Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Even the most experienced cyber professionals agree: We can’t prevent all breaches

By Justin Fier
hacked-freepik1170x658x37.jpg
January 17, 2022

The reality of cybersecurity is that it is not a solvable problem. We cannot stop determined attackers from getting into systems. They’re too sophisticated and digital infrastructure is only becoming more complex. What we can do, however, is take necessary steps to minimize risk and disruption once attackers inevitably get inside. The sooner security leaders can accept that reality, the better. 

Instead of focusing on preventing breaches, cybersecurity professionals should focus on improving security hygiene and resilience. More important than building up walls, organizations should prioritize minimizing costs, downtime and disruption in the case of an eventual cyberattack.

 

It’s impossible to stop all breaches

The best way to protect your most critical assets is to assume that breaches are unavoidable — it’s not a matter of if your organization will be breached but when. This “assume the breach” philosophy means that if you can anticipate a breach, you can build your cyber defenses up to minimize damage. 

In fact, since the onset of the pandemic, cyberattacks are up 600%, as hyper connectivity spurred by the rapid shift to remote work. In addition, globalized supply chains and human error all expanded the threat surface and increased our vulnerabilities. As hackers become more sophisticated and evasive, it is futile to try to stop them from getting into critical systems entirely. 

While most cybersecurity leaders are focused on improving risk management, fewer report progress on “foundational cyber hygiene.” Improving foundational security starts with preparing for the worst-case scenario. We need to take every precaution because the lasting impacts of a cyberattack are becoming increasingly devastating and difficult to control.


Businesses and leaders play catch-up

In a recent study, 86% of security professionals agreed that breaches are inevitable. Nearly all those surveyed said they anticipate some form of a data breach within the next year. 

Meanwhile, the rest of the C-Suite are still catching up and embracing the “assume breach” mentality. After high-profile attacks on organizations like Colonial Pipeline, SolarWinds, and JBS revealed that any type of organization is vulnerable and can be a target for hackers, many leaders took a step back to reevaluate their security postures.

The C-Suite is starting to understand the growing threats to their organizations, but education gaps exist. Leaders must understand that cybersecurity is a continuous and evolving process. Without consistent evaluations and resources, security is impossible. 

 

Preparing for the inevitable

Legacy technologies like firewalls are no longer enough to keep bad actors out. The traditional perimeters of the office that existed when these technologies were created no longer exist in our hybrid work environment. 

Security teams also need to identify threats proactively. What is the best way to do this? Expand visibility into the full spectrum of an organization’s digital infrastructure. 

Monitoring all network traffic can be a daunting task for short-staffed and overworked security teams. Resilience doesn’t necessarily mean throwing more people at a problem. Machine-speed attacks warrant a machine-speed response. Artificial intelligence (AI) and machine learning tools can lighten this burden by alerting security teams to top priority anomalies and threats within the network. 

 

Anticipating your enemy

It can be difficult for those unfamiliar with security to understand an invisible enemy. In an analysis of several environments, Darktrace discovered "sleeper attacks,” the stealthy threats that exist without security teams’ knowledge, in 75% of organizations scanned.

While teams can glean helpful information from analyzing historical attacks, this activity cannot anticipate new types of novel threats. Predictive analytics can help organizations be ready for anything — or almost anything. AI can also help contain threats in the early stages, preventing malicious activity from escalating while giving human security teams valuable airtime to react and remediate the root cause of any incidents.

By assuming a breach is inevitable, organizations can focus on early identification of threats and anomalies to help prevent an initial breach from spreading laterally within a network and becoming a cyber disaster. Preparing for the worst means organizations don’t have to rely on prayers for successful remediation.

KEYWORDS: cyber security data breaches information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Justin Fier is Director for Cyber Intelligence and Analysis at Darktrace.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ransomware-attack-freepik

    Attackers help victims pay their ransoms, even offer tips to prevent future attack

    See More
  • Privacy

    Research Reveals 70% of Privacy Professionals Agree Their Systems Will Not Support New Privacy Regulations

    See More
  • SEC0320-cyber-feat-slide1_900px.jpg

    We are all Jeff Bezos

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing