Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Education & Training

Reducing dwell time of threat actors requires a reactive workforce

By Julian Zottl
Hacker can't enter system

Image via Pixabay

February 21, 2023

One of the top factors for measuring an organization’s information and security infrastructure is dwell time — the amount of time a bad actor spends in an organization's network. The duration of this time is related to how quickly the attacker is identified in an organization’s environment and diminishing the intensity of this attack is dependent on an organization’s initial detection and reaction to the breach. This means organizations need to be properly equipped to respond as quickly as possible to reduce how long an attacker has access to sensitive data.

Protecting an organization’s confidential information and its security posture require establishing a well-trained and highly informed workforce — a top priority for leadership. The responsibility falls on those at the head of the organization to ensure that before an attacker infiltrates a network, the organization is ready to respond to the issue from all angles. This involves educating employees across the organization on the severity of the threat landscape, best cyber practices that include offensive security tactics to proactively identify new threats and the implementation of a zero trust architecture.

Closing the cybersecurity knowledge gap

In terms of bolstering an organization’s security, creating awareness is a pivotal starting point in closing the cybersecurity knowledge gap. Reports indicate that one-in-three employees claim they did not receive any form of cybersecurity training at their organization. Additionally, one-in-five employees were “not at all” aware of their organization’s cybersecurity best practices. This lack of knowledge means a lack of urgency, which can be extremely harmful to the organization’s safety. Edi Rama, Albania’s prime minister, spoke at the 2023 World Economic Forum, saying that the growth of the cybercrime industry — from $3 trillion in 2015 to an expected $10.5 trillion in 2025 — means that if cybercrime was a state, it would be the third largest global economy after the U.S. and China. Cybercrime is here to stay and, with it, everyone needs to be vigilant.

Unexpected infiltrations are inevitable, which is why it is essential for employees to, at least, start by understanding how and why an attacker may target their organization and the impact it can have on their work. Effective leadership will ensure employees understand the organization’s vulnerabilities and why certain areas are more susceptible than others. By informing employees of the cyber risks at hand and the harm these risks can cause, the workforce is more likely to be motivated to implement best security practices and use these tactics as efficiently as possible when the time comes to protect the organization’s data. The education of the workforce, along with the right technologies, can significantly reduce the dwell time of attackers. This combination provides insight into all levels of an organization that can be attacked — from the people down to the data in a database.

Proactively identifying new threats

A well-prepared workforce is not only conscious of the areas a bad actor can infiltrate but will also recognize when an attack might be occurring. Once awareness of the expanding threat is established, organizations must work with their employees to detect attacks and identify next steps. This effectively lessens dwell time of bad actors as organizations now have the entire workforce ready to monitor and protect the weaker parts of the infrastructure. More specifically, this can be accomplished via a zero trust architecture, threat intelligence and management systems, in combination with advanced cyber hunting inside an organization’s network. This combination is essential in preventing an adversary from entering from any angle. A solid zero trust approach provides unified security from the device all the way to the users working on those devices and the data on them.

Implementing a zero trust approach

As attacks grow more complex and advanced, the landscape of cyber defense has changed alongside them. Even the most secure organization can fall susceptible to an attack, which is why the focus must shift to restricting the access of bad actors that have breached their systems. As such, many organizations have begun to utilize a zero trust approach, which enables organizations to better protect themselves from malicious actors by limiting how much access the hackers will have to data and preventing them from moving even further into an organization’s systems.

Of course, zero trust is not a strategy that can be implemented overnight; it is something that could potentially take years before an organization may fully benefit. It is much more a journey, with an evolving architecture, than it is a set of standards that can simply be implemented. As such, organizations should focus on the zero trust initiatives that give the largest protection first.

This includes utilizing authentication authorization and accounting strategies, while tagging data so that an organization has better awareness of who is on their network and what access they have to specific information. Organizational leaders must ensure employees are also involved in these monitoring strategies and, consequently, zero trust and the role they play within this security model and the organization’s optimal protection. This is pivotal to stay on the same level as progressing attacks and companies must begin this process now so that they do not fall behind in this fast-paced environment.

Modern-day breaches not only require a complete overview of up-to-date security measures, but an expanded outlook on the necessary measures to prepare and potentially prevent attacks. The good news is that there are steps leaders can take to ensure their workforce is in the best position possible to reduce dwell time and limit the impact of a breach.

KEYWORDS: breaches cybersecurity hacker infrastructure security threat actor zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Julian Zottl is the Chief Technology Officer – Cyber Protection Solutions at Raytheon Intelligence & Space.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity Intrusion Detection

    Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

    See More
  • ransomware keyboard

    Report: Ransomware dwell time hits low of 24 hours

    See More
  • Reducing the Cost of Storing Video Surveillance Data over Time

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!