Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

Enhancing cyber resilience in an evolving threat environment

By Bryan Sartin
Light blue digital lines on black background

Image courtesy of Adi Goldstein via Unsplash

January 10, 2025

Cyber incidents pose a significant risk to organizations across every industry. Despite numerous warnings about malicious activities and their severe financial and reputational impacts, many organizations are less prepared for cyber threats than they realize.

The landscape is continually evolving, with advancements like AI accelerating social engineering attacks and cybercriminals exploiting cloud servers to help run their operations. Keeping up with these ever-changing threats can be challenging.

A dynamic cyber environment

Organizations today must be vigilant against various types of attacks, including phishing, malware, and distributed denial-of-service (DDoS). In addition, ransomware remains one of the most common cyber threats — enabling data theft from millions, and funding criminal activities (including human trafficking and global terrorism) through paid ransoms.

A recent IDC report commissioned by Kyndryl revealed that 70% of IT leaders experienced ransomware attacks in the preceding year, with two-thirds opting to pay the ransom. Additionally, 90% of those affected reported data exfiltration, leading to significant disruptions and financial losses.

Many incidents start with a single user clicking on a malicious link. In fact, human error often plays a critical role in cybersecurity breaches. In response to a recent example, the FBI and CISA issued a Cybersecurity Advisory to #StopRansomware against threat actor BlackSuit, which typically demands ransoms ranging from $1M to $60M – usually through phishing emails. The increasing sophistication of cyber threats, including the use of generative AI for social engineering and malware distribution, underscores the need for a cohesive incident-response protocol.

The prevalence of ransomware highlights the need for more effective digital forensics teams. However, fragmented incident response and recovery processes often exacerbate problems, hindering the abilities of businesses and governments to recover swiftly after an incident.

Emerging threats

Generative AI is a powerful new tool for bad actors. This technology can create convincing audio and video clips impersonating real individuals (deep fakes), making it easier to bypass security systems and execute phishing or social engineering attacks. Additionally, generative AI is being used to spread malware with rolling codes that are harder for IT security systems to detect.

In response, businesses and governments must adapt AI and machine learning to identify patterns and detect operational anomalies. Without these technologies, organizations will struggle to meet these rising threats.

CIOs, CISOs and other officers should start by validating essential controls, stress-testing their response and recovery capabilities and updating training programs to address AI-based threats.

Building cyber resilience

Human error and AI are significant concerns for cybersecurity experts. Businesses and governments must focus on building a cyber resilience strategy to anticipate, protect against, withstand and recover from various cyberattacks. This involves not only investing in the right technologies, but also fostering a holistic approach to cybersecurity within the organization.

The first step in building cyber resilience is identifying critical services and their impact tolerances for data loss and outages. Organizations should then map their infrastructures to applications and assess whether existing controls can protect against disruptive attacks, detect future threats and facilitate recovery. Finally, businesses and governments should develop customized roadmaps for continuously improving resilience and modernizing infrastructure. These roadmaps should include plans for third-party technical assistance, particularly for sector-specific applications. By maintaining a focus on cybersecurity and potential threats, organizations can cultivate a culture of healthy skepticism, reducing the likelihood of successful attacks or human error incidents like phishing breaches by BlackSuit.

Cyber threats have always evolved alongside technological advancements. The unprecedented capability of generative AI to enhance and accelerate malicious activities necessitates more robust and comprehensive defenses.

To adapt, organizations must equip themselves with AI-enabled defenses that surpass AI-enabled threats, while adopting cyber resilience strategies that integrate cybersecurity, business continuity, and disaster recovery to mitigate disruptive and costly cyberattacks.

KEYWORDS: artificial intelligence (AI) cyber resilience cyberattack cybersecurity data recovery

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bryan Sartin is Vice President of Security & Resiliency at Kyndryl

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Justin Shattuck 5 minutes with logo

    How to build cyber resilience in a rapidly evolving threat landscape

    See More
  • mobile device usage

    Managing risks in an evolving cybersecurity environment

    See More
  • Keeping Customer Data Safe in an Evolving Threat Landscape

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing