{"id":863010,"date":"2023-11-13T09:22:46","date_gmt":"2023-11-13T08:22:46","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=863010"},"modified":"2023-11-13T09:22:48","modified_gmt":"2023-11-13T08:22:48","slug":"fa2-addressing-the-cyber-threat-landscape-in-europe-calls-for-a-mix-of-technology-skills-and-partnerships","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en\/work-productivity-en\/na\/fa2-addressing-the-cyber-threat-landscape-in-europe-calls-for-a-mix-of-technology-skills-and-partnerships\/","title":{"rendered":"Addressing the cyber threat landscape in Europe calls for a mix of technology, skills and partnerships"},"content":{"rendered":"<p class=\"intro\">Keeping ahead of an evolving threat landscape is not simply an IT department issue. Security has become a core business priority in a data-first world. Research suggests that in about two years businesses that successfully take a data-led approach will generate more than 25% of revenue from digital products and services. At the same time, insights from the recent <a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/security-intelligence-report\" target=\"_blank\" rel=\"noopener\">Microsoft Digital Defense<\/a> report show opportunistic criminals are becoming more sophisticated and automated.<\/p>\n<p>For example, attempted password attacks have increased 10-fold year-over-year. So, Microsoft is blocking an average of 4,000 password attacks per second to keep our customers secure. Organized cybercrime services are increasingly available for hire on the dark web. This means a criminal no long needs extensive skills or resources to disrupt a business or compromise its data. Just the motivation and some cash. Today, distributed denial of services (DDoS) can be purchased for as little as $5 USD. The effect of this trend can be seen here in Europe. The region is now the second most targeted of all DDoS attacks in the world \u2013 up from 4th place a year ago and trailing only the US.<\/p>\n<h2>Strategic advantage through AI<\/h2>\n<p>We\u2019re seeing how AI is helping augment cybersecurity teams and giving organizations a strategic advantage. Using AI we can analyze the 65 trillion cybersecurity signals Microsoft receives daily and convert it into actionable intel to keep our customers safe &#8212; spotting and pre-empting criminal efforts.<\/p>\n<p>This kind of analytic power and speed would simply not be possible without AI and the cloud. Similarly, we see customers using AI and data tools to augment their teams, increasing the speed and effectiveness of threat detection, response, analysis and prediction.<\/p>\n<p>It is important for me to stress a key point: AI\u2019s true value is fully realized when it augments the experience and problem-solving abilities of trained professionals. This is a timely issue as many businesses have cybersecurity teams that are stretched thin. In fact, the <a href=\"https:\/\/digital-skills-jobs.europa.eu\/en\/latest\/briefs\/mind-cyber-gap-deep-dive-cybersecurity#:~:text=In%202022%2C%20the%20shortage%20of,were%20estimated%20at%20883%2C000%20professionals.\" target=\"_blank\" rel=\"noopener\">EU reports<\/a> that Europe faces a deficit of up to 500,000 cybersecurity professionals. That is why Microsoft \u2013 among other initiatives&#8212; is supporting the <a href=\"https:\/\/blogs.microsoft.com\/eupolicy\/2023\/04\/25\/microsoft-eu-cybersecurity-skills-academy\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Skills Academy<\/a> and is committed to train 100,000 learners in Europe with cybersecurity skills over a two-year period.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-863013\" src=\"https:\/\/pulse.microsoft.com\/wp-content\/uploads\/2023\/11\/Security_Pulse.jpg\" alt=\"A man and a woman looking at a screen showcasing a dashboard\" width=\"1400\" height=\"800\" data-contrast=\"\" srcset=\"\/wp-content\/uploads\/2023\/11\/Security_Pulse.jpg 1400w, \/wp-content\/uploads\/2023\/11\/Security_Pulse-300x171.jpg 300w, \/wp-content\/uploads\/2023\/11\/Security_Pulse-768x439.jpg 768w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<h2>Security is everyone&#8217;s business<\/h2>\n<p>Basic security hygiene can protect against 99% of attacks according to the Microsoft Digital Defense Report. But, in a data-first world, each employees needs to appreciate their role in promoting cybersecurity. Supply chain logistics managers. Customer service field agents. CFOs. Everyone in between. Employees need the right skills and understanding of the threat environment.<\/p>\n<p>The EU\u2019s Network and Information Security Directive 2 (commonly referred to as NIS2) supports this point. The legislation was designed to help protect Europe\u2019s critical infrastructure &#8212; such as financial services and manufacturing &#8212; as the threat landscape evolves. NIS2 requires in-scope organizations to have comprehensive plans and measures in place by next October for mitigating risk as well as managing and reporting incidents. The breadth of the legislation speaks to a fundamental truth: staying a step ahead of emerging is a company-wide transformation journey.<\/p>\n<p>NIS2 is ultimately an opportunity for businesses to build trust with customers and stakeholders. The best time to start preparing is today \u2013 <a href=\"https:\/\/pulse.microsoft.com\/en\/work-productivity-en\/na\/fa2-one-year-to-go-preparing-for-nis2-isnt-a-compliance-exercise-its-a-business-opportunity\/\" target=\"_blank\" rel=\"noopener\">my colleague Mike Hughes wrote a great guide on how you can get started.<\/a><\/p>\n<h2>The power of partnership<\/h2>\n<p>The reporting requirements in NIS2 highlights another truth: minimizing cyber security threats requires cooperation and collaboration. It\u2019s too big a challenge for any one organization to address working in a silo. We all need to play our part in sharing knowledge and learnings, across the private and public sectors. Microsoft partners with global law enforcement on cybercrime issues as well as with our industry peers. In the face of an acute shortage of cyber security experts shortage, we created a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/05\/09\/building-a-safer-world-together-with-our-partners-introducing-microsoft-security-experts\/\" target=\"_blank\" rel=\"noopener\">service<\/a> to give customers direct access to our own specialists to help augment their teams.<\/p>\n<p>The bottom line, any organization \u2013 regardless of where they are in their cybersecurity journey \u2013 can take action and effectively stay ahead of cyber criminals. Embracing AI and the cloud offers crucial advantage. Bringing employees along on the journey \u2013 in terms of the culture you promote and skills you prioritize \u2013 is equally as important.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeping ahead of an evolving threat landscape is not simply an IT department issue. Security has become a core business priority in a data-first world. Research suggests that in about two years businesses that successfully take a data-led approach will generate more than 25% of revenue from digital products and services. At the same time, [&hellip;]<\/p>\n","protected":false},"author":60,"featured_media":863656,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1829],"class_list":["post-863010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-en","specials-work-productivity-en","stories-how-can-i-work-secure","stories-working-secure-en","businessPriorities-digital-transformation"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/863010"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/comments?post=863010"}],"version-history":[{"count":2,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/863010\/revisions"}],"predecessor-version":[{"id":863104,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/863010\/revisions\/863104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media\/863656"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media?parent=863010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/categories?post=863010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}