SlideShare a Scribd company logo
1 of 22
Download to read offline
Cybersecurity
Impacts of the
Russian Invasion
of Ukraine
One Minute Insights:
Many decision makers
believe that Russia poses a
cyberthreat to their country,
and that there will be an
increase in cyberattacks
over the coming weeks
Over half believe that their
government is
underestimating the
cybersecurity threat Russia
poses to their country
Most believe that Russia
poses a cyberthreat to their
business, while many
believe their organizational
leadership has
underestimated this threat
The cyberthreat from Russia
on businesses has increased
since the invasion of
Ukraine
The volume and severity of
attacks on Ukraine are
expected to increase over
the coming weeks
Utilities are the top
identified target of concern
for cybersecurity attacks
from Russia
Ransomware is the top
identified Russian
cyberattack of concern
Cybersecurity Impacts of the
Russian Invasion of Ukraine
The Russian invasion of Ukraine poses an immediate
humanitarian crisis due to traditional warfare tactics. However,
in an increasingly digitized world, do technology decision
makers fear cybersecurity-based attacks within Ukraine and
upon their own countries and businesses?
One-Minute Insights on timely topics are available to Gartner
Peer Insights members. Sign up for access to over 100 more,
and new insights each week.
Data collection: March 11 - March 14, 2022
Respondents: 259 tech decision makers
Most believe Russia to be a growing
cybersecurity threat, and that their
government is underestimating that threat
Over three-quarters (79%) of decision makers think Russia
poses a cyberthreat to their country.
n = 259
Do you think Russia
poses a cyberthreat
to your country?
79%
Yes
10%
No
11%
Unsure
88% of respondents think that the volume of cyberattacks
originating in Russia will increase over the coming weeks.
Do you think Russia will increase
or decrease the volume of
cyberattacks in your country
over the coming weeks?
n = 204
Significant
increase
Moderate
increase No change
Moderate
decrease
Significant
decrease
24%
64%
2%
7%
3%
The majority (84%) think cyberattacks originating in Russia
will increase in severity over the coming weeks.
Do you think Russia will
increase or decrease the
severity of cyberattacks
in your country over the
coming weeks?
27%
Significant increase
2%
Significant decrease
2%
Moderate decrease
12%
No change
57%
Moderate
increase
n = 204
Almost two-thirds (60%) of decision makers consider their
government to be underestimating the cybersecurity threat
Russia poses to their country.
Do you think your government has appropriately estimated
the cyberthreat Russia poses to your country?
54%
Somewhat
underestimated
32%
Appropriately
estimated
3%
Somewhat
overestimated
2%
Severely overestimated
3%
Not sure
6%
Severely underestimated
n = 259
“[We are] working with relevant
government agencies.”
“Threat Intelligence and correlated IoCs
[Indicators of Compromise] are critical for
monitoring systems and assets at higher risk
in this environment. Sharing threat Intel with
partners across the industry is paramount for
industry protection.”
- C-suite, software industry, 10,000+ employees
- Director, financial industry, 1,000 - 5,000 employees
The number of cyberattacks in Ukraine will
increase in volume and severity over the
coming weeks, many believe, while utilities is
the top identified target of concern
Looking specifically at
Ukraine, 81% of decision
makers believe that
Russia will increase the
volume of cybersecurity
attacks on Ukraine in the
coming weeks.
Do you think Russia will
increase or decrease the
volume of cyberattacks
in Ukraine over the
coming weeks?
n = 259
37%
Significant increase
44%
Moderate increase
2%
Significant decrease
16%
No change
2%
Moderate decrease
82% of respondents think that Russia will increase the severity
of cybersecurity attacks on Ukraine in the coming weeks.
Do you think Russia will increase or decrease the severity
of cyberattacks in Ukraine over the coming weeks?
41%
Significant increase
41%
Moderate
increase
15%
No change
n = 259
Moderate decrease 2%,
Significant decrease 1%
Utilities (74%) is the top Russian
cyberattack target of concern
among decision makers, followed
by communications (66%) and
financial systems (63%).
What potential targets
of Russian cyberattacks
concern you the most?
74%
66%
63%
40%
28%
(e.g., gas,
electricity, water)
(e.g., internet,
telecom)
Financial systems
Government
services
Manufacturing/
supply chain
infrastructure
Utilities
Communications
Hospital systems 24%, Businesses aiding the Ukrainian resistance 21%,
Private citizens aiding the Ukrainian resistance 8% , Other 0% n = 259
“[We have] delegated some of the
employees to monitor Russian traffic.”
“We are monitoring the network connectivity
from Russia and Ukraine to our services.
- VP, software industry, 1,000 - 5,000 employees
- Director, financial industry, 5,000 - 10,000 employees
Do you think Russia poses a
cyberthreat to your business?
57%
Yes
24%
No
19%
Not sure
Just over half (57%) of decision makers believe that Russia
poses a cyberthreat to their business.
Over half believe Russia poses a cyberthreat
to their business, while many believe their
leadership has underestimated the threat
n = 259
Do you think the leadership at your company
has appropriately estimated the cyberthreat
Russia poses to your business?
Close to half of decision makers (44%) believe the leadership at
their organization has underestimated the cyberthreat Russia
poses on their business, though the same number (44%)
believes that leadership has appropriately estimated the threat.
40%
Somewhat
underestimated
44%
Appropriately
estimated
6%
Somewhat
overestimated
1%
Severely overestimated
4%
Severely
underestimated
n = 259
5%
Not sure
“We are not afraid of attacks aimed on us.
However, we inform our employees about
possible disinformation.”
“[We are] implementing SIEM, DLP, Threat
Hunting, URL Threat Protection, IDS/IPS.”
- C-suite, manufacturing industry, 10,000+ employees
- C-suite, financial industry, 5,000 - 10,000 employees
The cyberthreat from Russia on businesses
has increased since the invasion of Ukraine,
according to most, with ransomware the top
identified concern
Of those who think Russia poses a cyberthreat to their
business, 86% believe the threat has increased since the
invasion of Ukraine.
19%
Increased
significantly
67%
Increased
moderately
12%
Stayed
the same
Decreased significantly 0%
2%
Decreased
moderately
Do you think the cyberthreat Russia
poses to your business has increased or
decreased since the invasion of Ukraine?
n = 147
Ransomware (76%) is the top
identified cyberattack of
concern from Russia, followed by
phishing (68%) and DDoS (56%).
What kinds of attacks
originating from
Russia are you most
concerned about?
76%
Ransomware
68%
Phishing
56%
Distributed Denial of
Service (DDoS)
49%
Malware
40%
Data theft
Spyware 33%, SQL injection 23%, Other 1%, None of these 0% n = 147
“We are monitoring our backups very
carefully as the backups are surely any
attacker’s first priority.”
“We are trying to go back to the basics and
review the overall security posture and ensure
that gaps [are] not left open.”
- C-suite, manufacturing industry,
5,000 - 10,000 employees
- C-suite, manufacturing industry,
1,000 - 5,000 employees
“We are reviewing our Russian vendors.”
“For now I think we are safe but we certainly
need to prepare ourselves.”
- C-suite, financial industry, 5,000 - 10,000 employees
- C-suite, financial industry, 1,000 - 5,000 employees
“We are always doing all we can to protect
[ourselves] from cybersecurity threats.”
- C-suite, financial industry, 10,000+ employees
Want more insights like this from IT leaders like you?
Explore the revamped, retooled and reimagined Gartner Peer
Insights. You’ll get unprecedented access to verified reviews,
synthesized insights and engaging discussions from a
community of your peers.
Respondent Breakdown
Region
Company Size
Title
North America 76%
APAC8%
EMEA 16%
C-Suite
<1,001
employees
10,001+
employees
Director
VP
34%
30%
15%
1,001-5,000
employees
Manager
21%
This content, which provides opinions and points of view expressed by users, does not represent the views of Gartner; Gartner
neither endorses it nor makes any warranties about its accuracy or completeness.
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved.
Source: Gartner Peer Insights, Cybersecurity Impacts of the Russian Invasion of Ukraine survey
5,001 - 10,000
employees
39% 25%
9%
27%

More Related Content

Similar to Cybersecurity Impacts of the Russian Invasion of Ukraine

CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Is the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksIs the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksKevinMax
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Steve Fantauzzo
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chainDuncan Purves
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decgusbarrett
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfKrishna N
 

Similar to Cybersecurity Impacts of the Russian Invasion of Ukraine (20)

CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Is the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksIs the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacks
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
2016 Cyber Threats
2016 Cyber Threats2016 Cyber Threats
2016 Cyber Threats
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chain
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-dec
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 

More from Gartner Peer Insights

More from Gartner Peer Insights (6)

Enterprise Architecture in 2022
Enterprise Architecture in 2022Enterprise Architecture in 2022
Enterprise Architecture in 2022
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 
The State of Remote Work Q4 2021
The State of Remote Work Q4 2021The State of Remote Work Q4 2021
The State of Remote Work Q4 2021
 
Password in 2022
Password in 2022Password in 2022
Password in 2022
 
CIO: 2022 Priorities
CIO: 2022 PrioritiesCIO: 2022 Priorities
CIO: 2022 Priorities
 
Tech-Savvy Business Leaders
Tech-Savvy Business LeadersTech-Savvy Business Leaders
Tech-Savvy Business Leaders
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

Cybersecurity Impacts of the Russian Invasion of Ukraine

  • 2. One Minute Insights: Many decision makers believe that Russia poses a cyberthreat to their country, and that there will be an increase in cyberattacks over the coming weeks Over half believe that their government is underestimating the cybersecurity threat Russia poses to their country Most believe that Russia poses a cyberthreat to their business, while many believe their organizational leadership has underestimated this threat The cyberthreat from Russia on businesses has increased since the invasion of Ukraine
  • 3. The volume and severity of attacks on Ukraine are expected to increase over the coming weeks Utilities are the top identified target of concern for cybersecurity attacks from Russia Ransomware is the top identified Russian cyberattack of concern
  • 4. Cybersecurity Impacts of the Russian Invasion of Ukraine The Russian invasion of Ukraine poses an immediate humanitarian crisis due to traditional warfare tactics. However, in an increasingly digitized world, do technology decision makers fear cybersecurity-based attacks within Ukraine and upon their own countries and businesses? One-Minute Insights on timely topics are available to Gartner Peer Insights members. Sign up for access to over 100 more, and new insights each week. Data collection: March 11 - March 14, 2022 Respondents: 259 tech decision makers
  • 5. Most believe Russia to be a growing cybersecurity threat, and that their government is underestimating that threat Over three-quarters (79%) of decision makers think Russia poses a cyberthreat to their country. n = 259 Do you think Russia poses a cyberthreat to your country? 79% Yes 10% No 11% Unsure
  • 6. 88% of respondents think that the volume of cyberattacks originating in Russia will increase over the coming weeks. Do you think Russia will increase or decrease the volume of cyberattacks in your country over the coming weeks? n = 204 Significant increase Moderate increase No change Moderate decrease Significant decrease 24% 64% 2% 7% 3%
  • 7. The majority (84%) think cyberattacks originating in Russia will increase in severity over the coming weeks. Do you think Russia will increase or decrease the severity of cyberattacks in your country over the coming weeks? 27% Significant increase 2% Significant decrease 2% Moderate decrease 12% No change 57% Moderate increase n = 204
  • 8. Almost two-thirds (60%) of decision makers consider their government to be underestimating the cybersecurity threat Russia poses to their country. Do you think your government has appropriately estimated the cyberthreat Russia poses to your country? 54% Somewhat underestimated 32% Appropriately estimated 3% Somewhat overestimated 2% Severely overestimated 3% Not sure 6% Severely underestimated n = 259
  • 9. “[We are] working with relevant government agencies.” “Threat Intelligence and correlated IoCs [Indicators of Compromise] are critical for monitoring systems and assets at higher risk in this environment. Sharing threat Intel with partners across the industry is paramount for industry protection.” - C-suite, software industry, 10,000+ employees - Director, financial industry, 1,000 - 5,000 employees
  • 10. The number of cyberattacks in Ukraine will increase in volume and severity over the coming weeks, many believe, while utilities is the top identified target of concern Looking specifically at Ukraine, 81% of decision makers believe that Russia will increase the volume of cybersecurity attacks on Ukraine in the coming weeks. Do you think Russia will increase or decrease the volume of cyberattacks in Ukraine over the coming weeks? n = 259 37% Significant increase 44% Moderate increase 2% Significant decrease 16% No change 2% Moderate decrease
  • 11. 82% of respondents think that Russia will increase the severity of cybersecurity attacks on Ukraine in the coming weeks. Do you think Russia will increase or decrease the severity of cyberattacks in Ukraine over the coming weeks? 41% Significant increase 41% Moderate increase 15% No change n = 259 Moderate decrease 2%, Significant decrease 1%
  • 12. Utilities (74%) is the top Russian cyberattack target of concern among decision makers, followed by communications (66%) and financial systems (63%). What potential targets of Russian cyberattacks concern you the most? 74% 66% 63% 40% 28% (e.g., gas, electricity, water) (e.g., internet, telecom) Financial systems Government services Manufacturing/ supply chain infrastructure Utilities Communications Hospital systems 24%, Businesses aiding the Ukrainian resistance 21%, Private citizens aiding the Ukrainian resistance 8% , Other 0% n = 259
  • 13. “[We have] delegated some of the employees to monitor Russian traffic.” “We are monitoring the network connectivity from Russia and Ukraine to our services. - VP, software industry, 1,000 - 5,000 employees - Director, financial industry, 5,000 - 10,000 employees
  • 14. Do you think Russia poses a cyberthreat to your business? 57% Yes 24% No 19% Not sure Just over half (57%) of decision makers believe that Russia poses a cyberthreat to their business. Over half believe Russia poses a cyberthreat to their business, while many believe their leadership has underestimated the threat n = 259
  • 15. Do you think the leadership at your company has appropriately estimated the cyberthreat Russia poses to your business? Close to half of decision makers (44%) believe the leadership at their organization has underestimated the cyberthreat Russia poses on their business, though the same number (44%) believes that leadership has appropriately estimated the threat. 40% Somewhat underestimated 44% Appropriately estimated 6% Somewhat overestimated 1% Severely overestimated 4% Severely underestimated n = 259 5% Not sure
  • 16. “We are not afraid of attacks aimed on us. However, we inform our employees about possible disinformation.” “[We are] implementing SIEM, DLP, Threat Hunting, URL Threat Protection, IDS/IPS.” - C-suite, manufacturing industry, 10,000+ employees - C-suite, financial industry, 5,000 - 10,000 employees
  • 17. The cyberthreat from Russia on businesses has increased since the invasion of Ukraine, according to most, with ransomware the top identified concern Of those who think Russia poses a cyberthreat to their business, 86% believe the threat has increased since the invasion of Ukraine. 19% Increased significantly 67% Increased moderately 12% Stayed the same Decreased significantly 0% 2% Decreased moderately Do you think the cyberthreat Russia poses to your business has increased or decreased since the invasion of Ukraine? n = 147
  • 18. Ransomware (76%) is the top identified cyberattack of concern from Russia, followed by phishing (68%) and DDoS (56%). What kinds of attacks originating from Russia are you most concerned about? 76% Ransomware 68% Phishing 56% Distributed Denial of Service (DDoS) 49% Malware 40% Data theft Spyware 33%, SQL injection 23%, Other 1%, None of these 0% n = 147
  • 19. “We are monitoring our backups very carefully as the backups are surely any attacker’s first priority.” “We are trying to go back to the basics and review the overall security posture and ensure that gaps [are] not left open.” - C-suite, manufacturing industry, 5,000 - 10,000 employees - C-suite, manufacturing industry, 1,000 - 5,000 employees
  • 20. “We are reviewing our Russian vendors.” “For now I think we are safe but we certainly need to prepare ourselves.” - C-suite, financial industry, 5,000 - 10,000 employees - C-suite, financial industry, 1,000 - 5,000 employees “We are always doing all we can to protect [ourselves] from cybersecurity threats.” - C-suite, financial industry, 10,000+ employees
  • 21. Want more insights like this from IT leaders like you? Explore the revamped, retooled and reimagined Gartner Peer Insights. You’ll get unprecedented access to verified reviews, synthesized insights and engaging discussions from a community of your peers.
  • 22. Respondent Breakdown Region Company Size Title North America 76% APAC8% EMEA 16% C-Suite <1,001 employees 10,001+ employees Director VP 34% 30% 15% 1,001-5,000 employees Manager 21% This content, which provides opinions and points of view expressed by users, does not represent the views of Gartner; Gartner neither endorses it nor makes any warranties about its accuracy or completeness. © 2022 Gartner, Inc. and/or its affiliates. All rights reserved. Source: Gartner Peer Insights, Cybersecurity Impacts of the Russian Invasion of Ukraine survey 5,001 - 10,000 employees 39% 25% 9% 27%