– Zack Brigman, Sr Product Marketing Manager<\/strong><\/h4>\n<\/div>\n<\/div>\n\n\n\nCyberthreats continue to reach record highs, both in the number of successful breaches, as well as the damage incurred as a result of these attacks. As we look ahead to 2023, experts project these trends to continue to move in the wrong direction as adversaries employ new sophisticated tactics, hackers-for-hire networks continue to expand, and the security\/IT skills gap widens. And while these negative forces present difficult challenges to navigate, organizations will take a big leap in the coming year to better plan, invest, and mature their cybersecurity disciplines.<\/p>\n\n\n\n
Prioritization<\/strong><\/p>\n\n\n\nBreaches happen. But not all assets, systems, and data are created equal. Given that a small percentage of information assets carry the majority of business risk, progressive companies will begin employing an \u201cinside-out\u201d cybersecurity strategy. One that starts with hardening and securing their most critical assets first \u2013 then working toward the perimeter. While perimeter defences and preventing intrusion will (and should) remain a paramount focus, this risk-aligned approach enables the prioritization of defence strategies to mitigate risk for high-value assets and functions. This reshapes conventional \u201coutside-in\u201d approaches, making security investments more accessible and operational.<\/p>\n\n\n\n
Tiger Teams<\/strong><\/p>\n\n\n\nTo better manage emerging threats and respond to risk, we will continue to see a rise in fusion teams (thanks Gartner for the term!) \u2013 merging IT, security, and operational stakeholders together to drive change. These blended teams help create new synergies by pairing complementary (but often siloed) groups and capacities to achieve common goals. These cross-functional teams increase visibility across the organization, discover and eliminate blind spots, and optimize investments in existing and new tools. While many mature organizations already leverage fusion teams today, 2023 will see a more widespread adoption of these functions to better identify risks, implement cyber response strategies, and manage threats.<\/p>\n\n\n\n
Managed Services<\/strong><\/p>\n\n\n\nAs threats mount, businesses will continue to adopt managed service (MSP) and managed security service (MSSP) offerings to augment existing tools and tactics. This is particularly true of lean IT departments and those looking to enhance their security operations centers. Leveraging these managed providers will enable organizations to close the cyber security skills gap, tap into a consortium of specialized solutions, and scale their cyber practice without managing additional headcount or disparate solutions. <\/p>\n\n\n\n
Thanks to all our contributors! Stay tuned to see if their predictions come true by following Commvault and our DPaaS portfolio Metallic on Social Media. <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"Cybersecurity experienced a huge year in 2022. So what can we expect in 2023? Check out what our Commvault professionals have to say.<\/p>\n","protected":false},"author":85,"featured_media":68631,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[975],"tags":[],"cmv_author":[855],"class_list":{"0":"post-68619","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity","8":"cmv_author-commvault","9":"entry"},"yoast_head":"\n
Commvault\u2019s 2023 Cyber Security Predictions<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n","yoast_head_json":{"title":"Commvault\u2019s 2023 Cyber Security Predictions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","og_locale":"en_US","og_type":"article","og_title":"Commvault\u2019s 2023 Cyber Security Predictions","og_description":"Cybersecurity experienced a huge year in 2022. So what can we expect in 2023? Check out what our Commvault professionals have to say.","og_url":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2023-01-11T20:17:41+00:00","article_modified_time":"2024-02-27T22:36:35+00:00","og_image":[{"width":957,"height":548,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","type":"image\/jpeg"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"Commvault\u2019s 2023 Cyber Security Predictions","datePublished":"2023-01-11T20:17:41+00:00","dateModified":"2024-02-27T22:36:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions"},"wordCount":1264,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","url":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions","name":"Commvault\u2019s 2023 Cyber Security Predictions","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","datePublished":"2023-01-11T20:17:41+00:00","dateModified":"2024-02-27T22:36:35+00:00","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","width":957,"height":548},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/2023-cyber-security-predictions#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Commvault\u2019s 2023 Cyber Security Predictions"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/01\/cybersecurity-blog_.jpg?quality=80","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/68619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=68619"}],"version-history":[{"count":16,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/68619\/revisions"}],"predecessor-version":[{"id":513678,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/68619\/revisions\/513678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/68631"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=68619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=68619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=68619"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=68619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}