring business operations run smoothly and
securelyโ€”understand the security risks the organization at large faces.
So, weโ€™ve structured this guide to help you effectively communicate
todayโ€™s cybersecurity threats with leadership teams and board members
as well as legal and regulatory departments.
We know how tough it is to keep up with the rapidly evolving threat
landscape, but weโ€™ve got your back.
Wendi Whitmore
Senior Vice President, Unit 42
Palo Alto Networks
As a CISO, your mission is to protect your
organizationโ€™s systems, users, critical data
and customers against cyberthreats.
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 3
Before you can protect your organization against
cyberattacks, you must first understand where most
attacks are coming from and where your critical assets
reside. Only then will you know where to spend your
limited resources where they matter most:
Focused on the threats that represent the biggest
risk to your organization.
Based on findings from Unit 42 incident response cases
over the past year, the top three access vectors that
threat actors used to get into an organizationโ€™s
environment were phishing, the exploitation of known
software vulnerabilities, and brute-force credential
attacks. Combined, they make up over 77% of the
suspected root causes for intrusions.
Having a big picture understanding of the security
challenges organizations face will enable you to more
readily identify the specific areas attackers are targeting.
And knowing how attackers are doing it can help you
take the necessary proactive steps to better prepare for
future threats.
Did You Know?
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 4
Applying Unit 42โ€™s firsthand case experience and the in-depth industry
knowledge from the Unit 42 Threat Intelligence team, we arrived at five core
areas of concern that contribute to the proliferation of the attack vectors.
In the following pages, weโ€™ll take a look at each one in greater depth.
Supply chain attacks
Multifactor authentication (MFA)
Cloud security and identity and access management (IAM)
A growing attack surface
Overloaded security teams
How Attackers Gain Initial Access to Organizations The 5 Areas of Concern
1
3
5
2
4
5
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
Concern #1:
Supply Chain Attacks
DevOps and agile software development practices have helped
organizations speed up development cycles allowing for more rapid
release timelines. But speed often results in a reliance on third-party
code in vendor applications, which could come from anyone, including
an advanced persistent threat (APT), allowing attackers to take
advantage and launch supply chain attacks.
Given modern cloud software development practices for sharing and
incorporating third-party codeโ€”and creating complex structures that
depend on many other building blocksโ€”if an attacker compromises
third-party developers or their code repositories, itโ€™s possible to
infiltrate thousands of organizations.
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 6
Based on a global analysis1
,
Unit 42 researchers found that:
63%
of third-party code templates used in
building cloud infrastructure contained
insecure configurations
96%
of third-party container applications
deployed in cloud infrastructure contain
known vulnerabilities
OUR RECOMMENDATION
Embed Security into the Software
Development Pipeline
Extending security beyond the runtime phase (the last
phase in the build, deploy, and run model of development)
and integrating it into every stage of development enables
you to create automated security guardrails.
With these guardrails, you can:
โ€ข Catch vulnerable code prior to deployment
(i.e. in the pre-commit stage).
โ€ข Check builds for defects prior to pushing code
to production.
โ€ข Conduct efficient vulnerability scanning in
runtime environments.
The first step in extending security across development
starts with creating a shift-left security strategy that can
evolve over time. A shift-left security strategyโ€”named
for its intention to โ€œshiftโ€ security to phases that come
before the run phaseโ€”is a brief document. It defines
success and lays out ownership, milestones, and metrics
for embedding security processes and tools into all stages
of the continuous integration/continuous development
(CI/CD) pipeline.
After creating your strategy, youโ€™ll need to understand
where and how software is created in your organization.
Start by looking organization-wide and documenting
the overall flow of software in your company. Key items
to identify include who is developing code (people),
how it flows from development laptops to production
(process), and which systems you use to enable the
process (technology).
Learn more about steps you can take to better protect
your organization against supply chain attacks.
1.
Unit 42 Cloud Threat Report. Volume 5
7
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
Concern #2:
MFA
Looking at a selection of recent Unit 42 incident response cases,
89% of the organizations that fell victim to business email compromise
(BEC) attacks had failed to turn on MFA or follow email security best
practices. Additionally, in 50% of all Unit 42 incident response casesยญยญ
โ€”
BEC or otherwiseยญยญ
โ€”organizations lacked MFA on key internet-facing
systems such as corporate webmail, virtual private network (VPN)
solutions, and other remote access solutions.
MFA, if configured correctly, is an effective way to set up a layered
defense, making it harder for threat actors to access your system with
just a stolen password.
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 8
Work on the basics.
Organizations like to follow
the news and go after the new
โ€˜namedโ€™ vulnerability while
still lacking in the fundamentals
such as patch management and
multifactor authentication.โ€
Clint Patterson
Unit 42 Principal Consultant
OUR RECOMMENDATION
Implement MFA as a Technical Control
and Security Policy for All Users
Integrate MFA for all remote access, internet-accessible,
and business email accounts to greatly reduce your
organizationโ€™s attack surface. To prevent threat actors
from circumventing MFA, disable legacy authentications/
protocols and confirm that MFA is not only deployed,
but that employees are also using it correctly, and avoid
using SMS as a second form of authentication. Effective
forms of MFA include one-time passwords (OTPs) and
cryptographic token-based authentication.
Remember to implement MFA internally as well.
Too often, after authenticating MFA once, a user can
bounce around the network without re-verifying MFA,
even when moving to a system with a different trust level
(e.g., from workstation to server).
Learn more about the consequences of missing or
improperly deployed MFA and 7 Common Security Gaps
You Can Address to be More Secure.
โ€œ
9
5 SECURITY CONCERNS FOR CISOSAND HOW TO ADDRESS THEM
Concern #3:
Cloud Security and Identity and Access Management (IAM)
Improperly configured cloud environments essentially
leave the door unlocked for malicious actors, allowing
them to gain initial access without needing to find and
exploit a vulnerability or make use of sophisticated
techniques. Itโ€™s no surprise that attackers commonly
look for improperly configured cloud environments.
According to a recent volume of the Unit 42 Cloud
Threat Report, IAM misconfigurations alone contributed
to 65% of the observed cloud security incidents.
Based on research conducted between January and June
2021, Unit 42 found that cloud environments are more
susceptible to attacks today than in October 2020 (when
we released a report that detailed the security risks IAM
misconfigurations can pose to cloud environments).
To better secure your cloud environments, you can
safeguard IAM permissions by:
โ€ข Checking for misconfigurations, default and overly
broad permissions, and other weaknesses.
โ€ข Instituting procedures to identify exposed IAM
access keys.
โ€ข Continuously monitoring IAM access keys to
cloud resources.
To learn more about security shortcomings in the cloud
and the latest threat tactics, download our Unit 42 Cloud
Threat Report, Volume 6.
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 10
Right now, threat actors in the
cloud donโ€™t have to try very hard
to be successful at what they do.
They may look around and say,
โ€˜Okay, there is a door, here are
the keysโ€”nobody even knows
we found them. Letโ€™s see if this
works. Oh, it does!โ€™ Then they
take what they think is worth
something, leave a ransom note,
and kick over a few flowerpots
on the way outโ€”just to add a
dash of destruction.โ€
Ashlie Blanca
Unit 42 Consulting Director
OUR RECOMMENDATION
Secure Your Cloud Environments with
Proper Training and Configuration
Access to cloud controls such as Cloud Services Provider (CSP) consoles, APIs, and command-line interfaces in the cloud
should be restricted to only those who need it. Such Role-Based Access Control (RBAC) is essential to minimizing risks of
misconfiguration and other security errors. We also recommend your organization invests in a cloud-native security platform
to routinely monitor cloud environments for IAM misconfigurations both within production and development environments.
Your organization should also:
โ€ข Deploy data loss prevention solutions.
โ€ข Regularly audit your cloud data to understand what
is sensitive and know where itโ€™s located.
โ€ข Use MFA for authorized users as well as certificates
and digital signatures.
โ€ข Separate administrative and user credentials, and
limit everyday users to production environments.
โ€ข Evaluate your options for managed security services
if you do not have the in-house expertise or your cloud
environment is particularly complex.
In a separate analysis, Unit 42 researchers studied identity and access management (IAM) controls
of more than 680,000 identities across 18,000 cloud accounts from 200 different organizations.
Nearly all (99%) lacked the proper IAM policy controls to remain secure.
โ€œ
11
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
Concern #4:
A Growing Attack Surface
Modern attack surfaces are inherently dynamic, and constantly shifting,
moving and growing over time. This means that as attack surfaces
grow, the number of unmanaged assets across those surfaces grow, too.
As a result, attackers are becoming increasingly adept at scanning the
internet in search of vulnerable systems and exploiting gaps in security
before they can be patched.
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 12
OUR RECOMMENDATION
Be a Champion for Proactive Visibility
Security can be hard. Sometimes itโ€™s as simple as that.
Security teams do the best they can with the resources and
the data they have, but visibility is often the deciding factor
as to whether an asset is secure. Another tool in the SecOps
arsenal should be an attack surface management platform
that can provide a comprehensive and continuously
updated inventory of all internet-connected assets and
potential exposures.
An attack surface assessment can help you gain visibility
into your internet-facing assets. Specifically, a Unit 42
Attack Surface Assessment combines visibility into your
internet-facing assets with actionable recommendations
to help you mitigate threats and reduce business risk.
This Unit 42 service discovers shadow IT infrastructure,
identifies assets susceptible to common vulnerabilities and
exposures (CVEs), and ranks risks and recommendations
based on Unit 42 security expertise and threat intelligence.
Learn more about the benefits of a Unit 42 Attack
Surface Assessment.
If you donโ€™t know where exposures live, itโ€™s impossible to
ensure issues are remediated. Unfortunately for defenders,
attackers just need one crack to find their way in. Attackers
thrive on the complexity and ever-changing nature of
attack surfaces because they can scan the entire internet
looking for those weak points. The best option for security
teams is to ensure they have the same view of their own
attack surface. With an attackerโ€™s point of view, identifying
and prioritizing issues for remediation gets far easier.
4 Trends on the State of
the Global Attack Surface
From March to September, we monitored scans
of 50 million IP addressesโ€”over 1% of the entire
internetโ€”associated with 100+ global enterprises
to understand how quickly adversaries can identify
vulnerable systems for fast exploitation. Based on
observed scan data, not self-reported surveys,
we identified the following trends:
Low-hanging fruit like basic security
hygiene (e.g., strong passwords, MFA
deployment) remains unaddressed.
End-of-life software could mean
end-of-life for your security.
The unmanaged attack surface
continues to grow.
Issues are persistent, complex and unique.
1
3
4
2
Patch Open Vulnerabilities Quickly
Out of the 600+ Unit 42 incident response cases evaluated, poor patch management contributed to 28% of all successful
breaches. Your organization must ramp up patch and vulnerability management to apply patches as soon as due diligence allows.
Patching open vulnerabilities should be prompt and prioritized with a high sense of urgency, oversight and validation.
13
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
Concern #5:
Overloaded Security Teams
The challenges facing security teams continue to expand, not coincidentally, as attack methods grow and evolve.
Consider these three challenges of an average cybersecurity team:
Learn more key takeaways from our in-depth case review. Download our 2022 Unit 42 Incident Response Report.
Too many alerts
In 11% of Unit 42 incident
response cases, important
security alerts got lost without
sufficient review/action.
Too many security products
Administrators are often
monitoring the network using
a patchwork of tools. And,
theyโ€™re forced to rely on
disparate sources of information
from those tools.
Too many manual/
time-consuming processes
Poor processes for patch management tasks
contributed to threat actor success in 28%
of the Unit 42 incident response cases. These
cases involved vulnerabilities that were
disclosed publicly with patches available.
However, the threat actors were able to exploit
vulnerabilities that remained unpatched.
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 14
Advantages of
Intelligent Automation
โ€ข Ensure proper use of scarce resources.
โ€ข Gain clarity and control across the network.
โ€ข Accelerate response and recovery timelines.
OUR RECOMMENDATION
Automate Where Possible
Intelligent automation can help your team prioritize
scarce resources, consolidate visibility and control over a
dynamic network, and reduce response and recovery tasks.
Consider implementing automation tools and take
advantage of pre-made playbooks to respond and recover
from incidents quickly. Incident response, SecOps and
threat intelligence teams can save many hours of manual
labor trying to piece disparate sources of information
together from multiple tools.
Security orchestration, automation, and response
(SOAR) products can automate the whole process of
user investigation, endpoint isolation, notifications,
enrichment, and threat hunting. By orchestrating across
security information and event management (SIEM),
firewalls, endpoint security, and threat intelligence
sources, response teams can act quickly in the face of a
breach or attack.
Humans are biologically programmed
to make mistakes. We are consistently
the weakest link in cybersecurity. It is
crucial that organizations incorporate
automation and intelligent, data-driven
tooling wherever feasible. It seems like
common sense, but reducing human error
is one of the best strategies for bolstering
organizational security posture.โ€
LeeAnne Pelzer
Unit 42 Consulting Director
โ€œ
15
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
As the saying goes,
โ€œProper preparation prevents poor performance.โ€
If that isnโ€™t your organizationโ€™s rallying cry for
IT security preparedness, it should be. And the first
step is to ask and answer three critical questions:
Are the right people in place and are
processes optimized?
Have you invested in the necessary
tools and technology?
Is there proper governance
to protect the organization?
Based on your answers, redefining your security
strategy can begin. Weโ€™re ready to help you:
โ€ข Build a strategic roadmap that makes
transformation easier.
โ€ข Stay up to date on the latest threats against
your organization.
โ€ข Develop an actionable incident response plan.
1
3
2
16
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
Your board has questions.
How will you answer?
Now with a clear picture of todayโ€™s most prevalent
threats on the security landscape, itโ€™s time to act.
Donโ€™t make the mistake of going at it alone.
Taking a proactive approach to cybersecurity isnโ€™t the
job of one person or a specific group. Itโ€™s an all-hands-
on-deck initiative that requires active participation
and buy-in from everyone in your organization.
And it starts at the top. Your board may not be on the
front lines of assessing and testing the organizationโ€™s
security posture, but members need to feel confident
about the strategy youโ€™re putting into practice. Otherwise,
the funding and resourcing you need to be effective in
this high-stakes fight is a lot harder to come by.
Your board is going to have questions. Youโ€™ll have the
right answersโ€”if you share your insights in a way
decision-makers can understand.
The first step is yours to take. Check out our Unit 42
executive content for inspiration and proven ways to
talk to your board and key stakeholders about
cybersecurity risks.
Get the Unit 42 toolkit for talking to your board
17
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
ยฉ 2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at
www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
3000 Tannery Way
Santa Clary, CA 95054
Main +1.408.753.4000
Sales +1.866.320.4788
Support +1.866.898.9087
www.paloaltonetworks.com
18
5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
Ad

More Related Content

Similar to 5-security-concerns-for-cisos and how to address them (20)

What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
SOCVault
ย 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
MobibizIndia1
ย 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
ย 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
ย 
All About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxAll About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptx
Metaorange
ย 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
ย 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
ย 
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfAll About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdf
Metaorange
ย 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
Hafid CHEBRAOUI
ย 
Cyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paperCyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paper
InfosecTrain
ย 
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
Mansi Kandari
ย 
Cybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdfCybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdf
infosec train
ย 
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
infosecTrain
ย 
InfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview QuestionsInfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview Questions
priyanshamadhwal2
ย 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
FinTech Belgium
ย 
Cyber Security .pdf
Cyber Security .pdfCyber Security .pdf
Cyber Security .pdf
samayraina1
ย 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
larry1401
ย 
Cyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdfCyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdf
InfosecTrain
ย 
Cybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdfCybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdf
infosec train
ย 
Cybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdfCybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdf
infosecTrain
ย 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
SOCVault
ย 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
MobibizIndia1
ย 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
ย 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
ย 
All About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxAll About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptx
Metaorange
ย 
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfAll About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdf
Metaorange
ย 
Cyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paperCyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paper
InfosecTrain
ย 
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
Mansi Kandari
ย 
Cybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdfCybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdf
infosec train
ย 
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
infosecTrain
ย 
InfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview QuestionsInfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview Questions
priyanshamadhwal2
ย 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
FinTech Belgium
ย 
Cyber Security .pdf
Cyber Security .pdfCyber Security .pdf
Cyber Security .pdf
samayraina1
ย 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
larry1401
ย 
Cyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdfCyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdf
InfosecTrain
ย 
Cybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdfCybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdf
infosec train
ย 
Cybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdfCybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdf
infosecTrain
ย 

Recently uploaded (20)

Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
panagenda
ย 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
ย 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
ย 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
ย 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
ย 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
ย 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
ย 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
ย 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
panagenda
ย 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
ย 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
ย 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
ย 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
ย 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
ย 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
ย 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
ย 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
ย 
Ad

5-security-concerns-for-cisos and how to address them

  • 1. 5 Security Concerns for CISOs and How to Address Them CISOs, Are You Incident Ready?
