Arjun Chauhan – Everest Group https://www.everestgrp.com A leading global research firm Fri, 07 Feb 2025 09:38:23 +0000 en-US hourly 1 https://www.everestgrp.com/wp-content/uploads/2020/02/favicon-150x150.png Arjun Chauhan – Everest Group https://www.everestgrp.com 32 32 Demystifying Data Security – A Comprehensive Guide to Data Security | Blog https://www.everestgrp.com/blog/demystifying-data-security-a-comprehensive-guide-to-data-security.html Thu, 06 Feb 2025 09:41:41 +0000 https://www.everestgrp.com/?p=139631 71 Output Based Pricing

The rising importance of data security in 2024 and beyond Data security became a critical focus area for enterprises in 2024 due to numerous factors, with the increasing adoption of artificial intelligence (AI) leading the charge. According to the 2025 […]]]>
71 Output Based Pricing

The rising importance of data security in 2024 and beyond

Data security became a critical focus area for enterprises in 2024 due to numerous factors, with the increasing adoption of artificial intelligence (AI) leading the charge.

According to the 2025 World Economic Forum’s Report1, 20% of enterprises are most concerned about data leaks linked to Generative AI (gen AI) adoption. This places data leaks as the second-highest concern, trailing only adversarial capabilities such as phishing and deep fakes.

To fully grasp this growing concern, it’s essential to explore the fundamentals of data security and its significance in today’s digital landscape, which is what our analysts have done in this latest blog.

Reach out to discuss this topic in depth.

Understanding data security

Data security refers to the practice of protecting data from unauthorized access, theft, or corruption throughout its lifecycle, whether it resides on-premises, in the cloud, or within hybrid environments.

It encompasses a range of measures, from physical safeguards to advanced digital solutions. For this blog, we have focused on the digital aspects of data security.

A widely used framework to define data security is the Central Intelligence Agency (CIA) Triad2, which comprises three core principles:

Blog exhibit slide 1
  • Confidentiality – preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

  • Integrity – guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity

  • Availability – ensuring timely and reliable access to and use of information

These principles form the foundation of a robust data security strategy and guide enterprises in securing their sensitive information. With the basics of the CIA Triad established, it’s also critical to differentiate data security from a closely related but distinct concept—data privacy.

Data security vs. data privacy

Building on the CIA Triad, it is essential to distinguish between data security and data privacy, as these concepts often overlap but serve distinct purposes. While data security focuses on protecting data from external threats, data privacy addresses how data is handled and shared within organizations. Here’s a simple comparison:

Blog exhibit slide 2

In essence, data security focuses on keeping data safe, while data privacy ensures its ethical and responsible usage. Understanding these distinctions sets the stage for examining the key drivers and challenges shaping the data security landscape.

Drivers and challenges of data security

With a clear understanding of what data security entails, it’s important to examine the factors driving its adoption and the challenges that hinder implementation. This helps contextualize why data security has become a pressing priority.

Key drivers

  1. Gen AI adoption – The growing use of gen AI heightens concerns about protecting sensitive data during training and operations. Enterprises are prioritizing measures to prevent intellectual property leaks, unauthorized access, and accidental exposure
  2. Increasing cyber threats – Cyberattacks, including ransomware, phishing, and Advanced Persistent Threats (APTs), are becoming more sophisticated. Robust data security is essential to safeguard sensitive information and maintaining business continuity
  3. Regulatory compliance pressure – Stringent regulations like General Data Protection Regulation (GDPR), EU AI Act, National Institution of Standards and Technology Artificial Intelligence Risk Management Framework (NIST AI RMF), California Consumer Privacy Act CCPA, and India’s Digital Personal Data Protection (DPDP) Act compel organizations to adopt stringent security protocols. Compliance builds trust and ensures adherence to legal obligations

Major challenges

  1. Complex technology landscape – Integrating diverse security solutions across hybrid and multi-cloud environments is challenging, leading to vulnerabilities
  2. Evolving threat vectors – Cybercriminals continually refine tactics, making it difficult for organizations to stay ahead without agile security frameworks
  3. Resource and budget constraints – Many organizations struggle to allocate sufficient budgets and skilled personnel, limiting their ability to implement effective security measures

With these drivers and challenges in mind, understanding the types of data security solutions available becomes crucial to overcoming these obstacles effectively.

Types of data security solutions and technologies

For successful implementation of data security, organizations must rely on a structured approach rooted in the CIA Triad. This ensures that all aspects of confidentiality, integrity, and availability are addressed using the right solutions and tools.

Blog exhibit slide 3

This structured approach equips enterprises to secure data effectively while addressing unique organizational needs. Next, we explore the pivotal role of service providers in driving data security initiatives.

What should providers do about data security?

Recognizing the complexities outlined above, providers play a critical role in supporting enterprises as they navigate the evolving data security landscape. Here are actionable strategies for providers:

  1. Collaboration with specialized security providers – Enterprises expect service providers to forge strategic partnerships with industry-leading encryption, Data Security Posture Management (DSPM), Data Loss Protection (DLP), and AI-security experts. The complexity of today’s threats demands a robust ecosystem of specialized tools and technologies to ensure comprehensive protection and continuous innovation

  2. Tailored and scalable security solutions – Enterprises demand data security solutions that can adapt to different organizational sizes and industry requirements. From lightweight, cost-effective defenses for smaller entities to advanced, multi-tiered frameworks for large enterprises, providers must deliver a scalable approach that addresses diverse risk profiles

  3. Proactive compliance and regulatory alignment – Organizations expect service providers to stay ahead of global and local regulations, offering proactive advisory services, automated compliance reporting, and real-time monitoring. By anticipating and adapting to legal requirements, they position themselves as trusted partners who ensure organization’s uninterrupted compliance

  4. End-to-end coverage across the CIA triad – Enterprises look to technology providers to deliver integrated solutions that address all facets of the CIA triad. This requires both established capabilities—like encryption and data loss prevention—and emerging innovations, such as DSPM, to cover the full spectrum of modern data security demands

  5. AI-driven innovation for advanced threat detection – Enterprises expect technology providers to harness AI to transform data security. From automated risk assessments and predictive threat intelligence to streamlined incident response, AI-enabled solutions must now offer faster, smarter, and more adaptive defenses that help us outpace evolving cyber risks

What we believe is next…As enterprises navigate the complexities of data security, it’s clear that protecting digital assets is no longer optional—it’s a necessity. The adoption of AI, increasing cyber threats, and regulatory pressures are now reshaping the landscape, demanding innovative and comprehensive solutions. By leveraging advanced tools, focusing on education, and building strong ecosystems, service providers can now lead the way in securing the future of digital information!

If you found this blog interesting, check out our MXDR: A Revolutionary And Comprehensive Solution Transforming Cybersecurity Detection And Response | Blog – Everest Group blog, which delves deeper into another topic regarding data and cybersecurity.

To discuss data security in more depth with our team, please contact Kumar Avijit (kumar.avijit@everestgrp.com) and Arjun Chauhan (arjun.chauhan@everestgrp.com).

1. WEF Report on Cybersecurity Outlook 2024

2. NIST 1800-26

3. This set of technologies is not intended to be exhaustive but aims to provide a broad overview

]]>
Five Cybersecurity Predictions That’ll Shape the Services Industry in 2025 | Blog  https://www.everestgrp.com/blog/five-cybersecurity-predictions-thatll-shape-the-services-industry-in-2025-blog.html Wed, 29 Jan 2025 13:29:13 +0000 https://www.everestgrp.com/?p=138922 Background 2048x563 2 scaled

Cybersecurity has rapidly ascended the priority list for enterprises worldwide, and for good reason. As digital transformation accelerates, organizations find themselves managing countless user endpoints, cloud deployments, and data touchpoints—all of which are enticing targets for cybercriminals.   High-profile breaches and […]]]>
Background 2048x563 2 scaled

Cybersecurity has rapidly ascended the priority list for enterprises worldwide, and for good reason. As digital transformation accelerates, organizations find themselves managing countless user endpoints, cloud deployments, and data touchpoints—all of which are enticing targets for cybercriminals.  

High-profile breaches and ransomware incidents over the last few years have made cybersecurity concerns a boardroom agenda. Beyond merely avoiding data loss or regulatory fines, companies now appreciate how trust and reputation hinge on robust security measures.  

In this environment, cybersecurity spending has soared, often outpacing broader Information Technology (IT) budgets. Entering 2025, cybersecurity is no longer seen as an overhead cost; it is recognized as an indispensable enabler of innovation, competitiveness, and brand confidence, as our analysts have explained in this latest blog. 

Reach out to discuss this topic in depth. 

With 2024’s turbulent conditions setting the stage, enterprises anticipate an uneven global services rebound in 2025. Cybersecurity consistently identified as a top investment priority—second only to Generative AI (gen AI) in our recent Key Priorities Study 2025—stands at the forefront of enterprise agendas.  

