Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

Enhancing cyber resilience in an evolving threat environment

By Bryan Sartin
Light blue digital lines on black background

Image courtesy of Adi Goldstein via Unsplash

January 10, 2025

Cyber incidents pose a significant risk to organizations across every industry. Despite numerous warnings about malicious activities and their severe financial and reputational impacts, many organizations are less prepared for cyber threats than they realize.

The landscape is continually evolving, with advancements like AI accelerating social engineering attacks and cybercriminals exploiting cloud servers to help run their operations. Keeping up with these ever-changing threats can be challenging.

A dynamic cyber environment

Organizations today must be vigilant against various types of attacks, including phishing, malware, and distributed denial-of-service (DDoS). In addition, ransomware remains one of the most common cyber threats — enabling data theft from millions, and funding criminal activities (including human trafficking and global terrorism) through paid ransoms.

A recent IDC report commissioned by Kyndryl revealed that 70% of IT leaders experienced ransomware attacks in the preceding year, with two-thirds opting to pay the ransom. Additionally, 90% of those affected reported data exfiltration, leading to significant disruptions and financial losses.

Many incidents start with a single user clicking on a malicious link. In fact, human error often plays a critical role in cybersecurity breaches. In response to a recent example, the FBI and CISA issued a Cybersecurity Advisory to #StopRansomware against threat actor BlackSuit, which typically demands ransoms ranging from $1M to $60M – usually through phishing emails. The increasing sophistication of cyber threats, including the use of generative AI for social engineering and malware distribution, underscores the need for a cohesive incident-response protocol.

The prevalence of ransomware highlights the need for more effective digital forensics teams. However, fragmented incident response and recovery processes often exacerbate problems, hindering the abilities of businesses and governments to recover swiftly after an incident.

Emerging threats

Generative AI is a powerful new tool for bad actors. This technology can create convincing audio and video clips impersonating real individuals (deep fakes), making it easier to bypass security systems and execute phishing or social engineering attacks. Additionally, generative AI is being used to spread malware with rolling codes that are harder for IT security systems to detect.

In response, businesses and governments must adapt AI and machine learning to identify patterns and detect operational anomalies. Without these technologies, organizations will struggle to meet these rising threats.

CIOs, CISOs and other officers should start by validating essential controls, stress-testing their response and recovery capabilities and updating training programs to address AI-based threats.

Building cyber resilience

Human error and AI are significant concerns for cybersecurity experts. Businesses and governments must focus on building a cyber resilience strategy to anticipate, protect against, withstand and recover from various cyberattacks. This involves not only investing in the right technologies, but also fostering a holistic approach to cybersecurity within the organization.

The first step in building cyber resilience is identifying critical services and their impact tolerances for data loss and outages. Organizations should then map their infrastructures to applications and assess whether existing controls can protect against disruptive attacks, detect future threats and facilitate recovery. Finally, businesses and governments should develop customized roadmaps for continuously improving resilience and modernizing infrastructure. These roadmaps should include plans for third-party technical assistance, particularly for sector-specific applications. By maintaining a focus on cybersecurity and potential threats, organizations can cultivate a culture of healthy skepticism, reducing the likelihood of successful attacks or human error incidents like phishing breaches by BlackSuit.

Cyber threats have always evolved alongside technological advancements. The unprecedented capability of generative AI to enhance and accelerate malicious activities necessitates more robust and comprehensive defenses.

To adapt, organizations must equip themselves with AI-enabled defenses that surpass AI-enabled threats, while adopting cyber resilience strategies that integrate cybersecurity, business continuity, and disaster recovery to mitigate disruptive and costly cyberattacks.

KEYWORDS: artificial intelligence (AI) cyber resilience cyberattack cybersecurity data recovery

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bryan Sartin is Vice President of Security & Resiliency at Kyndryl

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Justin Shattuck 5 minutes with logo

    How to build cyber resilience in a rapidly evolving threat landscape

    See More
  • mobile device usage

    Managing risks in an evolving cybersecurity environment

    See More
  • Keeping Customer Data Safe in an Evolving Threat Landscape

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    ON DEMAND: Retail security professionals face an array of security challenges, from organized retail crime to cyber-physical threats and public safety concerns. Learn how one of the world’s largest retail destinations stays ahead of these emerging threats.
  • May 12, 2026

    Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

    ON DEMAND: As the Americas plan the world’s biggest football tournament in 2026, security, resilience, & travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks & readiness considerations that matter most.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing