Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Shifting landscapes and cultural changes

By Kevin Breen
cyber freepik

<a href="http://www.freepik.com">Designed by rawpixel.com / Freepik</a>

March 1, 2021

Following a frenzied year where businesses were forced to adapt overnight to fully remote environments and brand-new threats, we enter 2021 with heightened stability and knowledge of the cyber risks ahead. Cybersecurity teams need to be proactive to be effective, especially as organizations explore a permanent hybrid or remote workforce model. And with major attacks throughout the year targeting well-known, consumer-facing brands including the Garmin ransomware attack, HHS breach, and the Marriott phishing breach, security impacted every single industry around the globe. As a result, security leaders were forced to be even more cognizant of their approach to protecting their organization, often forcing them to refine and future proof their approaches to this new world of security. After watching the events of 2020 and analyzing threat actors’ approaches, here’s what I expect to see in 2021:

 

More focus on cyber readiness

The attack surface has grown. 100% remote workforces, accelerated digital transformation, and ever more sophisticated threats have forced security leaders and teams to widen their view. Coming into the new year, mindsets will have to be increasingly focused on cyber readiness as opposed to response alone. This will force annual training to be replaced with shorter, more frequent incident response simulations that can keep up with the threat landscape. Astonishingly, considering how fast things move and change, over a third of organizations leave a year or more between cyber crisis simulations – and 42% don’t have regular cross-team incident planning. If organizations want to be confident in their crisis response, this has to change.

 

A shortage of skills to protect the cloud

According to IDC, over 500 million digital apps and services will be developed and deployed using cloud-native approaches by 2023. That’s the same number of apps developed in total over the last 40 years. However, protecting this cloud environment requires a different type of thinking compared to traditional security skill sets – one which is currently in short supply. If organizations have any hope of staying ahead of the threat actors, it’s imperative that more of these skills are acquired and exercised, either by developing existing talent within the organization or by hiring externally. Without the ability to mitigate these issues, the expansion of cloud usage will result in organizational risk ballooning.

 

Ransomware will evolve

According to recent research, 56% of organizations have suffered a ransomware attack in the last year. These types of targeted attacks will continue to wreak havoc as threat actors get more creative, precise and targeted with their approach. In fact, with businesses continuing to pay attackers, they remain uniquely motivated. Among those hit by ransomware in that same survey, 27% chose to pay the ransom, costing organizations on average $1.1 million USD. Security teams need to recognize and overcome the previous way of thinking – the cognitive biases towards a situation – in order to promote resilience and defend against today’s threats. For this reason, it’s important that security and business leaders ensure their teams are regularly exercising crisis response scenarios. Teams will react more effectively in a crisis if they’re familiar with the situation at hand, especially with ransomware attacks.

 

Economic recession could lead to cybercriminal opportunity

When a recession hits, the most impacted industries – in the case of the pandemic, tourism and hospitality – become the most vulnerable to cyberattack. With layoffs and furloughs becoming commonplace, the people who once looked after data may be out of a job or lose confidence in their employment, resulting in a decrease in security effectiveness. One unfortunate example of this is when the U.S. travel management firm CWT paid $4.5 million in July 2020 to bad actors who stole sensitive corporate files and knocked 30,000 computers offline. Paying ransoms unfortunately encourages further criminal attacks without any guarantee that the encrypted files will be restored, so organizations need to be prepared to defend against these threats instead of resorting to immediate payment.

 

Security plans for continued remote working

With remote work here to stay in some capacity, organizations need to adopt an agile security strategy. Over the last year, as companies have seen their perimeter almost completely dissolve, they have become better at being more adaptable. This will need to continue, with security teams relying more on solutions such as VPNs to protect their employees from breaches in the first place, while also rethinking incident response plans to overcome the challenges posed by not sitting in the same office when a crisis hits.

 

Home network security demand will skyrocket

The reality of long-term remote work means employees’ own home office equipment, which likely isn’t patched, presents a greater potential issue. This lack of security impacts not only the individual and their network, but also others within the organization. The industry will see a shift in the way cybersecurity teams handle home office security, and some may even go to the lengths of putting restrictions on hardware.

 

An increase in DevSecOps deployment

Lastly, with the huge shift to agile methodologies, organizations are constantly adjusting and writing new code to be pushed to production right away. This speed is often necessary; however, it does create pressure to reduce security oversight. To combat this problem, many organizations will look to refine the DevSecOps process to ensure the separate needs of both speed and security are addressed. This will make developers focus more on understanding the latest techniques and vulnerabilities as they’re building their code, resulting in more securely built code from the onset, so that security teams are less at risk from vulnerabilities in the long run.

There’s no doubt that security leaders have learned - and been challenged - by the volatility and rapid change in 2020. Through a push to keep the hybrid workforce secure, we’ll see security leaders focus on having a proactive, crisis-ready mindset in 2021. To achieve this, CISOs must ensure they have adequately skilled people in place who can respond, adapt and quickly pivot priorities in times of crisis.

KEYWORDS: cyber security information security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin breen

Kevin Breen is Director Cyber Threat Research at Immersive Labs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smartphone2-900px.jpg

    Workplace Emergency Planning is Shifting, But Employees Don't Feel It's a Priority

    See More
  • SEC1219-cybergap-Feat-slide1_900px

    The future of hacking: COVID-19 shifting the way hackers work and who they target

    See More
  • Five hands circled together

    The new normal: How to embrace a cultural approach to zero trust

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing