Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

Byline: The new stress test

By Dale “Dr. Z” Zabriskie
laptop open on black desk

Image via Unsplash

November 11, 2024

“Do Not Pay” policies and pending bills elevating ransomware to a terrorist threat – these are just a sampling of the strategies that companies and governments are enforcing to deter ransomware groups from attacking. But the harsh reality is that ransomware attacks are on the rise, becoming a “when,” not “if” situation for companies.

A recent report from Cohesity found that almost 1 in 2 (49%) of global IT and security leaders said they had stress-tested their ‘data security, data management, and data recovery processes or solutions’, by simulating a response to a cyber event or data breach, in the past six months. With that in mind, a shocking 2% responded that they were actually capable of recovering data and restoring business processes within 24 hours, and 83% were willing to pay a ransom to recover data and restore business processes faster.

Stress testing is a critical step as companies build cyber resilience. However, in the face of rising threats and the widespread adoption of new technologies like AI and cloud services, the legacy approach towards stress testing is in dire need of an overhaul to keep pace with the rapidly evolving cyber landscape.

The traditional approach

In broad terms, a “stress test” in cybersecurity is an evaluation designed to determine the resilience and robustness of systems, networks, or applications under extreme or abnormal conditions. The goal is to assess how these systems handle malicious attacks or other stressful conditions that could potentially cause a system to fail or degrade in performance.

Key aspects of a traditional cybersecurity stress test include:

  • Objectives and Scope: Determining which systems, networks, or applications will be tested, as well as identifying the types of threats the organization is most susceptible to.
  • System Mapping: Analyzing and mapping out the IT infrastructure to understand all potential entry points, including cloud services.
  • Simulating High Traffic Loads: Testing how a system or network performs under heavy traffic, such as during a Distributed Denial of Service (DDoS) attack, where the goal is to overwhelm the system with requests.
  • Malicious Attack Simulation: Stress tests may involve simulated cyberattacks, like attempts to exploit vulnerabilities, to see how a system responds and whether it (and the people involved) can repel the attack and recover quickly.
  • Recovery and Failover: Assessing a system’s ability to recover from a failure or to switch to backup systems (failover) during a crisis, especially ransomware.

While these steps should remain paramount as part of a company’s stress testing strategy, recent industry shifts and technological advancements should be taken into account and added into existing strategies to ensure testing remains thorough and up to date.

Foremost, stress tests should now undoubtedly consider AI-driven attacks, such as automated malware or AI-powered phishing campaigns. These types of attacks have been gaining considerable traction with ransomware groups, with the FBI even issuing a warning earlier this year to individuals and businesses in

San Francisco to be aware of the escalating threat posed by criminals leveraging AI tools to conduct increasingly sophisticated cyberattacks and voice/video cloning scams. In fact, Cohesity recently found that 80% of IT leaders globally reported they had responded to what they believe to be AI-based attacks or threats within the last 12 months. By incorporating a variety of simulated AI-enabled attacks into stress tests, organizations can better prepare and understand how well current defenses are able to cope with these emerging threats.

Additionally, an increasing number of companies are shifting operations to the cloud, with global spending on cloud IT infrastructure expected to reach $129 billion in 2024. As more and more companies make the shift, especially with the increase in hybrid or remote work, cybercriminals are exploiting neglected areas of the cloud to carry out credential-based, hijacking, and man-in-the-middle attacks. In order to counteract these developments, stress tests should now consider and assess how well a given company’s cloud-based services, hybrid environments, and multi-cloud setups can withstand high loads and attacks.

Lastly, IT decision-makers must prioritize regular stress testing to ensure their systems remain resilient and secure. With the rapid pace of technological advancements, new vulnerabilities, and evolving attacks, stress testing must evolve at the pace of innovation to both identify and quell weaknesses before they can be exploited.

Comprehensive stress testing is being recognized as a critical step by some of the world's preeminent organizations in the financial sector, with the European Central Bank recently conducting an evaluation of 109 banks to ensure they had in place ‘adequate business continuity, communication and recovery plans, which should consider a wide enough range of cyber risk scenarios’. As governing bodies embrace more rigorous testing scenarios, organizations proactively testing security systems to a similarly high standard should be considered best practice. By incorporating the steps listed above, organizations can strengthen their resilience by identifying bottlenecks, vulnerabilities, and weak points in their infrastructure while also keeping pace with evolving regulatory expectations and the growing complexity of cyber threats in today's digital landscape.

KEYWORDS: Artificial Intelligence (AI) Security cyberattack cybercriminal cybersecurity ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dr. z headshot

Dale “Dr. Z” Zabriskie is Field CISO at Cohesity. Image courtesy of Zabriskie

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • leadership

    New Survey Reveals CISO Stress and the Toll it Takes

    See More
  • Lose the Stress, Keep Access Control Training Interactive

    See More
  • stressed

    Mental health warning in cybersecurity: CISOs across the industry reporting high levels of stress

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing