Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

5 Minutes With

How to build cyber resilience in a rapidly evolving threat landscape

By Rachelle Blair-Frasier, Editor in Chief
Justin Shattuck 5 minutes with logo

Photo via Shattuck

December 20, 2023

The ransomware landscape is ever evolving and it can seem as though there is a new headline about a breach, extortion demand or fallout after an attack every day. But how can security leaders build cyber resilience? 

Here, we talk to Justin Shattuck, Chief Information Security Officer (CISO) at Resilience.

Security magazine: Tell us about your title and background. 

Shattuck: I currently serve as the CISO for Resilience, a cyber risk company bridging the divide between cyber insurance, risk management and cybersecurity. I’ve been at Resilience since 2020, previously serving as Vice President of Security Operations and Principal Security Engineer. 

I’ve been a threat hunter for most of my career. Prior to Resilience, I served in threat research leadership roles at Baffin Bay Networks and F5. I also founded Loryka, which was later acquired by Baffin Bay. With more than 20 years of experience in security product development and threat research, I’ve always been drawn to hard problems — they’re what get me out of bed in the morning. Understanding how we help companies stop chasing threats, but also strategically shift the game, is as hard a problem as it gets. 

Security: How has the ransomware landscape changed over the past few years? What do these shifts mean for the cybersecurity industry? 

Shattuck: The ransomware crisis has expanded both in scale and scope over the last few years. It’s impossible to read the news each morning without seeing a headline about a new breach, extortion demand or lingering fallout after an attack. 

In fact, based on internal data of client incidents and public extortion demand data from Chainalysis, 2023 is poised to be one of the most prolific years for ransomware. Even though fewer companies across the board are choosing to pay ransoms, hackers are shifting their strategies accordingly, with a renewed focus on targeting bigger companies that can afford bigger payments. It’s likely that 2024 will be even worse. The geopolitical uncertainty we’re witnessing could bring new state-backed threat actors into the fold, and generative AI may continue to make hacking operations easier than ever to carry out. 

The bottom line is that ransomware is worsening — but mitigation strategies have remained stagnant. As a result, ransoms keep getting paid, threat actors become more emboldened and we continue to live in fear. This is a difficult cycle, and I believe we need a complete paradigm shift to halt it once and for all. 

Security: How is this evolving threat landscape shifting how you think about cyber risk? 

Shattuck: Cyber risk has traditionally been thought of in black-and-white terms: have we been hacked, or are we safe? But the ransomware playbook keeps changing, and hackers manage to stay several steps ahead of us. We need a more nuanced approach. Specifically, we need to start conceptualizing cyber hygiene as an integrated component of a broader risk management strategy. 

The first and most important step in this process is recognizing that ransomware is inevitable. We can try to prevent attacks at the source all we want, but the truth of the matter is that becoming 100% secure is an impossibility. Once companies can learn to live with this reality, they can finally start building a truly comprehensive mitigation strategy. They can make informed calculations about how at-risk they are, based on industry and typical attack patterns; how critical and therefore limited their operations would be after a hypothetical attack; and what the financial repercussions might be. Based on those variables, each company can confidently invest in the cybersecurity tools necessary to plug any existing gaps — and go forth knowing that even in the event of an attack, they would essentially be immune to the most devastating fallout. 

This kind of risk calculation requires increased internal collaboration. Across industries, cybersecurity has historically been siloed from risk management and financial operations. But this segmentation has only led to deep disconnects that make cyber risk planning infinitely harder and more inefficient. Actively breaking down those barriers and prioritizing joint cyber hygiene work is the key to reducing risk and unlocking comprehensive attack mitigation. 

Security: How can companies limit financial fallout from a breach? 

Shattuck: Cyber hygiene is a crucial factor when it comes to limiting financial fallout after a breach. If a company thinks of ransomware as inevitable, and has proactively put the proper controls and strategies in place, the frantic need to pay a ransom decreases significantly. This enables companies to display a show of force against hackers, who are primarily motivated by monetary gain. 

Threat actors thrive on notoriety, public fear and ultimately, financial gain. But if companies can build up their cyber hygiene, assess their real risk and put the right controls in place, they can essentially become bulletproof to any inevitable attack that arises. Hacks will still happen — they just won’t make headlines. And as a result, hackers themselves will lose their main incentives to continue wreaking havoc on society. 

Security: What do you predict for the cybersecurity industry in 2024?

Shattuck: Resilience’s own data shows that threat actors are constantly evolving and getting smarter. In 2024, I predict that hackers will uplevel their attacks against identity providers (as we saw with the recent Okta breach), and continue to target third-party vendors (so they can significantly increase the scale of an attack to hit hundreds or even thousands of companies at once). This is all cause for concern, because adversaries are learning to target infrastructure that many companies trust to secure them. 

In addition, I see both concern and promise when it comes to AI in cybersecurity. On the one hand, hackers are likely going to continue to leverage large language models (LLMs) for social engineering in order to accelerate time to ransom. But on the other hand, generative AI can help organizations identify potential security vulnerabilities more efficiently, and even help notice new tactics or patterns that threat actors are using. 

Lastly, I predict more attempts from hackers to extort victim organizations without the use of ransomware, but rather by applying pressure elsewhere through regulatory and compliance levers. For instance, we recently witnessed a malicious actor supplying the SEC with a complaint against an organization they were extorting in an attempt to pressure or to retaliate. 

KEYWORDS: 5 minutes with CISO leadership data breach hacker mitigation ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Digital dollar concepts

    Emerging Cyber Threats in a Rapidly Evolving Landscape

    See More
  • security teams

    Lessons from leaders: How security teams foster resilience and support

    See More
  • Josh Phillips

    Josh Phillips | Most Influential People in Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!