{"id":21042,"date":"2024-03-14T21:30:23","date_gmt":"2024-03-14T16:00:23","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=21042"},"modified":"2025-04-25T13:12:24","modified_gmt":"2025-04-25T07:42:24","slug":"cautionary-tales-of-2023-and-gartners-cybersecurity-trends-for-2024","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cautionary-tales-of-2023-and-gartners-cybersecurity-trends-for-2024\/","title":{"rendered":"Cautionary Tales of 2023 and Gartner&#8217;s Cybersecurity Trends for 2024"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">2023 was a real inflection point in the realm of cybersecurity and cybercrime. While the year saw companies give more importance to the role of cybersecurity in their organization, the fact of the matter is that cybercrime continued to be on the rise. The average <a href=\"https:\/\/www.ibm.com\/reports\/data-breach#:~:text=The%20global%20average%20cost%20of,15%25%20increase%20over%203%20years.&amp;text=51%25%20of%20organizations%20are%20planning,threat%20detection%20and%20response%20tools.\" target=\"_blank\" rel=\"noopener\">cost of a data breach in 2023 was $4.45 million<\/a>, highlighting a 15% increase over the last three years. In addition, <a href=\"https:\/\/www.statista.com\/statistics\/204457\/businesses-ransomware-attack-rate\/\" target=\"_blank\" rel=\"noopener\">Statista<\/a> also reported that 72.7% of all organizations fell prey to a ransomware attack in 2023.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To that end,<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024#:~:text=Generative%20AI%20(GenAI)%2C%20unsecure,%2C%20according%20to%20Gartner%2C%20Inc.\" target=\"_blank\" rel=\"noopener\"> Gartner recently identified the top 6 cybersecurity trends that will shape 2024<\/a> &#8211; a <\/span><span style=\"font-weight: 400;\">great read<\/span><span style=\"font-weight: 400;\">, if you haven\u2019t checked it out already. What we wanted to do was bring to light several cautionary tales that occurred in 2023, and how each incident\u2019s learnings are linked to Gartner\u2019s 6 trends for 2024.<\/span><\/p>\n<h3><b>Trend #1:<\/b><b> Turning short-term skepticism for Generative AI into long-term hope<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Generative AI is a relatively new technology, and all of those tend to have teething problems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last year, Samsung banned the use of ChatGPT and other AI-powered chatbots because of how precariously 3 different employees used it:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One engineer entered source code to find out how to resolve a software bug.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One executive recorded a confidential meeting, used a transcribing software and fed it to ChatGPT to conjure up meeting notes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A third employee used it to optimize the test sequence for identifying defective chips.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The tricky part is, that once this data is fed, it gets stored on those servers with no easy way to access and delete them. Furthermore, prior conversations are used to train these AI models, so there\u2019s every chance that your sensitive data could be served up to other users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, through proactive collaboration with business stakeholders, organizations must build the foundations for ethical, safe, and secure usage of this highly disruptive tech. Encourage experimentation and manage expectations, especially when it comes to employees outside your security team so that they know the power (and danger) of these transformative tools. Incidents like the Samsung-ChatGPT one will continue to pop up, yet that shouldn\u2019t distract from the ultimate fact that AI could be transformative for both your business operations and your cybersecurity strategy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Trend<\/b><b style=\"font-style: inherit;\">\u00a0#2:<\/b> <b style=\"font-style: inherit;\">The Rise of Cybersecurity Outcome-Driven Metrics (ODMs)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Incidents like the aforementioned scenario bring relevance to the increasing adoption of outcome-driven metrics (ODMs) to an organization\u2019s cybersecurity strategy. The frequency and negative impact of cyberattacks have seen organizations question their strategy and regularly test if it is being continuously improved upon.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To that end, ODMs create a clearer path between the investment in cybersecurity and the results it generates in the form of delivered protection levels, in language easily understood by non-IT executives. What\u2019s interesting is that cybersecurity teams are now increasingly being evaluated during appraisals on these metrics.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Gartner identifies 16 key metrics that are required for cybersecurity measurement, reporting, and investment.<\/span><\/p>\n<figure id=\"attachment_21043\" aria-describedby=\"caption-attachment-21043\" style=\"width: 1024px\" class=\"wp-caption alignnone\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-large wp-image-21043\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics-1024x577.png\" alt=\"Gartner's 16 key metrics that are required for cybersecurity measurement, reporting, and investment.\" width=\"1024\" height=\"577\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics-1024x577.png 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics-300x169.png 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics-768x433.png 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics-24x14.png 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics-36x20.png 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics-48x27.png 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/03\/infographic-cybersecurity-value-benchmark-16-metrics.png 1360w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-21043\" class=\"wp-caption-text\">Gartner&#8217;s 16 key metrics that are required for cybersecurity measurement, reporting, and investment.<\/figcaption><\/figure>\n<h3><b>Trend #3:<\/b><b> SBCPs to Reduce Human Error<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Gambling can sometimes be fun, but not when it comes to your customers\u2019 private data. That\u2019s exactly what happened when attackers from the group Scattered Spiders obtained MGM employee info on LinkedIn and impersonated them while speaking to MGM\u2019s IT help desk to get credentials.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A ransomware attack ensued, MGM\u2019s systems were completely shut down, and there were reports of malfunctioning slot machines and room keys, followed by a reveal a few days later that customer names, contact info, gender, DOB, and even Social Security Numbers, were leaked as part of the breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Don\u2019t gamble with your organizational data like that. This breach wouldn\u2019t have happened if MGM\u2019s IT team had been sufficiently trained in ideal cybersecurity practices. The only way to avoid human error, which forms the basis of <\/span><i><span style=\"font-weight: 400;\">so <\/span><\/i><span style=\"font-weight: 400;\">many cyberattacks, is to have a focus shift from \u2018increasing awareness\u2019 amongst your employees to \u2018fostering behavioral change\u2019.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Effective security behavior &amp; cultural programs (SBCPs) are crucial to achieving that leap. Through these programs, you can successfully create better employee adoption, reduce slack behavior, and thus increase speed &amp; agility. Through the efficacy of these measures, employees become competent at making independent cyber risk decisions.\u00a0<\/span><\/p>\n<p>Read more on how <a href=\"https:\/\/www.cioandleader.com\/human-errors-the-weakest-thread-in-the-cybersecurity-fabric\/\" target=\"_blank\" rel=\"noopener\">Human Errors are the weakest link in the cybersecurity fabric<\/a>, a POV by Mitish Chitnivas, CTO, iValue Group.<\/p>\n<h3><b>Trend #4:<\/b><b> Resilience-Driven,\u00a0 Resource-Efficient TPRM<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Third parties shouldn\u2019t be your organizational crutch. Instead, by establishing mutually beneficial relationships with third parties that ensure that your most valuable assets are continuously safeguarded, they can be valuable assets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The London Metropolitan Police found that out the hard way when its IT supplier, Digital ID, experienced a ransomware attack in August 2023.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through this, sensitive information of nearly 47,000 law enforcement officers &amp; staff was exposed. We\u2019re talking names, photos, ranks, and identification numbers for all these officers. Seriously dangerous real-world ramifications possibly ensued when you consider that some officers were undercover or involved in counter-terrorism ops.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key to choosing the latter is an enhanced <a href=\"https:\/\/ivaluegroup.com\/en-in\/blogs\/8-cybersecurity-resolutions-for-2024\/\">third-party risk management (TPRM)<\/a> strategy, that moves away from front-loaded due diligence activities to a strategy involving continuous monitoring and improvement. Some essentials your TPRM strategy should contain include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident playbooks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tabletop exercises<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A clear offboarding strategy, including timely revocation of access and destruction of data<\/span><\/li>\n<\/ul>\n<h3><b>Trend #5:<\/b><b> Prominence of CTEM Programs<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ever played Call of Duty or World of Warcraft? If you have (or even if you haven\u2019t), it would interest you to know that Activision, the company that develops these games, suffered a data breach last February. Well, the hack happened in December 2022, but they only found out about it the following February.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attackers gained access through an SMS phishing attack on an HR employee who had access to sensitive employee information. They obtained full names, email IDs,\u00a0 phone numbers, salaries, work locations, and &#8211; get this &#8211; even sensitive details about upcoming content for their Call of Duty Modern Warfare 2 franchise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The shocking part was, that this wasn\u2019t disclosed for months until malware research group vx-underground shared a bunch of screenshots regarding the breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The chances of the Activision scenario arising in your organization dip drastically with a solid continuous threat exposure management (CTEM) program. It speaks volumes when Gartner says that by 2026, organizations prioritizing investment in CTEM programs will see a two-thirds reduction in breaches.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This program continuously monitors hybrid digital environments to enable early identification and optimal prioritization of vulnerabilities. These measures help maintain a solid organizational attack surface.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key to doing this is aligning assessment &amp; remediation scopes with threat vectors and individual projects instead of the entire infrastructure &#8211; essentially, focusing on the micro as a means of securing the macro.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Trend #6:<\/b><b> Increasing Importance of IAM<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The cybersecurity world is moving towards an identity-first security approach, and identity &amp; access management (IAM) forms the crux of that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet, even before the Activision incident, the tone for a concerning year was set in January 2023, when MailChimp reported that data had been compromised for over 133 of their corporate clients. One of those was WooCommerce, a popular e-commerce plugin for WordPress, who later informed users that the breach exposed names, store URLs, and email IDs. 133 business clients don\u2019t sound that substantive until you consider just how much user data each of those clients holds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, how did it happen? Through a social engineering attack on MailChimp employees and contractors that enabled the attackers to obtain employee credentials. Through this, they accessed tools used by teams interacting with clients for customer service and account management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To be fair to MailChimp, they detected the breach quickly, suspended access immediately, and informed the public less than 24 hours after the initial discovery.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Situations like the MailChimp breach don\u2019t happen with a strong identity fabric and quick threat detection &amp; response tools being the pillar of your IAM. Zero trust is also becoming an increasingly adopted tenet moving forward.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, there we have it, Gartner\u2019s 6 cybersecurity trends for 2024 becoming all the more heightened due to relevant cautionary tales from the previous year. Thank you for reading, and stay cybersafe!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2023 was a real inflection point in the realm of cybersecurity and cybercrime. While the year saw companies give more importance to the role of cybersecurity in their organization, the fact of the matter is that cybercrime continued to be on the rise. The average cost of a data breach in 2023 was $4.45 million, &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cautionary-tales-of-2023-and-gartners-cybersecurity-trends-for-2024\/\"> <span class=\"screen-reader-text\">Cautionary Tales of 2023 and Gartner&#8217;s Cybersecurity Trends for 2024<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20195,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[188,211,210,208,206,209,207],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/21042"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=21042"}],"version-history":[{"count":1,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/21042\/revisions"}],"predecessor-version":[{"id":21044,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/21042\/revisions\/21044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20195"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=21042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=21042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=21042"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=21042"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=21042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}