Understanding how shifts in threats, technologies, and regulations will reshape cybersecurity services in 2025 is crucial for informed strategic decision-making. By anticipating these emerging patterns, businesses can then proactively safeguard their operations, allocate budgets more effectively, and capitalize on new growth opportunities.  

In essence, knowing what lies ahead in cybersecurity can be a decisive factor for both protection and progression in the services industry. 

Five key cybersecurity predictions for 2025 

1.Cyber resiliency will overtake basic cybersecurity measures – The CrowdStrike black swan event has reiterated the need for resilient businesses, resurfacing the mandate of having a cyber-resilient organization. Approximately 35% of organizations report insufficient cyber resilience. In 2025, enterprises will pivot toward a cyber resiliency mindset, focusing on business continuity and rapid recovery. This pivot arises from the reality that even the best defensive strategies can falter under sophisticated threats. 

    The shift toward resiliency-driven solutions will expand the scope of cybersecurity services. Service providers will have to focus on comprehensive offerings that encompass threat intelligence, incident response planning, and post-breach recovery. 

    As the bar rises for minimum viable defenses, cybersecurity teams and outsourcing partners will see heightened demand for solutions that ensure minimal operational downtime—pushing them to develop specialized frameworks that guarantee resilience even amid large-scale attacks. 

    2.Securing AI and data governance will become mission-critical – The rapid adoption of gen AI across critical operations means organizations will rely heavily on algorithmic decision-making. While artificial intelligence (AI) helps automate processes and unlock new business value, it also presents new vulnerabilities—think malicious AI model manipulation or data poisoning. 


      Cybersecurity providers will have to craft services specifically tailored to safeguard AI pipelines—ranging from model development and training to deployment and ongoing optimization.  

      Enhanced data governance solutions will emerge to ensure the integrity and confidentiality of the data that trains these AI models. Providers who can combine cybersecurity, data privacy, and AI competencies stand to differentiate themselves, offering holistic solutions that facilitate innovation while safeguarding against AI-centric threats. 

      3.Global Capability Centers (GCCs) will spur demand for specialized cybersecurity – The rising emphasis on cost optimization and control is driving enterprises to set up or expand GCCs. These GCCs serve as operational hubs, handling core and specialized functions, including cybersecurity. As approximately 57% of Global Business Services (GBS) clients list cybersecurity among their top three focus areas, the urgency for advanced security frameworks embedded within GCC operations will skyrocket. 
       
      Cybersecurity service providers have a significant growth opportunity here. Enterprises will look for partners who can design and run robust security infrastructures for distributed global teams. Providers capable of offering scalable, high-quality managed security services—from setting up secure development operations to incident response across multiple locations—will thrive. This trend will also heighten the importance of multi-jurisdictional compliance expertise, as GCCs need to navigate privacy and data protection regulations worldwide. 

        4.AI-driven attacks will grow in sophistication – Just as enterprises leverage AI to bolster security operations, threat actors use AI-driven techniques to elevate the complexity of cyberattacks. From automated vulnerability scanning and exploit generation, to highly personalized phishing campaigns and deepfakes, AI can significantly amplify the scale and efficacy of malicious efforts. 
         
        The arms race between cybercriminals and defenders will intensify. Cybersecurity providers must innovate rapidly, deploying AI-powered detection and response systems that can counter advanced threats in real time. Partnerships with specialized AI security technology providers will become common, and training programs for cybersecurity professionals will emphasize AI literacy. This evolution will push the industry toward more proactive, predictive cyber defense strategies—those that anticipate emerging AI-fueled threats rather than simply react to known threat vectors. 

          5.Service providers will embrace Gen AI—and prepare for Agentic AI – Generative AI has already begun reshaping how cybersecurity services are delivered, particularly in areas like threat analysis. Companies like DeepSeek have proven how gen AI costs can be significantly reduced, while still maintaining a high degree of accuracy in complex tasks. By late 2025, we can expect the emergence of Agentic AI, an evolution beyond gen AI that enables more autonomous decision-making in cybersecurity workflows.  
           
          Service providers will increasingly adopt gen AI to streamline labor-intensive processes and improve service responsiveness. As Agentic AI starts to take form, providers will differentiate themselves by offering more autonomous and self-optimizing security solutions. This shift could dramatically lower costs, reduce reliance on manual oversight, and enable faster, on-demand adaptability to new cyber threats. Service providers that incorporate both gen AI and emerging Agentic AI capabilities into their service delivery will be better positioned to compete in an industry seeking not just security, but also agility, efficiency, and innovation. 

            The cybersecurity landscape of 2025 promises to be as dynamic as ever, shaped by AI innovations, global expansion of cybersecurity service capabilities, and the relentless pursuit of cyber resiliency.  

            Navigating these changes demands both flexibility and foresight. By proactively embracing specialized services, forging strategic partnerships, and focusing on holistic solutions, enterprises can transform cyber threats into opportunities for growth. In the end, a prepared and adaptable organization is better poised not just to defend itself, but to thrive in a world where security empowers innovation. 

            If you found this blog interesting, check out two of our recent blogs Exploring The Importance Of Post-quantum Cryptography: An Unbreakable Vault To Protect Enterprises Against Advanced Cyberattacks, Part 2 | Blog – Everest Group and Decoding Quantum Computing: Uncovering Its Potential Impact And Opportunities, Part I | Blog – Everest Group, which delve deeper into other topics regarding cybersecurity. 

            To discuss these cybersecurity predictions for 2025 in more depth, please contact Kumar Avijit (kumar.avijit@everestgrp.com) and Arjun Chauhan (arjun.chauhan@everestgrp.com). 

            ]]>
            Cybersecurity Services Specialists PEAK Matrix® Assessment https://www.everestgrp.com/peak-matrix/cybersecurity-services-specialists.html Sun, 20 Oct 2024 11:30:02 +0000 https://www.everestgrp.com/?p=123232 Cyber security

            The demand for comprehensive cybersecurity services is increasing globally due to hybrid working models, rapid digitalization initiatives expanding the attack surface, evolving regulations, and escalating cyber threats. These factors drive businesses to invest in advanced cybersecurity solutions that can safeguard […]]]>
            Cyber security

            The demand for comprehensive cybersecurity services is increasing globally due to hybrid working models, rapid digitalization initiatives expanding the attack surface, evolving regulations, and escalating cyber threats. These factors drive businesses to invest in advanced cybersecurity solutions that can safeguard their operations, ensure regulatory compliance, and maintain customer trust.

            Additionally, as governments worldwide enforce stricter data protection and security regulations, enterprises face increasing pressure to comply with these regulations and adhere to localized data privacy laws. In response to these pressures, the C-suite is now more actively involved in cybersecurity decision-making, driven by heightened awareness of the potential impact on business operations, reputation, and compliance. Global enterprises are now seeking cybersecurity services specialist providers offering highly tailored and cost-effective cybersecurity solutions and bringing deep expertise to their cybersecurity portfolios.

            • Cybersecurity Services Specialists PEAK Matrix® Assessment 2024

              Cyber security

              What is in this PEAK Matrix® Report

              In this report, we comprehensively analyze 12 cybersecurity services providers as featured on the Cybersecurity Services Specialists PEAK Matrix® Assessment 2024. The research will help buyers select the right-fit provider for their needs, while providers will be able to benchmark themselves against each other.

              Scope:

              • All industries and geographies
              • Services: Cybersecurity services
              • The assessment is based on Everest Group’s annual RFI process for the calendar year 2024, interactions with leading cybersecurity service providers, client reference checks, and an ongoing analysis of the cybersecurity services market
              • The assessment is focused on cybersecurity services specialist providers that meet the below criteria:
                • At least 50% of firm’s annual revenue attributed to cybersecurity services
                • Overall number of cybersecurity FTEs less than 5,000
                • Overall firm revenue less than $2 billion

              Contents:

              In this report, we examine:

              • Cybersecurity services specialists PEAK Matrix® characteristics
              • 12 cybersecurity services specialist providers’ profiles
              • Providers’ key strengths and limitations
              • Enterprise sourcing considerations
              READ ON

            What is the PEAK Matrix®?

            The PEAK Matrix® provides an objective, data-driven assessment of service and technology providers based on their overall capability and market impact across different global services markets, classifying them into three categories: Leaders, Major Contenders, and Aspirants.

            LEARN MORE ABOUT Top Service Providers

            ]]>
            Cybersecurity Services PEAK Matrix® Assessment- Europe https://www.everestgrp.com/peak-matrix/cybersecurity-services-europe.html Sat, 19 Oct 2024 17:52:23 +0000 https://www.everestgrp.com/?p=123207 Cybersecurity Services

            Due to the region’s diverse cultural, linguistic, and regulatory landscape, European enterprises face unique cybersecurity demands, requiring customized solutions from providers. The region’s data security and governance laws are rapidly tightening, especially with generative AI’s growing popularity. The AI Act […]]]>
            Cybersecurity Services

            Due to the region’s diverse cultural, linguistic, and regulatory landscape, European enterprises face unique cybersecurity demands, requiring customized solutions from providers. The region’s data security and governance laws are rapidly tightening, especially with generative AI’s growing popularity. The AI Act and other regulations introduce new compliance requirements that European businesses must meet.

            On the other hand, cloud computing, IoT, and remote work have expanded the attack surface, increasing vulnerability to cyber threats. In response, providers are developing AI-driven threat detection, zero-trust frameworks, and SASE solutions. Autonomous security operations centers are also gaining traction to provide continuous monitoring and rapid threat response. To stay competitive, providers are upskilling their workforce and automating processes to address the skill gap in cybersecurity. As digital threats evolve, providers must prioritize adaptive security measures and remain flexible to thrive in Europe’s complex regulatory environment.

            • Cybersecurity Services PEAK Matrix® Assessment 2024 – Europe

              CYBERSECURITYEUROPE2024 1

              What is in this PEAK Matrix® Report

              In this research, we assess 28 European cybersecurity providers, featured on the Cybersecurity Services PEAK Matrix® Assessment 2024. The assessment is based on Everest Group’s annual RFI process for the calendar year 2024, interactions with leading cybersecurity providers, client reference checks, and the cybersecurity services market’s ongoing analysis.

              Content:

              In this report, we examine:

              • Cybersecurity Services PEAK Matrix® characteristics in Europe
              • Sourcing considerations for enterprises
              • Providers’ key strengths and limitations in Europe

              Scope

              • All-encompassing industries worldwide
              • Geography: Europe
              READ ON

            What is the PEAK Matrix®?

            The PEAK Matrix® provides an objective, data-driven assessment of service and technology providers based on their overall capability and market impact across different global services markets, classifying them into three categories: Leaders, Major Contenders, and Aspirants.

            LEARN MORE ABOUT Top Service Providers

            ]]>
            Cybersecurity Services PEAK Matrix® Assessment – North America https://www.everestgrp.com/peak-matrix/cybersecurity-services-north-america.html Wed, 18 Sep 2024 19:54:54 +0000 https://www.everestgrp.com/?p=121240 Cybersecurity Services

            The increasing reliance on digital technologies has driven a significant rise in robust cybersecurity services’ demand in North America. Cloud computing, IoT devices, and remote work’s rapid adoption has expanded the attack surface for cybercriminals, making organizations more vulnerable to […]]]>
            Cybersecurity Services

            The increasing reliance on digital technologies has driven a significant rise in robust cybersecurity services’ demand in North America. Cloud computing, IoT devices, and remote work’s rapid adoption has expanded the attack surface for cybercriminals, making organizations more vulnerable to sophisticated threats such as data breaches and ransomware. This has created urgent challenges such as skilled professionals’ shortage and strict regulatory requirements for enterprises.

            Providers are developing advanced cybersecurity solutions, such as AI-driven threat detection, zero trust, secure access service edge, gen AI security, quantum security, and autonomous security operations centers, to combat these challenges. They are also investing in talent development and automation to address the skill gap. As the digital landscape evolves, the focus on proactive and adaptive security measures is expected to drive continued growth in cybersecurity.

            • Cybersecurity Services PEAK Matrix® Assessment 2024 – North America

              Cybersecurity Services

              What is in this PEAK Matrix® Report

              In this research, we assess 30 North American cybersecurity providers, featured on the Cybersecurity Services PEAK Matrix® Assessment 2024. The assessment is based on Everest Group’s annual RFI process for the calendar year 2024, interactions with leading cybersecurity providers, client reference checks, and the cybersecurity services market’s ongoing analysis.

              Scope

              • Industry: all-encompassing industries worldwide
              • Geography: North America

              Contents:

              In this report, we cover:

              • Cybersecurity Services PEAK Matrix® characteristics in North America
              • Enterprise sourcing considerations
              • Providers’ key strengths and limitations in North America
              READ ON

            What is the PEAK Matrix®?

            The PEAK Matrix® provides an objective, data-driven assessment of service and technology providers based on their overall capability and market impact across different global services markets, classifying them into three categories: Leaders, Major Contenders, and Aspirants.

            LEARN MORE ABOUT Top Service Providers

            ]]>
            Gen AI and the Future of Cybersecurity: Advanced Strategies for Cyber Defense | Webinar https://www.everestgrp.com/webinars/gen-ai-and-the-future-of-cybersecurity-advanced-strategies-for-cyber-defense-webinar/ Fri, 06 Sep 2024 01:10:17 +0000 https://www.everestgrp.com/?p=118815 07-11-2024 - Gen AI and the Future of Cybersecurity - Get the presentation

            Generative AI (gen AI) is growing in popularity and is rapidly reshaping the cybersecurity landscape with its innovative capabilities. This webinar, drawing from current advancements and Everest Group’s recent research, provided cybersecurity buyers and service providers with insights into new […]]]>
            07-11-2024 - Gen AI and the Future of Cybersecurity - Get the presentation

            WATCH THE WEBINAR ON-DEMAND

            Generative AI (gen AI) is growing in popularity and is rapidly reshaping the cybersecurity landscape with its innovative capabilities.

            This webinar, drawing from current advancements and Everest Group’s recent research, provided cybersecurity buyers and service providers with insights into new developments, emerging applications, challenges, and opportunities presented by gen AI in cybersecurity.

            What questions did the webinar answer?

            • What are the drivers and inhibitors for gen AI adoption in cybersecurity?
            • What are some of the emerging gen AI use cases in cybersecurity?
            • What should enterprises do with gen AI in cybersecurity?
            • What should service providers do with gen AI in cybersecurity?

            Who should attend?

            • CISOs and CIOs
            • Security and cybersecurity leaders
            • Heads of outsourcing
            • Procurement heads
            • Vendor managers
            • Service provider leaders

            ]]>
            Crowdstrike Backs Microsoft’s Demand for Reducing Kernel-level Access | In the News https://www.everestgrp.com/in-the-news/crowdstrike-backs-microsofts-demand-for-reducing-kernel-level-access.html Wed, 14 Aug 2024 14:45:59 +0000 https://www.everestgrp.com/?p=119789 vgjkdbdb 400x400

            In a significant shift in the security landscape, CrowdStrike appears to be aligning with Microsoft’s demand to reconsider kernel-level access for security vendors. “I foresee the security landscape evolving with Microsoft’s push to limit kernel-level access, and in the near […]]]>
            vgjkdbdb 400x400

            In a significant shift in the security landscape, CrowdStrike appears to be aligning with Microsoft’s demand to reconsider kernel-level access for security vendors.

            “I foresee the security landscape evolving with Microsoft’s push to limit kernel-level access, and in the near term, we do not anticipate a significant shift in the security landscape due to Microsoft’s push to limit kernel-level access,” said Arjun Chauhan, Senior Analyst at Everest Group.

            Read more in CSO.

            ]]>
            Back to the Future: Windows Update Is Now a Trojan Horse for Hackers | In the News https://www.everestgrp.com/in-the-news/back-to-the-future-windows-update-is-now-a-trojan-horse-for-hackers.html Wed, 14 Aug 2024 14:37:18 +0000 https://www.everestgrp.com/?p=119779 vgjkdbdb 400x400

            A recent discovery has revealed a serious flaw in Microsoft’s Windows update. “Although Microsoft has stated that it has not observed these downgrade attacks occurring in the wild, the lack of a reliable solution six months after the SafeBreach team […]]]>
            vgjkdbdb 400x400

            A recent discovery has revealed a serious flaw in Microsoft’s Windows update.

            “Although Microsoft has stated that it has not observed these downgrade attacks occurring in the wild, the lack of a reliable solution six months after the SafeBreach team reported the vulnerability raises concerns about Microsoft’s ability to effectively address this issue,” said Arjun Chauhan, Senior Analyst at Everest Group.

            Read more in CSO.

            ]]>
            The CrowdStrike Update Incident: Readying for the Next Black Swan Event | Blog https://www.everestgrp.com/it-services/the-crowdstrike-update-incident-readying-for-the-next-black-swan-event-blog.html Fri, 26 Jul 2024 10:41:33 +0000 https://www.everestgrp.com/?p=118919 GettyImages 1249846138

            In just 78 minutes, a faulty update from CrowdStrike caused global chaos, grounding flights, disrupting hospitals, and halting banking services. This incident serves as a stark reminder of the urgent need for enterprises to bolster their resilience strategies. Read on […]]]>
            GettyImages 1249846138

            In just 78 minutes, a faulty update from CrowdStrike caused global chaos, grounding flights, disrupting hospitals, and halting banking services. This incident serves as a stark reminder of the urgent need for enterprises to bolster their resilience strategies. Read on to learn the essential steps enterprises must take to prepare for future disruptions. For more details, reach out to us to discuss this topic further.

            What happened, and how did it happen?

            CrowdStrike pushed a faulty sensor configuration update for Falcon that made the Windows devices crash; however, Linux and Mac devices weren’t impacted by this update. The update was pushed on July 19, 2024, at 4:09 UTC, and the remediation was provided on July 19, 2024, at 5:27 UTC – within 78 minutes, but these 78 minutes were enough to create waves that would result in major economic and societal impacts. CrowdStrike (or any other large software provider) can make kernel-level changes in Windows, and it was a kernel-level change that resulted in the Blue-Screen-of-Death (BSOD) error. This approach is very different from Mac, Apple revoked the kernel access to technology providers in 2020, but that resulted in a lot of technology providers having to re-write their entire software.

            Microsoft confirmed that the number of Windows devices impacted was close to 8.5 million (around <1% of overall global Windows devices) in its recent press release, but we can’t ignore the severity of the impact.

            Impacts of the faulty CrowdStrike update

            Some of the major impacts were felt across the companies that directly dealt with end-consumers, including:

            • Airlines: Thousands of flights were canceled across the globe owing to the system outage on Windows devices. Delta alone reported that the pause in Delta’s operation resulted in more than 3,500 canceled Delta and Delta Connection flights through July 20. It wasn’t just the airlines; airports too suffered severely, with disruptions reported in airports around the world, such as Hong Kong; Sydney, Australia; Berlin; and Amsterdam
            • Healthcare: Several hospitals across the globe were impacted by the outage. In some cases, the outage resulted in the cancelation of non-critical surgeries. US-based Kaiser Permanente, which runs 16 hospitals and 197 medical offices across Southern California and provides care to 12.6 million members in the United States, said that all of its hospitals were affected, and it activated backup systems to keep caring for patients. In the UK, doctors were not able to access their online booking systems, and there are reports of cancelation of non-critical surgeries in Germany
            • Banks: Multiple banks saw disruption in services across the globe. Some of the leading ones that were unavailable are Arvest Bank, Bank of America, Capital One, Charles Schwab, Chase, TD Bank, US Bank, and Wells Fargo. There are reports of banks facing outages in Asia as well; the Reserve Bank of India (RBI) mentioned 10 Indian banks and NBFCs experienced minor disruption in services due to the CrowdStrike update

            Microsoft called this outage a demonstration of the “interconnected nature of our broad ecosystem,” but this raises a lot of questions about how software updates are pushed, whether enterprises should trust all the updates, and what to do in such situations. In one interview, the Chair of the Federal Trade Commission said, “These incidents reveal how concentration can create fragile systems.”

            Typical enterprise challenges that make these incidents more severe

            This is not a one-off incident, and in no logical sense will this be the last either. Enterprises face several challenges in managing these kinds of incidents, but some of the biggest challenges are as follows:

            1. Lack of agility: Enterprises often struggle to quickly adapt to and mitigate unexpected issues due to rigid processes and slow decision-making
            2. Complex infrastructure: Diverse and outdated systems increase the difficulty in identifying and resolving issues, prolonging outages
            3. Gigantic scale: Large enterprises operate vast and interconnected systems, making it challenging to quickly isolate and resolve issues, leading to widespread disruptions
            4. Limited asset visibility: Inadequate tracking of assets hampers the ability to pinpoint and address affected components swiftly, exacerbating the impact of incidents

            What should enterprises do for a long-term fix?

            Enterprises must prioritize building business resilience to address black swan events, such as the CrowdStrike update incident or the COVID-19 pandemic. Business resilience is the ability of an enterprise to quickly adapt to disruptions while maintaining continuous operations and safeguarding people, assets, and brand equity. This approach not only ensures long-term sustainability but also provides a competitive advantage, as demonstrated by airlines and banks that remained unaffected.

            One of the core pillars of business resilience is cyber resilience, which is more about how to deal with zero-day attacks that can literally halt the business operations of a company. We have internally developed a cyber resilience framework called 5R. Our 5R framework can help enterprises remain cyber resilient in the face of such black swan events.

            Picture1 2

            A parallel can be drawn for operational resilience, the other important half of business resilience, using the same framework – enterprises can look at these individual 5Rs of Ready, Respond, Recover, Reinforce, and Revamp from a business perspective. In CrowdStrike’s faulty update push case specifically, enterprises need to focus on Reinforcing their learnings and leverage supply chain best practices to make sure that the impact of black swan events can be minimized.

            To summarize, here are some key actions enterprises should take for a long-term fix:

            1. Emphasize innovation in business resilience: While enterprises understand its importance, there has been little innovation in business resilience. Invest in solutions that match advancements in cybersecurity, cloud, and apps
            2. Focus on cyber resilience: Develop strategies to manage zero-day attacks and other cyber threats, using frameworks like the internally developed 5R framework
            3. Enhance operational resilience: Ensure continuity during disruptions by adopting best practices and integrating supply chain management to mitigate unexpected impacts
            4. Foster strategic collaboration: Collaborate closely with service providers to build effective resilience frameworks, moving beyond treating them as mere order-takers
            5. Establish Objectives and Key Results (OKRs) and Service Level Agreements (SLAs) on business resilience: Implement OKRs and SLAs to measure and ensure business resilience, aligning them with strategic goals for continuous improvement

            While talking to some enterprises over the “outage weekend,” we realized how the industry leaders are looking to build stronger OKRs around business resilience and tie them to SLAs. Some of the OKRs and corresponding SLAs that we discussed are added below:

            Objective Key result SLAs
            Ensure operational continuity Reduce system downtime by XX% Maximum allowable downtime of XX hour per month
            Enhance disaster recovery capabilities Implement automated backup solutions across all systems Data backup completed within XX hours of changes
            Strengthen cybersecurity posture Decrease security incidents by XX% Incident response time of less than XX minutes
            Improve supply chain resilience Diversify suppliers for key components XX% of key suppliers with alternative sourcing options
            Boost employee readiness Conduct quarterly business resilience training sessions XX% employee participation in training sessions

            How should enterprises partner with service providers to establish business resilience?

            Enterprises should strategically identify and align with key service providers within their ecosystem to enhance business resilience, including preparation for black swan events. Service providers specializing in infrastructure management and cybersecurity services are ideal partners, as these areas are more crucial to overall business resilience. Opting for one or two partners enhances accountability and effectiveness in resilience efforts. Here are key recommendations for enterprises for choosing a strategic partner for business resilience:

            1. Enhanced protection strategies: Partner with service providers to implement comprehensive protection solutions, including real-time risk detection and response. This collaboration helps safeguard against disruptions, ensuring continuous operations
            2. Frequent data back-ups and recovery services: Ensure service providers offer automated, regular data backups and quick recovery solutions. This strategy enables swift restoration of operations after data loss or corruption, minimizing downtime
            3. Better asset visibility: Work with service providers to gain enhanced visibility into digital assets through advanced tools and platforms. Effective monitoring and management of infrastructure allow for quick identification and resolution of potential issues
            4. Robust supply chain through sandboxing: Encourage service providers to implement sandboxing techniques to test and validate software supply chain updates in a controlled environment. This approach ensures robust and resilient supply chain operations that can adapt to disruptions
            5. Training employees on business resilience: Collaborate with service providers to conduct regular training sessions for employees on business resilience strategies. This training equips employees with the knowledge and skills needed to handle disruptions and maintain operational continuity

            The recent CrowdStrike update incident underscores the vital need for robust business resilience. To mitigate future disruptions, enterprises should invest in innovative resilience strategies, enhance cybersecurity measures, and collaborate with service providers to ensure continuous operations and safeguard their assets. To learn more about the 5R framework or for questions, reach out to Arjun Chauhan or Kumar Avijit.

            Watch the webinar, Gen AI and the Future of Cybersecurity: Advanced Strategies for Cyber Defense, for insights into new developments, emerging applications, challenges, and opportunities presented by gen AI in cybersecurity.

            ]]>
            Generative AI Adoption Maturity Among Cybersecurity Service Providers | Market Insights™ https://www.everestgrp.com/market-insights/business-process-services/generative-ai-adoption-maturity-among-cybersecurity-service-providers.html Tue, 23 Jul 2024 14:14:50 +0000 https://www.everestgrp.com/?p=118769 Generative AI Adoption Maturity Among Cybersecurity Service Providers

            Cybersecurity VIEW THE FULL REPORT]]>
            Generative AI Adoption Maturity Among Cybersecurity Service Providers

            Cybersecurity

            VIEW THE FULL REPORT

            ]]>