en English

Gartner: 7 Trends for Cybersecurity in 2022

People who understand these 7 trends of Cybersecurity will require re-engineering of security practices & rethinking of tech, preparing for new threats.
Cybersecurity cover

Table of Contents

People who understand these seven trends will be better able to respond to new risks and improve their role, but this will require a re-engineering of security practices and rethinking of technology, as well as preparing for new threats.

Security and risk managers face a critical moment as an organization’s digital footprint expands and centralized cybersecurity controls become obsolete.

Mixed work and digital business processes in the cloud bring new risks. At the same time, sophisticated ransomware, attacks on digital supply chains and deep-embedded vulnerabilities have exposed technology gaps and skills shortages.

These disturbances do not exist in isolation. They have a compounding effect, “said Peter Firstbrook, a Gartner vice president and analyst. “To address risk, CIOs need to change their role from technologists who prevent breaches to corporate strategists who manage cyber risk.”

Those who understand these seven trends will be better able to respond to new risks and improve their role, but this will require a re-engineering of security practices and rethinking of technology, as well as preparing for new threats.


Trend 1: The attack surface expansion

Currently, 60 percent of knowledge workers work remotely and at least 18 percent do not return to the office. These changes in the way we work, coupled with increased use of public clouds, highly connected supply chains, and the use of networked physical systems, have exposed new and challenging attack “surfaces”.

This makes the organization more vulnerable to attack. Gartner recommends that security leaders go beyond traditional security monitoring, detection, and response approaches to manage a wider range of risks.

Trend 2: Identity system defense

Identity systems are under constant attack. Abuse of credentials is now the primary method attackers use to access systems and achieve their goals. For example, in the SolarWinds vulnerability attack, an attacker uses privileged access from a vendor to infiltrate a target network.

Gartner uses the term Identity Threat Detection and Response (ITDR) to describe the collection of tools and processes used to secure identity systems. In the long run, more integrated solutions will emerge.

Trend 3: Digital supply chain risk

Gartner predicts that 45 percent of organizations worldwide will suffer from software supply chain attacks by 2025, a threefold increase from 2021.

Security and risk management leaders need to work with other departments to prioritize digital supply chain risk and pressure suppliers to demonstrate security best practices.

Trend 4: Vendor consolidation

Security products are converging. Vendors are integrating security features into a single platform and introducing pricing and licensing options to make packaged solutions more attractive.

While it may bring new challenges, such as reduced negotiating power and potential single points of failure, Gartner believes integration is a welcome trend that should reduce complexity, reduce costs and increase efficiency, thereby improving overall security.

Trend 5: Cybersecurity mesh

A network security grid is a modern conceptual approach to a security architecture that enables distributed enterprises to deploy and integrate security into assets, whether they are on-premise, in a data center, or in the cloud.

Gartner predicts that organizations adopting a cybersecurity grid architecture will reduce the financial impact of a single security incident by an average of 90% by 2024.

Trend 6: Distributed decisions

Executive leaders need fast and flexible network security capabilities to support digital business priorities. However, as more aspects of the business became digitized, the work became too big for a centralized CISO role. Leading organizations are setting up CISO offices to enable distributed network judgment.

Chief information security officers and central functions will continue to set policy, while cyber security leaders will be placed in different parts of the organization to decentralize security decisions.

Trend 7: Beyond Awareness

Human error still exists in the majority of data breaches, suggesting that traditional security awareness training methods are ineffective. Progressive organizations are moving beyond outdated compliance awareness campaigns and investing in holistic behavioral and cultural change programs designed to inspire safer working practices.

DiskMFR Field Sales Manager - Leo

It’s Leo Zhi. He was born on August 1987. Major in Electronic Engineering & Business English, He is an Enthusiastic professional, a responsible person, and computer hardware & software literate. Proficient in NAND flash products for more than 10 years, critical thinking skills, outstanding leadership, excellent Teamwork, and interpersonal skills.  Understanding customer technical queries and issues, providing initial analysis and solutions. If you have any queries, Please feel free to let me know, Thanks

DiskMFR Free Sample Application
  • Still worried about storage product quality?
  • Current suppliers can’t provide perfect after-sales service

  • Get our free sample for testing now

Leave a Reply

Your email address will not be published. Required fields are marked *

five × one =

Please let us know what you require, and you will get our reply within 24 hours.

  • Our team will answer your inquiries within 24 hours.
  • Your information will be kept strictly confidential.

Let's Have A Chat

Learn How We Served 100+ Global Device Brands with our Products & Get Free Sample!!!

Email Popup Background 2