Intelligent CISO Issue 84 | Page 63

BUSINESS surveillance

WHY CISOS MUST UNIFY SECURITY AND DATA RECOVERY TO MAXIMISE CYBERDEFENCES

Petr Springl, Senior Director, Software Engineering at Progress, tells us it’ s vital for CISOs not only to defend but to plan for when a threat actor will breach cyberdefences.
s tech environments grow more

A complex, cybercriminals constantly seek new avenues to break through corporate defences. The National Cyber Security Centre reported that it responded to 50 % more nationally significant incidents and three times as many severe incidents in 2024 than the previous year. This means it’ s vital for CISOs not only to defend but to plan for when a threat actor will breach those defences.

Organisations require a solution that rapidly detects unusual behaviour, mitigates attacks, expels attackers and enables recovery from any damage caused. Central to this approach is having a unified approach to data security. Organisations using reliable network detection and data protection solutions can better spot and recover from attacks. By leveraging Machine Learning and advanced automation to identify suspicious behaviour, these organisations can reduce the time it takes to detect and recover from threats.
Beyond financial impact: The increasing costs of a data breach
The costs and consequences of a data breach are escalating. According to the annual IBM Cost of a Data Breach Report, the average cost of a data breach in the UK rose to £ 3.58 million between
March 2023 and February 2024 – 5 % higher than the previous year.
The disruptive effects of these data breaches on their target businesses are not only driving up costs but are also extending a breach’ s after-effects. IBM’ s report revealed that a full recovery took more than a hundred days for a majority of breached organisations that were able to fully recover.
Beyond the financial impact of containing the incident, organisations can face the costs of significant IT work needed to investigate the vulnerabilities that led to the breach. There is a hefty price tag to recover damaged systems and heighten security measures to help prevent reoccurrence. There may also be regulatory fines for non-compliance along with costs to rebuild a damaged reputation.
Building a multi-layered cybersecurity defence infrastructure
An effective security architecture must be a complex, multi-layered system designed to improve defences against multiple attack vectors. Since no single solution can provide complete protection, it requires a perfect blend of tools and strategies. Crucially this must include Network Detection and Response( NDR), Security Information and
Petr Springl, Senior Director, Software Engineering at Progress
WWW. INTELLIGENTCISO. COM 63