  • 2. Table of Contents Introduction 3 Did You Know? 4 The 5 Areas of Concern 5 Concern #1: Supply Chain Attacks 6 Concern #2: Multifactor Authentication (MFA) 8 Concern #3: Cloud Security and Identity and Access Management (IAM) 10 Concern #4: A Growing Attack Surface 12 Concern #5: Overloaded Security Teams 14 How to Prepare with Unit 42 16 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 2
  • 3. To keep your organization ready to handle rising threats, you must motivate your entire organization to have a strong security culture. This is hard. You have an expansive and dynamic attack surface to defend, supply chain risks to consider, and limits on your budget. Our โ€œCISOโ€™s Guide to Incident Readiness and Responseโ€ sheds light on todayโ€™s evolving threat landscape. It will help you better understand the most prevalent risks your organization faces, not to mention prepare for todayโ€™s most significant threats. In the following pages, you will find expert guidance and insights from our 2022 Unit 42 Incident Response Report, Unit 42 Cloud Threat Report, Volume 6, and 2022 Attack Surface Threat Report on protecting your organization without stifling its innovation. And we start by shining a light on the methods and security shortcomings threat actors exploit to great success. Unit 42 researches and investigates hundreds of incidents a year, and weโ€™ve evaluated those incidents to determine the most prevalent attack methods used by threat actors to successfully compromise organizations. We share many of our findings within this guide. You will also find recommendations for securing your organization against these attack methods, as well as advice on how to stay ahead of the evolving cyberthreats that exist today and those still taking shape on the horizon. It is also critically important that your peersโ€”fellow leaders who are also responsible for ensuring business operations run smoothly and securelyโ€”understand the security risks the organization at large faces. So, weโ€™ve structured this guide to help you effectively communicate todayโ€™s cybersecurity threats with leadership teams and board members as well as legal and regulatory departments. We know how tough it is to keep up with the rapidly evolving threat landscape, but weโ€™ve got your back. Wendi Whitmore Senior Vice President, Unit 42 Palo Alto Networks As a CISO, your mission is to protect your organizationโ€™s systems, users, critical data and customers against cyberthreats. 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 3
  • 4. Before you can protect your organization against cyberattacks, you must first understand where most attacks are coming from and where your critical assets reside. Only then will you know where to spend your limited resources where they matter most: Focused on the threats that represent the biggest risk to your organization. Based on findings from Unit 42 incident response cases over the past year, the top three access vectors that threat actors used to get into an organizationโ€™s environment were phishing, the exploitation of known software vulnerabilities, and brute-force credential attacks. Combined, they make up over 77% of the suspected root causes for intrusions. Having a big picture understanding of the security challenges organizations face will enable you to more readily identify the specific areas attackers are targeting. And knowing how attackers are doing it can help you take the necessary proactive steps to better prepare for future threats. Did You Know? 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 4
  • 5. Applying Unit 42โ€™s firsthand case experience and the in-depth industry knowledge from the Unit 42 Threat Intelligence team, we arrived at five core areas of concern that contribute to the proliferation of the attack vectors. In the following pages, weโ€™ll take a look at each one in greater depth. Supply chain attacks Multifactor authentication (MFA) Cloud security and identity and access management (IAM) A growing attack surface Overloaded security teams How Attackers Gain Initial Access to Organizations The 5 Areas of Concern 1 3 5 2 4 5 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
  • 6. Concern #1: Supply Chain Attacks DevOps and agile software development practices have helped organizations speed up development cycles allowing for more rapid release timelines. But speed often results in a reliance on third-party code in vendor applications, which could come from anyone, including an advanced persistent threat (APT), allowing attackers to take advantage and launch supply chain attacks. Given modern cloud software development practices for sharing and incorporating third-party codeโ€”and creating complex structures that depend on many other building blocksโ€”if an attacker compromises third-party developers or their code repositories, itโ€™s possible to infiltrate thousands of organizations. 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 6
