The Russian invasion of Ukraine poses an immediate
humanitarian crisis due to traditional warfare tactics. However,
in an increasingly digitized world, do technology decision-makers fear cybersecurity-based attacks within Ukraine and upon their own countries and businesses?
One-Minute Insights on timely topics are available to Gartner
Peer Insights members. Sign up for access to over 100 more,
and new insights each week.
The Russian invasion of Ukraine poses an immediate humanitarian crisis due to traditional warfare tactics. However, in an increasingly digitized world, do technology decision makers fear cybersecurity-based attacks within Ukraine and upon their own countries and businesses?
One-Minute Insights on timely topics are available to Gartner Peer Insights members. Sign up for access to over 100 more, and new insights each week.
The frequency and impact of cyber attacks have escalated cybersecurity to the top of Board agendas. Institutions are no longer asking if they are vulnerable to cyber attacks. Instead, the focus has shifted to how the attack might be executed, risks and impact. Most importantly, their organisational readiness and resilience to such threats.
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
The single largest threat your organization faces today is network breach. Spear-phishing, poisoned search results, drive-by downloads, and legitimate sites being compromised to push malware are all part of our current reality. The most successful and common attacks vectors stem from targeted attacks on your employees. Organizations need to utilize solutions that protect their network from user error and support requirements for continuous monitoring, real-time situational awareness and providing actionable threat intelligence for their security teams.
Topics covered during the briefing include:
Key Privacy, Cybersecurity, IT Audit, and Compliance Challenges for Healthcare
Updates on New Privacy and Compliance Laws and What They Change/Impact
Trending Cybersecurity Threats in the Healthcare Industry Trending Best Practices
Real-World Examples of Recent Incidents and Key Takeaways from Each
Outlook to the Top Issues for 2022
The Russian invasion of Ukraine poses an immediate humanitarian crisis due to traditional warfare tactics. However, in an increasingly digitized world, do technology decision makers fear cybersecurity-based attacks within Ukraine and upon their own countries and businesses?
One-Minute Insights on timely topics are available to Gartner Peer Insights members. Sign up for access to over 100 more, and new insights each week.
The frequency and impact of cyber attacks have escalated cybersecurity to the top of Board agendas. Institutions are no longer asking if they are vulnerable to cyber attacks. Instead, the focus has shifted to how the attack might be executed, risks and impact. Most importantly, their organisational readiness and resilience to such threats.
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
The single largest threat your organization faces today is network breach. Spear-phishing, poisoned search results, drive-by downloads, and legitimate sites being compromised to push malware are all part of our current reality. The most successful and common attacks vectors stem from targeted attacks on your employees. Organizations need to utilize solutions that protect their network from user error and support requirements for continuous monitoring, real-time situational awareness and providing actionable threat intelligence for their security teams.
Topics covered during the briefing include:
Key Privacy, Cybersecurity, IT Audit, and Compliance Challenges for Healthcare
Updates on New Privacy and Compliance Laws and What They Change/Impact
Trending Cybersecurity Threats in the Healthcare Industry Trending Best Practices
Real-World Examples of Recent Incidents and Key Takeaways from Each
Outlook to the Top Issues for 2022
Is the financial services industry vulnerable to constant cyber attacksKevinMax
S21sec is a leading company in services and technology of Cybersecurity, shared the trends that are experienced in terms of cyber attacks, which suffers almost all over the world. These trends are the result of updating your annual predictions, which are accurate. This sets off the alarm to be alert to new and more advanced attacks, especially in the banking and retail industries.
90% of data that exist today was created in the past 2 years. This massive amount of data allows organizations to take a
more qualitative approach to business and customer
service, but also makes them vulnerable to a continually
increasing number of threats.
Internet of Things Security - Trust in the supply chainDuncan Purves
Presentation on the threats to Internet of Things solutions and how you establish trust in the Internet of Things supply chain and where you go to find security frameworks and best practice. Also includes details about the Secure IoT event being in held in Reading, UK on 17 October 2017.
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.
Viewers will learn:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
About the Presenter:
Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention
Welcome to the Threatsploit Report of covering some of the important cybersecurity events, incidents and exploits that occurred this month such as Application Security, Mobile App Security, Network Security, Website Security, API Security, Cloud Security, Host Level Security, Cyber Intelligence, Thick Client Security, Threat Vulnerability, Database Security, IOT Security, Wireless Security.
WannaCry Ransomware attack has affected a lot of endpoints in the networks of hospitals, educational organizations, Government sector etc. This has led to the negative consequences on the businesses causing loss of data, thus hampering the business continuity.
When money is the at the top of the mind of
cybercriminals, where do they turn their heads to? The
Banking Sector. This SlideShare takes you through the top 5 cybersecurity risks that banks and other financial firms face today.
When money is the at the top of the mind of cybercriminals, where do they turn their heads to? The Banking Sector. With countless operations including Wealth Management, Trading, and Revenue Management, Investor Accounting, it is no light matter when we say that cybersecurity threats keep banks up at night. With data breaches rampantly hitting all types of organizations across the world, the banking sector, for obvious reasons, stays under a constant and increased pressure for safekeeping of their customer's data and more importantly, their money.
In principle, enterprise architecture (EA) provides a framework for business technology,
information management, systems and teams. This framework enables organizations to unify the business to execute on a future vision and adapt to change. However, given
the complexity involved, execution may be challenging.
How are leaders approaching EA in their organization?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Cybersecurity is ensuring business continuity by protecting their organization’s digital assets, including sensitive data, from attack or employee negligence.
Amid rising global tensions at a time when nations are deploying IT armies and enacting cybersecurity mandates, what is the state of cybersecurity in Q1, 2022?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
More Related Content
Similar to Cybersecurity Impacts of the Russian Invasion of Ukraine
Is the financial services industry vulnerable to constant cyber attacksKevinMax
S21sec is a leading company in services and technology of Cybersecurity, shared the trends that are experienced in terms of cyber attacks, which suffers almost all over the world. These trends are the result of updating your annual predictions, which are accurate. This sets off the alarm to be alert to new and more advanced attacks, especially in the banking and retail industries.
90% of data that exist today was created in the past 2 years. This massive amount of data allows organizations to take a
more qualitative approach to business and customer
service, but also makes them vulnerable to a continually
increasing number of threats.
Internet of Things Security - Trust in the supply chainDuncan Purves
Presentation on the threats to Internet of Things solutions and how you establish trust in the Internet of Things supply chain and where you go to find security frameworks and best practice. Also includes details about the Secure IoT event being in held in Reading, UK on 17 October 2017.
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.
Viewers will learn:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
About the Presenter:
Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention
Welcome to the Threatsploit Report of covering some of the important cybersecurity events, incidents and exploits that occurred this month such as Application Security, Mobile App Security, Network Security, Website Security, API Security, Cloud Security, Host Level Security, Cyber Intelligence, Thick Client Security, Threat Vulnerability, Database Security, IOT Security, Wireless Security.
WannaCry Ransomware attack has affected a lot of endpoints in the networks of hospitals, educational organizations, Government sector etc. This has led to the negative consequences on the businesses causing loss of data, thus hampering the business continuity.
When money is the at the top of the mind of
cybercriminals, where do they turn their heads to? The
Banking Sector. This SlideShare takes you through the top 5 cybersecurity risks that banks and other financial firms face today.
When money is the at the top of the mind of cybercriminals, where do they turn their heads to? The Banking Sector. With countless operations including Wealth Management, Trading, and Revenue Management, Investor Accounting, it is no light matter when we say that cybersecurity threats keep banks up at night. With data breaches rampantly hitting all types of organizations across the world, the banking sector, for obvious reasons, stays under a constant and increased pressure for safekeeping of their customer's data and more importantly, their money.
In principle, enterprise architecture (EA) provides a framework for business technology,
information management, systems and teams. This framework enables organizations to unify the business to execute on a future vision and adapt to change. However, given
the complexity involved, execution may be challenging.
How are leaders approaching EA in their organization?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Cybersecurity is ensuring business continuity by protecting their organization’s digital assets, including sensitive data, from attack or employee negligence.
Amid rising global tensions at a time when nations are deploying IT armies and enacting cybersecurity mandates, what is the state of cybersecurity in Q1, 2022?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Local remote work mandates were in flux in 2021 due to variants of the coronavirus, first with the delta and then the omicron variant. As 2021 came to a close, how were
decision-makers managing their remote workforces?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Passwords are a part of everyday business operations, protecting valuable entry points to sensitive data and files. And yet, the burden of password security is mostly on the
end users, who may be required to remember and enter numerous passwords daily.
How are IT teams dealing with passwords in 2022, and are password alternatives
being adopted?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
CIOs traditionally oversee the IT department within the organization, but as businesses introduce more digital processes, the CIO role may be expanding. In 2022, CIOs have many challenges to face, whether that’s the widely-reported “Great Resignation,” the enablement of hybrid work as some regions lift Covid restrictions, or the myriad
cybersecurity threats.
Amid the need for multiple areas of focus, what are CIOs prioritizing in 2022?
Use these insights to benchmark against your peers.
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
As organizations continue to undergo digital transformation in every aspect of
business, is the separation between business and technology disappearing? How
tech-savvy are business leaders today, and do tech decision makers believe they will
need to be in the future?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Data collection: October 26, 2021 - February 26, 2022
Respondents: 341 IT, engineering and information security professionals
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. One Minute Insights:
Many decision makers
believe that Russia poses a
cyberthreat to their country,
and that there will be an
increase in cyberattacks
over the coming weeks
Over half believe that their
government is
underestimating the
cybersecurity threat Russia
poses to their country
Most believe that Russia
poses a cyberthreat to their
business, while many
believe their organizational
leadership has
underestimated this threat
The cyberthreat from Russia
on businesses has increased
since the invasion of
Ukraine
3. The volume and severity of
attacks on Ukraine are
expected to increase over
the coming weeks
Utilities are the top
identified target of concern
for cybersecurity attacks
from Russia
Ransomware is the top
identified Russian
cyberattack of concern
4. Cybersecurity Impacts of the
Russian Invasion of Ukraine
The Russian invasion of Ukraine poses an immediate
humanitarian crisis due to traditional warfare tactics. However,
in an increasingly digitized world, do technology decision
makers fear cybersecurity-based attacks within Ukraine and
upon their own countries and businesses?
One-Minute Insights on timely topics are available to Gartner
Peer Insights members. Sign up for access to over 100 more,
and new insights each week.
Data collection: March 11 - March 14, 2022
Respondents: 259 tech decision makers
5. Most believe Russia to be a growing
cybersecurity threat, and that their
government is underestimating that threat
Over three-quarters (79%) of decision makers think Russia
poses a cyberthreat to their country.
n = 259
Do you think Russia
poses a cyberthreat
to your country?
79%
Yes
10%
No
11%
Unsure
6. 88% of respondents think that the volume of cyberattacks
originating in Russia will increase over the coming weeks.
Do you think Russia will increase
or decrease the volume of
cyberattacks in your country
over the coming weeks?
n = 204
Significant
increase
Moderate
increase No change
Moderate
decrease
Significant
decrease
24%
64%
2%
7%
3%
7. The majority (84%) think cyberattacks originating in Russia
will increase in severity over the coming weeks.
Do you think Russia will
increase or decrease the
severity of cyberattacks
in your country over the
coming weeks?
27%
Significant increase
2%
Significant decrease
2%
Moderate decrease
12%
No change
57%
Moderate
increase
n = 204
8. Almost two-thirds (60%) of decision makers consider their
government to be underestimating the cybersecurity threat
Russia poses to their country.
Do you think your government has appropriately estimated
the cyberthreat Russia poses to your country?
54%
Somewhat
underestimated
32%
Appropriately
estimated
3%
Somewhat
overestimated
2%
Severely overestimated
3%
Not sure
6%
Severely underestimated
n = 259
9. “[We are] working with relevant
government agencies.”
“Threat Intelligence and correlated IoCs
[Indicators of Compromise] are critical for
monitoring systems and assets at higher risk
in this environment. Sharing threat Intel with
partners across the industry is paramount for
industry protection.”
- C-suite, software industry, 10,000+ employees
- Director, financial industry, 1,000 - 5,000 employees
10. The number of cyberattacks in Ukraine will
increase in volume and severity over the
coming weeks, many believe, while utilities is
the top identified target of concern
Looking specifically at
Ukraine, 81% of decision
makers believe that
Russia will increase the
volume of cybersecurity
attacks on Ukraine in the
coming weeks.
Do you think Russia will
increase or decrease the
volume of cyberattacks
in Ukraine over the
coming weeks?
n = 259
37%
Significant increase
44%
Moderate increase
2%
Significant decrease
16%
No change
2%
Moderate decrease
11. 82% of respondents think that Russia will increase the severity
of cybersecurity attacks on Ukraine in the coming weeks.
Do you think Russia will increase or decrease the severity
of cyberattacks in Ukraine over the coming weeks?
41%
Significant increase
41%
Moderate
increase
15%
No change
n = 259
Moderate decrease 2%,
Significant decrease 1%
12. Utilities (74%) is the top Russian
cyberattack target of concern
among decision makers, followed
by communications (66%) and
financial systems (63%).
What potential targets
of Russian cyberattacks
concern you the most?
74%
66%
63%
40%
28%
(e.g., gas,
electricity, water)
(e.g., internet,
telecom)
Financial systems
Government
services
Manufacturing/
supply chain
infrastructure
Utilities
Communications
Hospital systems 24%, Businesses aiding the Ukrainian resistance 21%,
Private citizens aiding the Ukrainian resistance 8% , Other 0% n = 259
13. “[We have] delegated some of the
employees to monitor Russian traffic.”
“We are monitoring the network connectivity
from Russia and Ukraine to our services.
- VP, software industry, 1,000 - 5,000 employees
- Director, financial industry, 5,000 - 10,000 employees
14. Do you think Russia poses a
cyberthreat to your business?
57%
Yes
24%
No
19%
Not sure
Just over half (57%) of decision makers believe that Russia
poses a cyberthreat to their business.
Over half believe Russia poses a cyberthreat
to their business, while many believe their
leadership has underestimated the threat
n = 259
15. Do you think the leadership at your company
has appropriately estimated the cyberthreat
Russia poses to your business?
Close to half of decision makers (44%) believe the leadership at
their organization has underestimated the cyberthreat Russia
poses on their business, though the same number (44%)
believes that leadership has appropriately estimated the threat.
40%
Somewhat
underestimated
44%
Appropriately
estimated
6%
Somewhat
overestimated
1%
Severely overestimated
4%
Severely
underestimated
n = 259
5%
Not sure
16. “We are not afraid of attacks aimed on us.
However, we inform our employees about
possible disinformation.”
“[We are] implementing SIEM, DLP, Threat
Hunting, URL Threat Protection, IDS/IPS.”
- C-suite, manufacturing industry, 10,000+ employees
- C-suite, financial industry, 5,000 - 10,000 employees
17. The cyberthreat from Russia on businesses
has increased since the invasion of Ukraine,
according to most, with ransomware the top
identified concern
Of those who think Russia poses a cyberthreat to their
business, 86% believe the threat has increased since the
invasion of Ukraine.
19%
Increased
significantly
67%
Increased
moderately
12%
Stayed
the same
Decreased significantly 0%
2%
Decreased
moderately
Do you think the cyberthreat Russia
poses to your business has increased or
decreased since the invasion of Ukraine?
n = 147
18. Ransomware (76%) is the top
identified cyberattack of
concern from Russia, followed by
phishing (68%) and DDoS (56%).
What kinds of attacks
originating from
Russia are you most
concerned about?
76%
Ransomware
68%
Phishing
56%
Distributed Denial of
Service (DDoS)
49%
Malware
40%
Data theft
Spyware 33%, SQL injection 23%, Other 1%, None of these 0% n = 147
19. “We are monitoring our backups very
carefully as the backups are surely any
attacker’s first priority.”
“We are trying to go back to the basics and
review the overall security posture and ensure
that gaps [are] not left open.”
- C-suite, manufacturing industry,
5,000 - 10,000 employees
- C-suite, manufacturing industry,
1,000 - 5,000 employees
20. “We are reviewing our Russian vendors.”
“For now I think we are safe but we certainly
need to prepare ourselves.”
- C-suite, financial industry, 5,000 - 10,000 employees
- C-suite, financial industry, 1,000 - 5,000 employees
“We are always doing all we can to protect
[ourselves] from cybersecurity threats.”
- C-suite, financial industry, 10,000+ employees
21. Want more insights like this from IT leaders like you?
Explore the revamped, retooled and reimagined Gartner Peer
Insights. You’ll get unprecedented access to verified reviews,
synthesized insights and engaging discussions from a
community of your peers.