Mitigate Cyber Risk by Building a Security Program Focused on the Basics

Mitigate Cyber Risk by Building a Security Program Focused on the Basics

Cyber threats are top of mind for many individuals, businesses, and public entities. The Global Risks Report 2024 version from the World Economic Forum identified “cyber insecurity” as the 4th most severe short-term and 8th in the long term risk, as just one indication of its worrisome global presence. The repercussions of insufficient cyber security can be critical to any individual or organization with the imperatives to protect sensitive data, fulfill legal obligations, maintain operational uptime, and limit financial or reputational damage caused by cyber incidents.

In previous years, cyber security was a literal afterthought: how do we undo the impairment from the attack we just incurred with minimal repercussions? As many have discovered through misfortune, it is not always possible to emerge from an incident unscathed. Fortunately, all parties from individual users to international corporations have, in recent years, become more proactive and engaged in safeguarding their digital assets before an attack. Despite this, there is still a general sense of insecurity with respect to cyber maturity and the evolution of cyber risk.

To address this present situation, Dan Ackerman , Cyber Risk Solutions Architect for Zurich North America , Zurich Resilience Solutions, was invited to share his insights regarding some of the most common questions we have been asked regarding how to navigate the current and future threat landscape.

Question: Businesses and individual users are justifiably concerned about cyber threats and general cyber insecurity. What can both businesses and individual users do to strengthen their cybersecurity posture and lessen the risk of being victimized by threat actors?

Response: Speaking with insureds and prospects, a good portion of the conversation is around basic cyber hygiene. In looking at some of the latest cyber events, a lot them come down to the same initial threat vectors that we have been dealing with for years: unpatched or unknown vulnerabilities, stolen credentials, and social engineering. I try to focus our conversations on making sure all organizations, regardless of size, are prioritizing the basics that I refer to as the “blocking and tackling” of cyber security. Following the basics will go a long way towards detecting malicious activity.

  • Are you utilizing Multi-Factor Authentication and, in general, what is the state of the credential management program?
  • What is the state of the vulnerability management program?
  • Are you performing regular vulnerability scanning? If yes, what tool(s) do you use?
  • How does this integrate with the patching program?
  • How are employees being trained and tested on cyber security?

Source: created and provided by

Q: People often ask which is a “better” program to follow for an enhanced security posture, prevention or active detection & response: how do you respond to that question?

R: Much attention is given to preventing an event from ever taking place, when the reality is we need to focus on detecting and responding to malicious activity. Prevention would be great, but it is not always possible given the constant evolution of threat tactics and technology. To successfully detect and respond to cyber threats, we really need to focus on 2 main things:

  1. Enhancing Visibility: Does the organization have visibility into all of the device and user activity on their network?
  2. Preparation: Is the organization prepared with an appropriate and effective response plan when something inevitably is detected?

Q: With the plethora of software, tools, services, and providers on the market, it can be overwhelming to simply get started with this process. How would you respond to a business or individual who is new to developing their cybersecurity program?

R: This is a great question. I would start by asking a follow-up question: What is the state of your cyber security program? If they are new to cyber or new to the organization, they may not know answer. In that case, this is the perfect question.

My advice would be to start with a controls assessment linked to a common framework or benchmarks, including the NIST CSF or CIS Benchmarks. The proper choice can be dependent on the industry and regulatory requirements of the organization and is best to determine in consultation with an experienced cybersecurity team. Are they in finance and do they have PCI [payment card industry] requirements, as an example?

Source: created and provided by

If the client is not following any specific guidance, I would start by guiding them down this path of discussing their regulatory requirements to help them determine the best way to assess and improve their current controls and security posture. They need to determine their current state, their desired state, and how to effectively measure their program.

Q: A common refrain in the cyber world is that the landscape is ‘constantly evolving’. How can businesses and individuals better ensure they are keeping up with this evolution when they are not cybersecurity experts themselves?

R: I think this all comes down to the same items I mentioned above. They need to establish an effective way to measure and communicate the maturity of their cybersecurity program. This comes down to building a program that suits your organization's needs based on controls and frameworks that have been proven effective. The most important things to remember are enhancing visibility and preparing for a potential cyber attack.

The information in this newsletter publication was compiled from sources believed to be reliable for informational purposes only. This is intended as a general description of certain types of managed security services, including incident response, continuous security monitoring, and advisory services available to qualified customers through SpearTip, LLC, as part of Zurich Resilience Solutions, which is part of the Commercial Insurance Business of Zurich Insurance Group.? SpearTip, LLC does not guarantee any particular outcome. The opinions expressed herein are those of SpearTip, LLC as of the date of the release and are subject to change without notice. This document has been produced solely for informational purposes. No representation or warranty, express or implied, is made by Zurich Insurance Company Ltd or any of its affiliated companies (collectively, Zurich Insurance Group) as to their accuracy or completeness. This document is not intended to be legal, underwriting, financial, investment or any other type of professional advice. Zurich Insurance Group disclaims any and all liability whatsoever resulting from the use of or reliance upon this document. Nothing express or implied in this document is intended to create legal relations between the reader and any member of Zurich Insurance Group. Certain statements in this document are forward-looking statements, including, but not limited to, statements that are predictions of or indicate future events, trends, plans, developments or objectives. Undue reliance should not be placed on such statements because, by their nature, they are subject to known and unknown risks and uncertainties and can be affected by numerous unforeseeable factors. The subject matter of this document is also not tied to any specific service offering or an insurance product nor will it ensure coverage under any insurance policy. No member of Zurich Insurance Group accepts any liability for any loss arising from the use or distribution of this document. This document does not constitute an offer or an invitation for the sale or purchase of securities in any jurisdiction.

In the United States, Zurich Resilience Solutions managed security services are provided by SpearTip, LLC.

Copyright ? 2024 SpearTip, LLC




要查看或添加评论,请登录

SpearTip的更多文章

社区洞察

其他会员也浏览了