  • 7. Based on a global analysis1 , Unit 42 researchers found that: 63% of third-party code templates used in building cloud infrastructure contained insecure configurations 96% of third-party container applications deployed in cloud infrastructure contain known vulnerabilities OUR RECOMMENDATION Embed Security into the Software Development Pipeline Extending security beyond the runtime phase (the last phase in the build, deploy, and run model of development) and integrating it into every stage of development enables you to create automated security guardrails. With these guardrails, you can: โ€ข Catch vulnerable code prior to deployment (i.e. in the pre-commit stage). โ€ข Check builds for defects prior to pushing code to production. โ€ข Conduct efficient vulnerability scanning in runtime environments. The first step in extending security across development starts with creating a shift-left security strategy that can evolve over time. A shift-left security strategyโ€”named for its intention to โ€œshiftโ€ security to phases that come before the run phaseโ€”is a brief document. It defines success and lays out ownership, milestones, and metrics for embedding security processes and tools into all stages of the continuous integration/continuous development (CI/CD) pipeline. After creating your strategy, youโ€™ll need to understand where and how software is created in your organization. Start by looking organization-wide and documenting the overall flow of software in your company. Key items to identify include who is developing code (people), how it flows from development laptops to production (process), and which systems you use to enable the process (technology). Learn more about steps you can take to better protect your organization against supply chain attacks. 1. Unit 42 Cloud Threat Report. Volume 5 7 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
  • 8. Concern #2: MFA Looking at a selection of recent Unit 42 incident response cases, 89% of the organizations that fell victim to business email compromise (BEC) attacks had failed to turn on MFA or follow email security best practices. Additionally, in 50% of all Unit 42 incident response casesยญยญ โ€” BEC or otherwiseยญยญ โ€”organizations lacked MFA on key internet-facing systems such as corporate webmail, virtual private network (VPN) solutions, and other remote access solutions. MFA, if configured correctly, is an effective way to set up a layered defense, making it harder for threat actors to access your system with just a stolen password. 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 8
  • 9. Work on the basics. Organizations like to follow the news and go after the new โ€˜namedโ€™ vulnerability while still lacking in the fundamentals such as patch management and multifactor authentication.โ€ Clint Patterson Unit 42 Principal Consultant OUR RECOMMENDATION Implement MFA as a Technical Control and Security Policy for All Users Integrate MFA for all remote access, internet-accessible, and business email accounts to greatly reduce your organizationโ€™s attack surface. To prevent threat actors from circumventing MFA, disable legacy authentications/ protocols and confirm that MFA is not only deployed, but that employees are also using it correctly, and avoid using SMS as a second form of authentication. Effective forms of MFA include one-time passwords (OTPs) and cryptographic token-based authentication. Remember to implement MFA internally as well. Too often, after authenticating MFA once, a user can bounce around the network without re-verifying MFA, even when moving to a system with a different trust level (e.g., from workstation to server). Learn more about the consequences of missing or improperly deployed MFA and 7 Common Security Gaps You Can Address to be More Secure. โ€œ 9 5 SECURITY CONCERNS FOR CISOSAND HOW TO ADDRESS THEM
  • 10. Concern #3: Cloud Security and Identity and Access Management (IAM) Improperly configured cloud environments essentially leave the door unlocked for malicious actors, allowing them to gain initial access without needing to find and exploit a vulnerability or make use of sophisticated techniques. Itโ€™s no surprise that attackers commonly look for improperly configured cloud environments. According to a recent volume of the Unit 42 Cloud Threat Report, IAM misconfigurations alone contributed to 65% of the observed cloud security incidents. Based on research conducted between January and June 2021, Unit 42 found that cloud environments are more susceptible to attacks today than in October 2020 (when we released a report that detailed the security risks IAM misconfigurations can pose to cloud environments). To better secure your cloud environments, you can safeguard IAM permissions by: โ€ข Checking for misconfigurations, default and overly broad permissions, and other weaknesses. โ€ข Instituting procedures to identify exposed IAM access keys. โ€ข Continuously monitoring IAM access keys to cloud resources. To learn more about security shortcomings in the cloud and the latest threat tactics, download our Unit 42 Cloud Threat Report, Volume 6. 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 10
