{{item.title}}
{{item.text}}
{{item.text}}
In the PwC Japan Group’s 2021 Cyber IQ Survey of Japan’s security leaders, we conducted a fact-finding investigation on the current and three-year outlook for security strategy, planning, structure, investment, supply chains, threat intelligence, privacy and other fields. This report, which summarises the findings of the survey as well as interviews with leading players in the public and private sectors, contains valuable insights for security leaders in Japan.
We hope that our recommendations based on these survey results will help your companies to take effective security measures.
In order to act in a proactive manner, we must be ready to anticipate what will be required in the future, based on both technical and non-technical intelligence. Raising the bar to a higher level will naturally require investment and resources, and this cannot be achieved without executive decision making. The determining factor will be the degree to which our leaders can lead.
This page provides highlights from our report on the 2021 Cyber IQ Survey. To read the full report, please download the PDF file from the following link.
The advancement of digital transformation (DX) is accelerating the use of digital technologies such as cloud, AI, IoT, and blockchain at various companies, and companies are already aware that security is becoming more important as a measure to ensure the safe use of these technologies. The importance of cybersecurity for digital connection is also rising quickly as the number of companies working on DX and digitalisation continues to increase. Digital connection can be viewed from two perspectives: that of the business supply chain and the IT supply chain.
Zero-trust architecture (ZTA) is a concept that has existed since before the COVID-19 pandemic, but it is becoming more necessary and urgent with the recent increase in remote work. However, because ZTA is just an architectural concept and not something that can be achieved by installing a specific security solution, even many advanced companies are now facing barriers and issues related to its implementation, and are therefore still exploring the possibilities.
The Cyber IQ Survey results showed that perimeter defence measures such as VPNs were still the most commonly deployed measures for mobile devices. (55.3% of respondents selected ‘VPN’ as the security measure they use for mobile devices, the largest percentage of all options.)
Meanwhile, regarding security measures that respondents have already taken and are planning to take in the next three years, survey results showed that ZTA-related measures such as risk-based authentication, multi-factor authentication, and single sign-on (SSO) are likely to increase, suggesting that companies are willing to change their mindset. However, in reality, the shift to ZTA is difficult to achieve in a short period of time, and we therefore expect companies to proceed in an incremental manner with the maturation of the related product markets and migration of current assets.
In recent years, a new type of cyberattack called ‘double extortion ransomware’ has become widespread. The term ‘double extortion’ refers to a ‘two-stage’ extortion scheme: Not only is data encrypted and a ransom demanded for its decryption, as with traditional ransomware attacks, but the data is also leaked if the ransom is not paid.
Some ransomware has also been found to use triple-stage extortion, sending a large amount of communication data to the victim organisation's website and interfering with the operation of the website if the ransom is not paid. In this way, the pressure on victims to pay the ransom is increasing, and ransomware attacks have become increasingly more malicious.
As cyber threats continue to evolve to outsmart corporate countermeasures, the hurdles to launching an attach are becoming lower and lower, due to the maturation of the market for attack tools and know-how provided as a service. At the same time, companies must continue to pay close attention to internal threats such as internal fraud and inadvertent leaks, in addition to external threats. It is therefore crucial for companies to recognise that they are unfortunately facing a growing number of these threats and to continuously review their countermeasures.
These survey results show that while many companies are willing to focus not only on protection but also on detection and recovery to enhance their resilience, they have not been involved in response and recovery. Despite the prevalence of the concept of cyber resilience, businesses still have a long way to go to realise it.
While companies are struggling to secure their resilience, cyber threats continue to expand. As mentioned in the above topics, there have been many reports of ransomware and other malware attacks entering the networks of other parties in the supply chain or remote workplaces, leading to security incidents. In addition to the office environment, the environments of production and research locations such as factories have also become digitalised, and those systems are now connected to each other by networks. This is why the intrusion of a cyber threat can lead directly to the disruption of an entire business and its operations, and why the damage caused by security incidents is becoming more and more serious.
In this survey, when asked how they were affected by security incidents that occurred in the past year, the percentages of respondents who answered, ‘Systems down’ and ‘Business impact’ were 22.5% and 19.8% respectively, along with ‘Data breach’ at 21.8%. Regarding ‘Business impact’, many respondents reported impacts directly related to business and operational continuity, such as ‘disruption of business, processes and services’ (26.9%) and ‘network strain’ (26.9%).
As attack methods are constantly changing, executives must understand the attackers' aims, determine what the threat is to their business, and make the final decision on budget allocation and countermeasures. Security personnel need to provide information that enables executives to understand the differences in attack targets and changes in threat trends, and to make decisions on how much and where to allocate the budget and what countermeasures to take.
Architectural changes such as cloud migration and the rise of supply chain risks have both expanded and blurred the areas which companies need to protect. Cyber attackers are tactically exploiting these new risks to conduct cyberattacks. Therefore, it is essential that companies collect and analyse both internal and external information, including information on the intentions and capabilities of cyber attackers, in order to avoid being caught off guard by an attack from an unexpected direction.
By collecting and analysing this information, it becomes possible to predict possible threats to the organisation with a high degree of accuracy and prepare for them. Performing such a series of activities in a near-real-time cycle is called ‘proactive security’. In order to achieve such security governance without being overwhelmed by daily risk assessment, it is important to define security management items as a common language across the organisation and to establish systems and processes for measurement, improvement, and reporting.
So what kind of efforts will companies need to take to achieve proactive security? In addition to their current efforts to develop and promote security response plans, companies will need to collect and analyse external factors related to cyber risks in order to acquire and strengthen capabilities to deal with urgent risks and to dynamically review their plans.
A lot of information explains cyber threats from a technical viewpoint and provides warnings about measures to be taken. However, what executives want to know is not the methods and technical details of cyberattacks, but how much damage cyber threats may cause to their business continuity, credibility and intellectual property (IP), as well as how to respond. It is important for executives to understand the degree of negative impact that current cyber threats have on their businesses and what IP is being targeted so that they can take concrete countermeasures.
To read our full report on the results of the 2021 Cyber IQ Survey, please download the PDF file from the link below.
About the 2021 Cyber IQ Survey
The 2021 Cyber IQ Survey was conducted among leaders and decision-makers of security organisations in companies with sales of 50 billion yen or more in a wide range of Japanese industry sectors, and received 262 responses.
This survey was conducted by the PwC Japan Group in June 2021.
{{item.text}}
{{item.text}}