No one can deny that information security made headlines this year, but those high-profile attacks don’t tell the whole story. According to recent research by Gartner, the major attacks and data breaches that enterprises experienced throughout 2017 are just the tip of the iceberg when it comes to cybersecurity news.

Examining Cybersecurity News

The firm’s research director, Jeff Wheatman told TechRepublic that the next five to 10 years will see a new range of threats to corporate organizations. In fact, Gartner predicted that by 2021 an enterprise will suffer a business outage due to malware and ransomware that results in $1 billion in lost revenue.

Enterprises must consider how the dependencies that come with partnering with in an ever-growing pool of providers will affect their own cybersecurity. To avoid becoming the next piece of cybersecurity news, IT leaders must assess the security posture of their third-party providers.

Beware of the Ripple Effect

Digital transformation has led to a major shift in enterprise technology ecosystems. The posture of partner organizations becomes increasingly important as the ecosystem expands.

Wheatman noted that key partners are often connected to hundreds of other suppliers. While IT leaders will likely have no direct interaction with many of these companies, the security approach of these disparate organizations could have a huge impact on blue-chip businesses.

CIOs must understand the security posture of all potential partners as a matter of urgency. Gartner noted that major enterprises have been affected by attacks and breaches against their partners and by providers that work with their third-party vendors. This interconnectedness can create a ripple effect that could put major enterprises at risk.

Assessing the Security Posture of Partners

As more enterprises store data in the cloud, CIOs must be sure to understand the security posture of interconnected providers. According to Wheatman, Gartner has seen an increase in spending on security rating services. These services gather data and then run algorithms to assess enterprise cybersecurity, much like a credit rating is applied to a consumer. Investing in these services allows security leaders to understand the risk associated to partners operating within their extended ecosystems.

Making Smart Investments

The good news is that Gartner recently forecast that global security spending will total $96.3 billion next year, an 8 percent increase from 2017. Enterprises are spending more due to regulation concerns, emerging threats and evolution in digital business strategies.

IT decision-makers must clearly explain the risk of cybersecurity threats to senior stakeholders. They need to demonstrate how investing in information security reduces risk, improves governance and creates higher profits — and underscore that these practices need to be present in third parties as well.

More from

Most organizations want security vendor consolidation

4 min read - Cybersecurity is complicated, to say the least. Maintaining a strong security posture goes far beyond knowing about attack groups and their devious TTPs. Merely understanding, coordinating and unifying security tools can be challenging.We quickly passed through the “not if, but when” stage of cyberattacks. Now, it’s commonplace for companies to have experienced multiple breaches. Today, cybersecurity has taken a seat in core business strategy discussions as the risks and costs have risen dramatically.For this reason, 75% of organizations seek to…

How IBM secures the U.S. Open

2 min read - More than 15 million tennis fans around the world visited the US Open app and website this year, checking scores, poring over statistics and watching highlights from hundreds of matches over the two weeks of the tournament. To help develop this world-class digital experience, IBM Consulting worked closely with the USTA, developing powerful generative AI models that transform tennis data into insights and original content. Using IBM watsonx, a next-generation AI and data platform, the team built and managed the entire…

How the FBI Fights Back Against Worldwide Cyberattacks

5 min read - In the worldwide battle against malicious cyberattacks, there is no organization more central to the fight than the Federal Bureau of Investigation (FBI). And recent years have proven that the bureau still has some surprises up its sleeve. In early May, the U.S. Department of Justice announced the conclusion of a U.S. government operation called MEDUSA. The operation disrupted a global peer-to-peer network of computers compromised by malware called Snake. Attributed to a unit of the Russian government Security Service,…

How NIST Cybersecurity Framework 2.0 Tackles Risk Management

4 min read - The NIST Cybersecurity Framework 2.0 (CSF) is moving into its final stages before its 2024 implementation. After the public discussion period to inform decisions for the framework closed in May, it’s time to learn more about what to expect from the changes to the guidelines. The updated CSF is being aligned with the Biden Administration’s National Cybersecurity Strategy, according to Cherilyn Pascoe, senior technology policy advisor with NIST, at the 2023 RSA Conference. This sets up the new CSF to…