  • 11. Right now, threat actors in the cloud donโ€™t have to try very hard to be successful at what they do. They may look around and say, โ€˜Okay, there is a door, here are the keysโ€”nobody even knows we found them. Letโ€™s see if this works. Oh, it does!โ€™ Then they take what they think is worth something, leave a ransom note, and kick over a few flowerpots on the way outโ€”just to add a dash of destruction.โ€ Ashlie Blanca Unit 42 Consulting Director OUR RECOMMENDATION Secure Your Cloud Environments with Proper Training and Configuration Access to cloud controls such as Cloud Services Provider (CSP) consoles, APIs, and command-line interfaces in the cloud should be restricted to only those who need it. Such Role-Based Access Control (RBAC) is essential to minimizing risks of misconfiguration and other security errors. We also recommend your organization invests in a cloud-native security platform to routinely monitor cloud environments for IAM misconfigurations both within production and development environments. Your organization should also: โ€ข Deploy data loss prevention solutions. โ€ข Regularly audit your cloud data to understand what is sensitive and know where itโ€™s located. โ€ข Use MFA for authorized users as well as certificates and digital signatures. โ€ข Separate administrative and user credentials, and limit everyday users to production environments. โ€ข Evaluate your options for managed security services if you do not have the in-house expertise or your cloud environment is particularly complex. In a separate analysis, Unit 42 researchers studied identity and access management (IAM) controls of more than 680,000 identities across 18,000 cloud accounts from 200 different organizations. Nearly all (99%) lacked the proper IAM policy controls to remain secure. โ€œ 11 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
  • 12. Concern #4: A Growing Attack Surface Modern attack surfaces are inherently dynamic, and constantly shifting, moving and growing over time. This means that as attack surfaces grow, the number of unmanaged assets across those surfaces grow, too. As a result, attackers are becoming increasingly adept at scanning the internet in search of vulnerable systems and exploiting gaps in security before they can be patched. 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 12
  • 13. OUR RECOMMENDATION Be a Champion for Proactive Visibility Security can be hard. Sometimes itโ€™s as simple as that. Security teams do the best they can with the resources and the data they have, but visibility is often the deciding factor as to whether an asset is secure. Another tool in the SecOps arsenal should be an attack surface management platform that can provide a comprehensive and continuously updated inventory of all internet-connected assets and potential exposures. An attack surface assessment can help you gain visibility into your internet-facing assets. Specifically, a Unit 42 Attack Surface Assessment combines visibility into your internet-facing assets with actionable recommendations to help you mitigate threats and reduce business risk. This Unit 42 service discovers shadow IT infrastructure, identifies assets susceptible to common vulnerabilities and exposures (CVEs), and ranks risks and recommendations based on Unit 42 security expertise and threat intelligence. Learn more about the benefits of a Unit 42 Attack Surface Assessment. If you donโ€™t know where exposures live, itโ€™s impossible to ensure issues are remediated. Unfortunately for defenders, attackers just need one crack to find their way in. Attackers thrive on the complexity and ever-changing nature of attack surfaces because they can scan the entire internet looking for those weak points. The best option for security teams is to ensure they have the same view of their own attack surface. With an attackerโ€™s point of view, identifying and prioritizing issues for remediation gets far easier. 4 Trends on the State of the Global Attack Surface From March to September, we monitored scans of 50 million IP addressesโ€”over 1% of the entire internetโ€”associated with 100+ global enterprises to understand how quickly adversaries can identify vulnerable systems for fast exploitation. Based on observed scan data, not self-reported surveys, we identified the following trends: Low-hanging fruit like basic security hygiene (e.g., strong passwords, MFA deployment) remains unaddressed. End-of-life software could mean end-of-life for your security. The unmanaged attack surface continues to grow. Issues are persistent, complex and unique. 1 3 4 2 Patch Open Vulnerabilities Quickly Out of the 600+ Unit 42 incident response cases evaluated, poor patch management contributed to 28% of all successful breaches. Your organization must ramp up patch and vulnerability management to apply patches as soon as due diligence allows. Patching open vulnerabilities should be prompt and prioritized with a high sense of urgency, oversight and validation. 13 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
  • 14. Concern #5: Overloaded Security Teams The challenges facing security teams continue to expand, not coincidentally, as attack methods grow and evolve. Consider these three challenges of an average cybersecurity team: Learn more key takeaways from our in-depth case review. Download our 2022 Unit 42 Incident Response Report. Too many alerts In 11% of Unit 42 incident response cases, important security alerts got lost without sufficient review/action. Too many security products Administrators are often monitoring the network using a patchwork of tools. And, theyโ€™re forced to rely on disparate sources of information from those tools. Too many manual/ time-consuming processes Poor processes for patch management tasks contributed to threat actor success in 28% of the Unit 42 incident response cases. These cases involved vulnerabilities that were disclosed publicly with patches available. However, the threat actors were able to exploit vulnerabilities that remained unpatched. 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM 14
  • 15. Advantages of Intelligent Automation โ€ข Ensure proper use of scarce resources. โ€ข Gain clarity and control across the network. โ€ข Accelerate response and recovery timelines. OUR RECOMMENDATION Automate Where Possible Intelligent automation can help your team prioritize scarce resources, consolidate visibility and control over a dynamic network, and reduce response and recovery tasks. Consider implementing automation tools and take advantage of pre-made playbooks to respond and recover from incidents quickly. Incident response, SecOps and threat intelligence teams can save many hours of manual labor trying to piece disparate sources of information together from multiple tools. Security orchestration, automation, and response (SOAR) products can automate the whole process of user investigation, endpoint isolation, notifications, enrichment, and threat hunting. By orchestrating across security information and event management (SIEM), firewalls, endpoint security, and threat intelligence sources, response teams can act quickly in the face of a breach or attack. Humans are biologically programmed to make mistakes. We are consistently the weakest link in cybersecurity. It is crucial that organizations incorporate automation and intelligent, data-driven tooling wherever feasible. It seems like common sense, but reducing human error is one of the best strategies for bolstering organizational security posture.โ€ LeeAnne Pelzer Unit 42 Consulting Director โ€œ 15 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
  • 16. As the saying goes, โ€œProper preparation prevents poor performance.โ€ If that isnโ€™t your organizationโ€™s rallying cry for IT security preparedness, it should be. And the first step is to ask and answer three critical questions: Are the right people in place and are processes optimized? Have you invested in the necessary tools and technology? Is there proper governance to protect the organization? Based on your answers, redefining your security strategy can begin. Weโ€™re ready to help you: โ€ข Build a strategic roadmap that makes transformation easier. โ€ข Stay up to date on the latest threats against your organization. โ€ข Develop an actionable incident response plan. 1 3 2 16 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
  • 17. Your board has questions. How will you answer? Now with a clear picture of todayโ€™s most prevalent threats on the security landscape, itโ€™s time to act. Donโ€™t make the mistake of going at it alone. Taking a proactive approach to cybersecurity isnโ€™t the job of one person or a specific group. Itโ€™s an all-hands- on-deck initiative that requires active participation and buy-in from everyone in your organization. And it starts at the top. Your board may not be on the front lines of assessing and testing the organizationโ€™s security posture, but members need to feel confident about the strategy youโ€™re putting into practice. Otherwise, the funding and resourcing you need to be effective in this high-stakes fight is a lot harder to come by. Your board is going to have questions. Youโ€™ll have the right answersโ€”if you share your insights in a way decision-makers can understand. The first step is yours to take. Check out our Unit 42 executive content for inspiration and proven ways to talk to your board and key stakeholders about cybersecurity risks. Get the Unit 42 toolkit for talking to your board 17 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM
  • 18. ยฉ 2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. 3000 Tannery Way Santa Clary, CA 95054 Main +1.408.753.4000 Sales +1.866.320.4788 Support +1.866.898.9087 www.paloaltonetworks.com 18 5 SECURITY CONCERNS FOR CISOS AND HOW TO ADDRESS THEM