4 Lessons of Security Leaders For 2022
4 Lessons of Security Leaders For 2022
4 Lessons of Security Leaders For 2022
Security Leaders
for 2022
The past two years have been a challenge for security leaders. And the consequence of the SolarWinds hacks is a deeper
2020 started with COVID-19 and a pell-mell shift to remote fear of supply chain attacks, and an almost existential
work, and finished with the gut-punch of a major breach question about the vendors every company relies on:
(SolarWinds) that put hundreds of organizations into frantic Should we trust our trusted partners?
assess-and-remediate mode. The year will be seen as one of
the most consequential in any security professional’s career.
For many, there will be a bright line dividing how things were
• 78% of companies expect another
SolarWinds-style supply chain attack.
before the pandemic from how they are now.
The consequences of the pandemic’s rapid shift to work-from- • 88% of orgs are increasing security
home — and the exponentially faster shift to cloud technology spending — (35% say “increasing
that it helped drive — include less visibility into the security significantly.”)
ecosystem, less control of access points, and a larger, more
varied attack surface for adversaries to target.
• Rising cloud adoption is the top
issue security challenge driving security
Yet the challenges of 2021 are not unfamiliar. They are, broadly: investment.
consistency, cost and complexity. To explore the top security
challenges facing midmarket and enterprise organizations and
to understand emerging strategies, we conducted a global
survey of 535 security leaders in nine leading economies
across multiple industry verticals with research firm Enterprise
Strategy Group.
For supply chain threats (and any other kind), you need to improve your ability to see
suspicious lateral movement within your networks. Whether bad guys sneak in through a
vendor’s software patch or an employee’s stolen credentials, you’ll want to be able to spot
them as they slither through your network looking for the goods.
But weak passwords, poor multifactor authentication methods and not using a single sign-on
solution can punch holes in this strategy. This is where organizations need a modern SOC, and
a well-defined and closely monitored identity policy with strong enforcement and monitoring,
to fill those gaps.
DevOps practices broke down the traditional silos between development and operations teams
for faster software development and the high-quality delivery of software and digital experiences.
The next step is DevSecOps, integrating security. DevSecOps brings all three disciplines into one
flow with shared goals and measurements, and tools and practices that reduce friction between
the three traditionally siloed groups. This provides an opportunity for security automation and
introduces security earlier in the development process.
Even if your organization is not ready to embrace this full philosophical shift, you can use the
singular experiences of the last 2 years to advocate for the importance of integrated security
thinking, at every stage of IT and the business.
After all, who knows what 2022 (and beyond) will hold.
Get Report
Splunk, Splunk> and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States and
other countries. All other brand names, product names or trademarks belong to their respective owners. © 2021 Splunk Inc.
All rights reserved.