Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Even the most experienced cyber professionals agree: We can’t prevent all breaches

By Justin Fier
hacked-freepik1170x658x37.jpg
January 17, 2022

The reality of cybersecurity is that it is not a solvable problem. We cannot stop determined attackers from getting into systems. They’re too sophisticated and digital infrastructure is only becoming more complex. What we can do, however, is take necessary steps to minimize risk and disruption once attackers inevitably get inside. The sooner security leaders can accept that reality, the better. 

Instead of focusing on preventing breaches, cybersecurity professionals should focus on improving security hygiene and resilience. More important than building up walls, organizations should prioritize minimizing costs, downtime and disruption in the case of an eventual cyberattack.

 

It’s impossible to stop all breaches

The best way to protect your most critical assets is to assume that breaches are unavoidable — it’s not a matter of if your organization will be breached but when. This “assume the breach” philosophy means that if you can anticipate a breach, you can build your cyber defenses up to minimize damage. 

In fact, since the onset of the pandemic, cyberattacks are up 600%, as hyper connectivity spurred by the rapid shift to remote work. In addition, globalized supply chains and human error all expanded the threat surface and increased our vulnerabilities. As hackers become more sophisticated and evasive, it is futile to try to stop them from getting into critical systems entirely. 

While most cybersecurity leaders are focused on improving risk management, fewer report progress on “foundational cyber hygiene.” Improving foundational security starts with preparing for the worst-case scenario. We need to take every precaution because the lasting impacts of a cyberattack are becoming increasingly devastating and difficult to control.


Businesses and leaders play catch-up

In a recent study, 86% of security professionals agreed that breaches are inevitable. Nearly all those surveyed said they anticipate some form of a data breach within the next year. 

Meanwhile, the rest of the C-Suite are still catching up and embracing the “assume breach” mentality. After high-profile attacks on organizations like Colonial Pipeline, SolarWinds, and JBS revealed that any type of organization is vulnerable and can be a target for hackers, many leaders took a step back to reevaluate their security postures.

The C-Suite is starting to understand the growing threats to their organizations, but education gaps exist. Leaders must understand that cybersecurity is a continuous and evolving process. Without consistent evaluations and resources, security is impossible. 

 

Preparing for the inevitable

Legacy technologies like firewalls are no longer enough to keep bad actors out. The traditional perimeters of the office that existed when these technologies were created no longer exist in our hybrid work environment. 

Security teams also need to identify threats proactively. What is the best way to do this? Expand visibility into the full spectrum of an organization’s digital infrastructure. 

Monitoring all network traffic can be a daunting task for short-staffed and overworked security teams. Resilience doesn’t necessarily mean throwing more people at a problem. Machine-speed attacks warrant a machine-speed response. Artificial intelligence (AI) and machine learning tools can lighten this burden by alerting security teams to top priority anomalies and threats within the network. 

 

Anticipating your enemy

It can be difficult for those unfamiliar with security to understand an invisible enemy. In an analysis of several environments, Darktrace discovered "sleeper attacks,” the stealthy threats that exist without security teams’ knowledge, in 75% of organizations scanned.

While teams can glean helpful information from analyzing historical attacks, this activity cannot anticipate new types of novel threats. Predictive analytics can help organizations be ready for anything — or almost anything. AI can also help contain threats in the early stages, preventing malicious activity from escalating while giving human security teams valuable airtime to react and remediate the root cause of any incidents.

By assuming a breach is inevitable, organizations can focus on early identification of threats and anomalies to help prevent an initial breach from spreading laterally within a network and becoming a cyber disaster. Preparing for the worst means organizations don’t have to rely on prayers for successful remediation.

KEYWORDS: cyber security data breaches information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Justin Fier is Director for Cyber Intelligence and Analysis at Darktrace.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cost-enews

    The High Cost of Not Doing Enough to Prevent Cyber Attacks

    See More
  • automation_enews

    What We can Do to Bridge the Cyber Skills Gap

    See More
  • Coding data breach

    A Look Back at the Most Prominent Data Breaches in 2019

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing