December 08, 2024 •
When global technology leaders take a step back and look at the various cyber attacks, technology risks and their overall cybersecurity situation, there are many similarities — no matter where you turn internationally.
Next week, this “Lohrmann on Cybersecurity” blog will examine the top stories from the USA in our annual cyber review for 2024, along with many related themes surrounding other “runner-up” cybersecurity stories.
But before we get there, I want to take a look at two new international reports and their implications for the future of cybersecurity.
The two reports come from the European Union and from South Africa, and both provide excellent snapshots of the current cybersecurity situations in their regions with global implications.
The purpose of the report is to provide policymakers at the EU level with an evidence-based overview of the state of play of the cybersecurity landscape and capabilities at the EU, national and societal levels, as well as with policy recommendations to address identified shortcomings and increase the level of cybersecurity across the Union.
Here is the report outline:
“1. CYBERSECURITY LANDSCAPE IN THE UNION
1.1 LEGISLATIVE CONTEXT
1.2 UNION-LEVEL RISK ASSESSMENT
1.3 EU CYBERTHREAT LANDSCAPE
“2. CYBERSECURITY CAPABILITIES AT THE UNION LEVEL
2.1 HIGH-LEVEL FINDINGS
2.2 NATIONAL CAPABILITIES: ALIGNMENT OF NATIONAL CYBERSECURITY STRATEGIES 23
2.3 PRIVATE SECTOR CAPABILITIES: CYBERSECURITY CAPABILITIES OF CRITICAL SECTORS
2.4 SOCIETAL CAPABILITIES: CYBERSECURITY AWARENESS AND CYBER-HYGIENE OF EU CITIZENS
“3. INCREASING THE LEVEL OF CYBERSECURITY
“3.1 POLICY IMPLEMENTATION
3.1.1 Implementing a comprehensive and complementary cybersecurity policy framework
3.1.2 Identification and Supervision
3.1.3 Cybersecurity risk management measures
3.1.4 Information sharing and reporting obligations: institutional framework and practice
“3.2 CYBER CRISIS MANAGEMENT
3.2.1 Situational awareness
3.2.2 National CSIRTs
3.2.3 National capabilities: Cyber-exercises
“3.3 CYBERSECURITY SKILLS
3.4 SUPPLY CHAIN SECURITY
3.4.1 Vulnerability handling and disclosure
“4. LOOKING AHEAD”
And most important, here are the high-level recommendations and key outcomes that came from the report:
“The key outcome of the report are six policy recommendations, covering the four priority areas above and, additionally, the capabilities of critical sector operators and cybersecurity awareness and cyber hygiene.
The report is full of statistics and survey results from leading businesses in Africa, and I highly recommend taking a look. Here’s an excerpt:
“The report reveals that eight out of 10 surveyed South African businesses said they experienced a cyber attack in the past year, with only 32 percent of organisations saying cyber security training is prioritised among employees.
“The cost of these attacks on businesses in SA is estimated at R2.2 billion annually, according to the South African Banking Risk Information Centre and the CSIR.
“’Just as the cloud, IOT technologies and mobile networks have empowered businesses, cyber security needs to be seen as an important enabler for growth,’ explained Videsha Proothveerajh, director of Vodacom Business.
“The report further shows that 36 percent of companies are confident they can prevent a ransomware attack without significant operational disruption.
“In addition, Omdia’s 2024 Cyber Security Decision-Maker Survey found that 41 percent of organisations globally said ransomware is in their top three security challenges. For businesses that operate in the public, health and finance sectors, ransomware attacks are some of the most prevalent.
“’By prioritising cyber security, businesses can protect their reputation, maintain customer trust and ensure operational continuity,’ said Proothveerajh.”
The report outline is as follows:
“What’s the problem?
“1.1 The scale of cyber-attacks facing South African organisations
“2.0 How to think about cybersecurity
2.1 Cybersecurity as a pillar of digital resilience
2.2 The unchanging nature of the threat
2.3 Regulation aims to drive enhanced cybersecurity in organisations
“3.0 Understanding the threat
“3.1 How cyber attackers exploit vulnerabilities
3.2 Ransomware: A growing threat in the digital economy
3.3 Supply chain attack
3.4 Distributed Denial of Service (DDoS) attack
3.5 Phishing attack
3.6 Critical National Infrastructure (CNI) attack
3.7 Next-generation threats: Navigating the future of digital defence
“4.0 Understanding what cybersecurity affects
“4.1 The scope of cybersecurity in an organisation and beyond
4.2 The core tenets of cybersecurity
4.3 Cybersecurity as the backbone of resilient digital innovation
4.4 Cybersecurity as a business enabler: Measuring ROI and long-term value
“5.0 What organisations need to do
5.1 Know your vulnerabilities
5.2 Review your cybersecurity controls: People, process and technology
5.3 Evaluate and prioritise your data and systems
5.4 Protecting PII from exposure
5.5 Conduct regular security assessments and audits
5.6 Commit to proactive cybersecurity engagement
5.7 Leverage automation and advanced tools
5.8 Avoid pitfalls of going it alone
Conclusion”
I always enjoy comparing international reports to the white papers and best practice reports in the USA. While there are often many similarities, they also use different words and focus on slightly different themes.
In the case of these reports, it is clear that cyber attacks are increasing globally in ways that are making cybersecurity an even higher priority as we head into 2025.
Next week — the cyber year in review, with top stories from 2024.
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.