Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

5 Minutes With

How to build cyber resilience in a rapidly evolving threat landscape

By Rachelle Blair-Frasier, Editor in Chief
Justin Shattuck 5 minutes with logo

Photo via Shattuck

December 20, 2023

The ransomware landscape is ever evolving and it can seem as though there is a new headline about a breach, extortion demand or fallout after an attack every day. But how can security leaders build cyber resilience? 

Here, we talk to Justin Shattuck, Chief Information Security Officer (CISO) at Resilience.

Security magazine: Tell us about your title and background. 

Shattuck: I currently serve as the CISO for Resilience, a cyber risk company bridging the divide between cyber insurance, risk management and cybersecurity. I’ve been at Resilience since 2020, previously serving as Vice President of Security Operations and Principal Security Engineer. 

I’ve been a threat hunter for most of my career. Prior to Resilience, I served in threat research leadership roles at Baffin Bay Networks and F5. I also founded Loryka, which was later acquired by Baffin Bay. With more than 20 years of experience in security product development and threat research, I’ve always been drawn to hard problems — they’re what get me out of bed in the morning. Understanding how we help companies stop chasing threats, but also strategically shift the game, is as hard a problem as it gets. 

Security: How has the ransomware landscape changed over the past few years? What do these shifts mean for the cybersecurity industry? 

Shattuck: The ransomware crisis has expanded both in scale and scope over the last few years. It’s impossible to read the news each morning without seeing a headline about a new breach, extortion demand or lingering fallout after an attack. 

In fact, based on internal data of client incidents and public extortion demand data from Chainalysis, 2023 is poised to be one of the most prolific years for ransomware. Even though fewer companies across the board are choosing to pay ransoms, hackers are shifting their strategies accordingly, with a renewed focus on targeting bigger companies that can afford bigger payments. It’s likely that 2024 will be even worse. The geopolitical uncertainty we’re witnessing could bring new state-backed threat actors into the fold, and generative AI may continue to make hacking operations easier than ever to carry out. 

The bottom line is that ransomware is worsening — but mitigation strategies have remained stagnant. As a result, ransoms keep getting paid, threat actors become more emboldened and we continue to live in fear. This is a difficult cycle, and I believe we need a complete paradigm shift to halt it once and for all. 

Security: How is this evolving threat landscape shifting how you think about cyber risk? 

Shattuck: Cyber risk has traditionally been thought of in black-and-white terms: have we been hacked, or are we safe? But the ransomware playbook keeps changing, and hackers manage to stay several steps ahead of us. We need a more nuanced approach. Specifically, we need to start conceptualizing cyber hygiene as an integrated component of a broader risk management strategy. 

The first and most important step in this process is recognizing that ransomware is inevitable. We can try to prevent attacks at the source all we want, but the truth of the matter is that becoming 100% secure is an impossibility. Once companies can learn to live with this reality, they can finally start building a truly comprehensive mitigation strategy. They can make informed calculations about how at-risk they are, based on industry and typical attack patterns; how critical and therefore limited their operations would be after a hypothetical attack; and what the financial repercussions might be. Based on those variables, each company can confidently invest in the cybersecurity tools necessary to plug any existing gaps — and go forth knowing that even in the event of an attack, they would essentially be immune to the most devastating fallout. 

This kind of risk calculation requires increased internal collaboration. Across industries, cybersecurity has historically been siloed from risk management and financial operations. But this segmentation has only led to deep disconnects that make cyber risk planning infinitely harder and more inefficient. Actively breaking down those barriers and prioritizing joint cyber hygiene work is the key to reducing risk and unlocking comprehensive attack mitigation. 

Security: How can companies limit financial fallout from a breach? 

Shattuck: Cyber hygiene is a crucial factor when it comes to limiting financial fallout after a breach. If a company thinks of ransomware as inevitable, and has proactively put the proper controls and strategies in place, the frantic need to pay a ransom decreases significantly. This enables companies to display a show of force against hackers, who are primarily motivated by monetary gain. 

Threat actors thrive on notoriety, public fear and ultimately, financial gain. But if companies can build up their cyber hygiene, assess their real risk and put the right controls in place, they can essentially become bulletproof to any inevitable attack that arises. Hacks will still happen — they just won’t make headlines. And as a result, hackers themselves will lose their main incentives to continue wreaking havoc on society. 

Security: What do you predict for the cybersecurity industry in 2024?

Shattuck: Resilience’s own data shows that threat actors are constantly evolving and getting smarter. In 2024, I predict that hackers will uplevel their attacks against identity providers (as we saw with the recent Okta breach), and continue to target third-party vendors (so they can significantly increase the scale of an attack to hit hundreds or even thousands of companies at once). This is all cause for concern, because adversaries are learning to target infrastructure that many companies trust to secure them. 

In addition, I see both concern and promise when it comes to AI in cybersecurity. On the one hand, hackers are likely going to continue to leverage large language models (LLMs) for social engineering in order to accelerate time to ransom. But on the other hand, generative AI can help organizations identify potential security vulnerabilities more efficiently, and even help notice new tactics or patterns that threat actors are using. 

Lastly, I predict more attempts from hackers to extort victim organizations without the use of ransomware, but rather by applying pressure elsewhere through regulatory and compliance levers. For instance, we recently witnessed a malicious actor supplying the SEC with a complaint against an organization they were extorting in an attempt to pressure or to retaliate. 

KEYWORDS: 5 minutes with CISO leadership data breach hacker mitigation ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Digital dollar concepts

    Emerging Cyber Threats in a Rapidly Evolving Landscape

    See More
  • Cybersecurity

    Accelerating discovery and recovery in today’s threat landscape

    See More
  • Resilience

    Knowledge is key to mitigate risk, maximize resilience

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing