SlideShare a Scribd company logo
1 of 21
Download to read offline
Cybersecurity Impacts
of the Russian Invasion
of Ukraine
One Minute Insights:
Many decision makers
believe that Russia poses
a cyberthreat to their
country, and that there
will be an increase in
cyberattacks over the
coming weeks
Most believe that Russia
poses a cyberthreat to
their business, while
many believe their
organizational leadership
has underestimated this
threat
Over half believe that
their government is
underestimating the
cybersecurity threat
Russia poses to their
country
The cyberthreat from
Russia on businesses has
increased since the
invasion of Ukraine
The volume and severity
of attacks on Ukraine are
expected to increase
over the coming weeks
Ransomware is the top
identified Russian
cyberattack of concern
Utilities are the top
identified target of
concern for
cybersecurity attacks
from Russia
Cybersecurity Impacts
of the Russian Invasion
of Ukraine
The Russian invasion of Ukraine poses an immediate humanitarian crisis due to traditional
warfare tactics. However, in an increasingly digitized world, do technology decision
makers fear cybersecurity-based attacks within Ukraine and upon their own countries and
businesses?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Data collection: March 11 - March 14, 2022
Respondents: 259 tech decision makers
Most believe Russia to be a
growing cybersecurity threat, and
that their government is
underestimating that threat
Over three-quarters (79%) of decision makers think Russia
poses a cyberthreat to their country.
n = 259
Do you think Russia poses a
cyberthreat to your country?
79%
Yes
10%
No
11%
Unsure
of respondents think that the volume of cyberattacks
originating in Russia will increase over the coming weeks.
88%
Do you think Russia will increase or decrease the volume of
cyberattacks in your country over the coming weeks?
n = 204
Significant
increase
Moderate
increase No change
Moderate
decrease
Significant
decrease
24%
64%
2%
7%
3%
The majority (84%) think cyberattacks originating in Russia will
increase in severity over the coming weeks.
Do you think Russia will increase or decrease the severity
of cyberattacks in your country over the coming weeks?
27%
Significant
increase
2%
Significant decrease
2%
Moderate
decrease
12%
No change
57%
Moderate increase
n = 204
Almost two-thirds (60%) of decision makers consider
their government to be underestimating the
cybersecurity threat Russia poses to their country.
Do you think your government has
appropriately estimated the cyberthreat
Russia poses to your country?
54%
Somewhat
underestimated
32%
Appropriately
estimated
3%
Somewhat
overestimated
2%
Severely overestimated
3%
Not sure
6%
Severely underestimated
n = 259
“[We are] working with
relevant government
agencies.”
“Threat Intelligence and correlated
IoCs [Indicators of Compromise]
are critical for monitoring systems
and assets at higher risk in this
environment. Sharing threat Intel
with partners across the industry is
paramount for industry protection.”
- C-suite, software industry, 10,000+ employees
- Director, financial industry,
1,000 - 5,000 employees
The number of cyberattacks in Ukraine will increase in volume and
severity over the coming weeks, many believe, while utilities is the
top identified target of concern
Looking specifically at Ukraine,
81%of decision makers believe that Russia will
increase the volume of cybersecurity attacks
on Ukraine in the coming weeks.
Do you think Russia will increase or
decrease the volume of cyberattacks in
Ukraine over the coming weeks?
37%
Significant increase
44%
Moderate increase
2%
Significant
decrease
2%
Moderate
decrease
16%
No change
n = 259
82%
of respondents think that Russia
will increase the severity of
cybersecurity attacks on
Ukraine in the coming weeks.
Do you think Russia will
increase or decrease the
severity of cyberattacks
in Ukraine over the
coming weeks?
41%
Significant increase
41%
Moderate
increase
15%
No change
2%
Moderate
decrease
1%
Significant
decrease
n = 259
Utilities (74%) is the top Russian cyberattack
target of concern among decision makers,
followed by communications (66%) and
financial systems (63%).
What potential targets of Russian
cyberattacks concern you the most?
74%
66%
63%
40%
28%
Utilities
(e.g., gas, electricity, water)
Communications
(e.g., internet, telecom)
Financial systems
Government services
Manufacturing/supply
chain infrastructure
Hospital systems
Businesses aiding the
Ukrainian resistance
Private citizens aiding the
Ukrainian resistance
Other
24%
21%
8%
0%
n = 259
“[We have] delegated some
of the employees to
monitor Russian traffic.”
- Director, financial industry,
5,000 - 10,000 employees
“We are monitoring the
network connectivity
from Russia and Ukraine
to our services.”
- VP, software industry,
1,000 - 5,000 employees
Do you think Russia poses a cyberthreat to
your business?
57%
Yes
24%
No
19%
Not sure
Just over half (57%) of decision makers believe that
Russia poses a cyberthreat to their business.
Over half believe Russia
poses a cyberthreat to their
business, while many
believe their leadership has
underestimated the threat
n = 259
Do you think the leadership at your company
has appropriately estimated the cyberthreat
Russia poses to your business?
Close to half of decision makers (44%) believe the
leadership at their organization has underestimated the
cyberthreat Russia poses on their business, though the
same number (44%) believes that leadership has
appropriately estimated the threat.
40%
Somewhat
underestimated
44%
Appropriately
estimated
6%
Somewhat
overestimated
1%
Severely overestimated
5%
Not sure
4%
Severely underestimated
n = 259
“We are not afraid of attacks
aimed on us. However, we
inform our employees about
possible disinformation.”
- C-suite, financial industry,
5,000 - 10,000 employees
“[We are] implementing SIEM,
DLP, Threat Hunting, URL
Threat Protection, IDS/IPS.”
- C-suite, manufacturing industry,
10,000+ employees
The cyberthreat from Russia on businesses has increased since the
invasion of Ukraine, according to most, with ransomware the top
identified concern
Of those who think Russia poses a cyberthreat to their business,
86% believe the threat has increased since the invasion
of Ukraine.
n = 147
19%
Increased
significantly
67%
Increased
moderately
12%
Stayed the same
0% Decreased significantly
2%
Decreased
moderately
Do you think the cyberthreat Russia poses to your business
has increased or decreased since the invasion of Ukraine?
Ransomware (76%) is the top identified cyberattack
of concern from Russia, followed by phishing (68%)
and DDoS (56%).
What kinds of attacks originating from Russia
are you most concerned about?
76%
Ransomware
68%
Phishing
56%
Distributed Denial of
Service (DDoS)
49%
Malware
40%
Data theft
33% Spyware
23% SQL injection
1% Other
0% None of these
n = 147
“We are monitoring
our backups very
carefully as the
backups are surely
any attacker’s
first priority.”
“We are trying to go back to the basics
and review the overall security posture
and ensure that gaps [are] not left open.”
- C-suite, manufacturing industry,
5,000 - 10,000 employees
- C-suite, manufacturing
industry, 1,000 - 5,000
employees
“We are reviewing our Russian vendors.”
- C-suite, financial industry, 1,000 - 5,000 employees
“For now I think we are safe
but we certainly need to
prepare ourselves.”
- C-suite, financial industry,
5,000 - 10,000 employees
“We are always doing all we
can to protect [ourselves]
from cybersecurity threats.”
- C-suite, financial industry,
10,000+ employees
Want more insights like this from IT leaders like you?
Click here to explore the revamped, retooled and
reimagined Gartner Peer Insights. You’ll get unprecedented
access to verified reviews, synthesized insights and
engaging discussions from a community of your peers.
Respondent Breakdown
Region
Company Size
Title
North America 76%
APAC8%
EMEA 16%
C-Suite
<1,001
employees
10,001+
employees
Director
VP
34%
30%
15%
1,001-5,000
employees
Manager
21%
This content, which provides opinions and points of view expressed by users, does not represent the views of Gartner; Gartner neither endorses it nor
makes any warranties about its accuracy or completeness.
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved.
Source: Gartner Peer Insights, Cybersecurity Impacts of the Russian Invasion of Ukraine survey
5,001 - 10,000
employees
39% 25%
9%
27%

More Related Content

Similar to Cybersecurity Impacts of the Russian Invasion of Ukraine

CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
5 Bold Cyber Security Predictions for 2024.pdf
5 Bold Cyber Security Predictions for 2024.pdf5 Bold Cyber Security Predictions for 2024.pdf
5 Bold Cyber Security Predictions for 2024.pdfSourabhKumar32807
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Is the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksIs the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksKevinMax
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceZimperium
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decgusbarrett
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chainDuncan Purves
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Steve Fantauzzo
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Gartner Peer Insights
 

Similar to Cybersecurity Impacts of the Russian Invasion of Ukraine (20)

CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
5 Bold Cyber Security Predictions for 2024.pdf
5 Bold Cyber Security Predictions for 2024.pdf5 Bold Cyber Security Predictions for 2024.pdf
5 Bold Cyber Security Predictions for 2024.pdf
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Is the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksIs the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacks
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-dec
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chain
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 

Recently uploaded

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Cybersecurity Impacts of the Russian Invasion of Ukraine

  • 1. Cybersecurity Impacts of the Russian Invasion of Ukraine
  • 2. One Minute Insights: Many decision makers believe that Russia poses a cyberthreat to their country, and that there will be an increase in cyberattacks over the coming weeks Most believe that Russia poses a cyberthreat to their business, while many believe their organizational leadership has underestimated this threat Over half believe that their government is underestimating the cybersecurity threat Russia poses to their country The cyberthreat from Russia on businesses has increased since the invasion of Ukraine The volume and severity of attacks on Ukraine are expected to increase over the coming weeks Ransomware is the top identified Russian cyberattack of concern Utilities are the top identified target of concern for cybersecurity attacks from Russia
  • 3. Cybersecurity Impacts of the Russian Invasion of Ukraine The Russian invasion of Ukraine poses an immediate humanitarian crisis due to traditional warfare tactics. However, in an increasingly digitized world, do technology decision makers fear cybersecurity-based attacks within Ukraine and upon their own countries and businesses? One-Minute Insights on timely topics are available to Gartner Peer Insights members. Sign up for access to over 100 more, and new insights each week. Data collection: March 11 - March 14, 2022 Respondents: 259 tech decision makers
  • 4. Most believe Russia to be a growing cybersecurity threat, and that their government is underestimating that threat Over three-quarters (79%) of decision makers think Russia poses a cyberthreat to their country. n = 259 Do you think Russia poses a cyberthreat to your country? 79% Yes 10% No 11% Unsure
  • 5. of respondents think that the volume of cyberattacks originating in Russia will increase over the coming weeks. 88% Do you think Russia will increase or decrease the volume of cyberattacks in your country over the coming weeks? n = 204 Significant increase Moderate increase No change Moderate decrease Significant decrease 24% 64% 2% 7% 3%
  • 6. The majority (84%) think cyberattacks originating in Russia will increase in severity over the coming weeks. Do you think Russia will increase or decrease the severity of cyberattacks in your country over the coming weeks? 27% Significant increase 2% Significant decrease 2% Moderate decrease 12% No change 57% Moderate increase n = 204
  • 7. Almost two-thirds (60%) of decision makers consider their government to be underestimating the cybersecurity threat Russia poses to their country. Do you think your government has appropriately estimated the cyberthreat Russia poses to your country? 54% Somewhat underestimated 32% Appropriately estimated 3% Somewhat overestimated 2% Severely overestimated 3% Not sure 6% Severely underestimated n = 259
  • 8. “[We are] working with relevant government agencies.” “Threat Intelligence and correlated IoCs [Indicators of Compromise] are critical for monitoring systems and assets at higher risk in this environment. Sharing threat Intel with partners across the industry is paramount for industry protection.” - C-suite, software industry, 10,000+ employees - Director, financial industry, 1,000 - 5,000 employees
  • 9. The number of cyberattacks in Ukraine will increase in volume and severity over the coming weeks, many believe, while utilities is the top identified target of concern Looking specifically at Ukraine, 81%of decision makers believe that Russia will increase the volume of cybersecurity attacks on Ukraine in the coming weeks. Do you think Russia will increase or decrease the volume of cyberattacks in Ukraine over the coming weeks? 37% Significant increase 44% Moderate increase 2% Significant decrease 2% Moderate decrease 16% No change n = 259
  • 10. 82% of respondents think that Russia will increase the severity of cybersecurity attacks on Ukraine in the coming weeks. Do you think Russia will increase or decrease the severity of cyberattacks in Ukraine over the coming weeks? 41% Significant increase 41% Moderate increase 15% No change 2% Moderate decrease 1% Significant decrease n = 259
  • 11. Utilities (74%) is the top Russian cyberattack target of concern among decision makers, followed by communications (66%) and financial systems (63%). What potential targets of Russian cyberattacks concern you the most? 74% 66% 63% 40% 28% Utilities (e.g., gas, electricity, water) Communications (e.g., internet, telecom) Financial systems Government services Manufacturing/supply chain infrastructure Hospital systems Businesses aiding the Ukrainian resistance Private citizens aiding the Ukrainian resistance Other 24% 21% 8% 0% n = 259
  • 12. “[We have] delegated some of the employees to monitor Russian traffic.” - Director, financial industry, 5,000 - 10,000 employees “We are monitoring the network connectivity from Russia and Ukraine to our services.” - VP, software industry, 1,000 - 5,000 employees
  • 13. Do you think Russia poses a cyberthreat to your business? 57% Yes 24% No 19% Not sure Just over half (57%) of decision makers believe that Russia poses a cyberthreat to their business. Over half believe Russia poses a cyberthreat to their business, while many believe their leadership has underestimated the threat n = 259
  • 14. Do you think the leadership at your company has appropriately estimated the cyberthreat Russia poses to your business? Close to half of decision makers (44%) believe the leadership at their organization has underestimated the cyberthreat Russia poses on their business, though the same number (44%) believes that leadership has appropriately estimated the threat. 40% Somewhat underestimated 44% Appropriately estimated 6% Somewhat overestimated 1% Severely overestimated 5% Not sure 4% Severely underestimated n = 259
  • 15. “We are not afraid of attacks aimed on us. However, we inform our employees about possible disinformation.” - C-suite, financial industry, 5,000 - 10,000 employees “[We are] implementing SIEM, DLP, Threat Hunting, URL Threat Protection, IDS/IPS.” - C-suite, manufacturing industry, 10,000+ employees
  • 16. The cyberthreat from Russia on businesses has increased since the invasion of Ukraine, according to most, with ransomware the top identified concern Of those who think Russia poses a cyberthreat to their business, 86% believe the threat has increased since the invasion of Ukraine. n = 147 19% Increased significantly 67% Increased moderately 12% Stayed the same 0% Decreased significantly 2% Decreased moderately Do you think the cyberthreat Russia poses to your business has increased or decreased since the invasion of Ukraine?
  • 17. Ransomware (76%) is the top identified cyberattack of concern from Russia, followed by phishing (68%) and DDoS (56%). What kinds of attacks originating from Russia are you most concerned about? 76% Ransomware 68% Phishing 56% Distributed Denial of Service (DDoS) 49% Malware 40% Data theft 33% Spyware 23% SQL injection 1% Other 0% None of these n = 147
  • 18. “We are monitoring our backups very carefully as the backups are surely any attacker’s first priority.” “We are trying to go back to the basics and review the overall security posture and ensure that gaps [are] not left open.” - C-suite, manufacturing industry, 5,000 - 10,000 employees - C-suite, manufacturing industry, 1,000 - 5,000 employees “We are reviewing our Russian vendors.” - C-suite, financial industry, 1,000 - 5,000 employees
  • 19. “For now I think we are safe but we certainly need to prepare ourselves.” - C-suite, financial industry, 5,000 - 10,000 employees “We are always doing all we can to protect [ourselves] from cybersecurity threats.” - C-suite, financial industry, 10,000+ employees
  • 20. Want more insights like this from IT leaders like you? Click here to explore the revamped, retooled and reimagined Gartner Peer Insights. You’ll get unprecedented access to verified reviews, synthesized insights and engaging discussions from a community of your peers.
  • 21. Respondent Breakdown Region Company Size Title North America 76% APAC8% EMEA 16% C-Suite <1,001 employees 10,001+ employees Director VP 34% 30% 15% 1,001-5,000 employees Manager 21% This content, which provides opinions and points of view expressed by users, does not represent the views of Gartner; Gartner neither endorses it nor makes any warranties about its accuracy or completeness. © 2022 Gartner, Inc. and/or its affiliates. All rights reserved. Source: Gartner Peer Insights, Cybersecurity Impacts of the Russian Invasion of Ukraine survey 5,001 - 10,000 employees 39% 25% 9% 27%