TRENDING
Identity fabric immunity
Fragile identity infrastructure is caused by incomplete , misconfigured or vulnerable elements in the identity fabric . By 2027 , identity fabric immunity principles will prevent 85 % of new attacks and thereby reduce the financial impact of breaches by 80 %.
“ Identity fabric immunity not only protects the existing and new IAM components in the fabric with identity threat and detection response ( ITDR ), but it also fortifies it by completing and properly configuring it ,” said Addiscott .
Cybersecurity validation
Cybersecurity validation brings together the techniques , processes and tools used to validate how potential attackers exploit an identified threat exposure . The tools required for cybersecurity validation are making significant progress to automate repeatable and predictable aspects of assessments , enabling regular benchmarks of attack techniques , security controls and processes . Through 2026 , more than 40 % of organizations , including two-thirds of midsize enterprises , will rely on consolidated platforms to run cybersecurity validation assessments .
Cybersecurity platform consolidation continuously inventory security controls to understand where overlaps exist and reduce the redundancy through consolidated platforms .
Composable businesses need composable security
Organizations must transition from relying on monolithic systems to building modular capabilities in their applications to respond to the accelerating pace of business change . Composable security is an approach where cybersecurity controls are integrated into architectural patterns and then applied at a modular level in composable technology implementations . By 2027 , more than 50 % of core business applications will be built using composable architecture , requiring a new approach to securing those applications .
Boards expand their competency in cybersecurity oversight
The board ’ s increased focus on cybersecurity is being driven by the trend toward explicit-level accountability for cybersecurity to include enhanced responsibilities for board members in their governance activities . Cybersecurity leaders must provide boards with reporting that demonstrates the impact of cybersecurity programs on the organization ’ s goals and objectives .
As organizations look to simplify operations , vendors are consolidating platforms around one or more major cybersecurity domains . For example , identity security services may be offered through a common platform that combines governance , privileged access and access management features . SRM leaders need to
“ SRMs leaders must encourage active board participation and engagement in cybersecurity decision making ,” said Addiscott . “ Act as a strategic advisor , providing recommendations for actions to be taken by the board , including allocation of budgets and resources for security .” p
26 INTELLIGENTCIO LATAM www . intelligentcio . com