State of Cybersecurity Report 2023
State of Cybersecurity Report 2023
State of Cybersecurity Report 2023
CYBERSECURITY
REPORT
CYBER RESILIENCE IN AN AGE
OF CONTINUOUS DISRUPTION
#SOCR
2023
Spotlight
on AI
PAGE 8
TABLE OF
CONTENTS
A NOTE FROM TONY BUFFOMANTE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
EXECUTIVE SUMMARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
The Big Picture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Spotlight on AI: Risk and Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Insights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Attacks are on the rise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
The modern enterprise embraces cybersecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
How are enterprises investing in 2023. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Cloud-first mindset gaining momentum. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Collaboration is critical. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
A look into the future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Security Trends by Geography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Americas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Europe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Asia Pacific • Middle East • Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Security Trends by Sector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Banking, Financial Services and Insurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Consumer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Energy, Natural Resources and Utilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Healthcare. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Manufacturing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
ABOUT WIPRO. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
We’ve entered an age of continuous disruption, and because of this, the responsibilities of the typical CISO
and others holding senior risk and security roles, are rapidly evolving. The 2023 State of Cybersecurity
Report (SOCR) offers a perspective and framework to help enterprises achieve cyber resilience. Our extensive
research uncovered a wealth of actionable insights within four main topic areas:
• State of Collaboration
• Future of Cybersecurity
We’re arguably reaching the tail end of the digital transformation journey now that a majority of businesses
have transitioned at least some workloads to the public or private cloud. As cloud footprints continue to
expand, logical boundaries are becoming fuzzy. Cloud security loopholes such as misconfigurations, blind
spots, shadow IT and lack of visibility create challenges for CXOs. A resilient cloud must strategically align
with the organization’s business objectives. This requires building a secure cloud architecture, adopting
standards and best practices for cloud security governance and using automation to enhance risk and
compliance visibility.
Security leaders have been working hard to solve these issues. But CISOs can’t afford to take a breath.
An even more disruptive technology is rolling out at a dizzying pace. The enterprise IT, security and risk
challenges surrounding Artificial Intelligence (AI) are orders of magnitude greater than those produced by
cloud adoption.
The enterprise threat landscape from edge to cloud is becoming more porous. It includes millions of
distributed endpoints, poorly protected remote sites and home offices, IoT/IIoT/OT devices, shadow clouds
next to legitimate clouds, mobile devices that are never backed up by IT and scores of global partners with
greater levels of access privileges.
In this unstable environment, hacking has become a multi-billion-dollar well-funded industry. Bad actors
have the same advanced technology tools as the businesses they target. This is fueling an increase in the
sophistication and sheer numbers of attacks and is cutting down the end-to-end life cycle of attacks — in
many cases, to a matter of hours. It is driving — arguably forcing — businesses to adopt AI systems to fortify
defenses and simultaneously accelerate growth.
AI, along with its machine learning (ML) component, has the potential to sharply change the cybersecurity
landscape. It can grow and learn. It can accelerate defense reactions fast enough to keep ahead of the bad
actors by recognizing attacks that don’t necessarily match previously seen patterns.
But like all tools, AI is only as good as the people using it. To avoid the kinks in the AI cybersecurity armor,
a proper deployment is truly a partnership. You need the right people to write the code, the right people to
test it and, critically, the right people to oversee the AI effort on an ongoing basis. To deploy cost-effective
AI governance, enterprises must design a risk-based AI framework that includes constant monitoring and
oversight to prevent it from creating security holes and backdoors that could allow data leakage to cyber
thieves and business competitors. To better understand the risk and compliance challenges posed by AI,
along with some best practices on how to solve them, please see the Spotlight on AI Risk and Compliance
section on page 8.
Balancing agile risk strategies with cost optimization and business priorities
These technology sea changes, coupled with global economic uncertainty, changing regulatory compliance
requirements and market dynamics, are challenging security leaders to reduce costs without increasing risks
and to optimize the performance of existing cybersecurity investments.
Cybersecurity financial management best practices are evolving to support increasing levels of operational
speed, agility, flexibility and security. However, more than two-thirds of organizations are spending less than
10% of the IT budget on security. Enterprises need to assess current cybersecurity spending against the
maturity of the organization to identify cyber cost optimization opportunities using four key strategies:
• Cybersecurity operating model enhancing risk-based collaboration and accountability with governance
and control frameworks.
• Tools rationalization assessing security technology investments with a market view on where expansion
or consolidation is warranted.
• Process optimization using automation and integration to allocate available resources more effectively
and adequately fund prioritized risk and compliance processes.
• Intelligent automation adopting generative AI and machine learning across all processes to automate
and orchestrate cyber hunting, containment, response and remediation.
An agile operating model can quickly reallocate the security budget to ensure resources are aligned with
strategic business priorities. This includes encouraging leaders in all departments to consider cybersecurity
investments with a focus on multi-year cost optimization rather than pure cost reduction. This agility allows
an enterprise to efficiently dial its security spend up and down for more effective risk management.
Security and risk management can no longer be considered just a cost center. They must factor into every
element of operations, including marketing, manufacturing, distribution, supply chain, web operations and
selecting global partners. Cybersecurity expertise in the boardroom ensures that a company makes strategic
decisions that align with long-term business objectives.
Our report found that many CIOs lack confidence in the ability of their enterprises to recover quickly from an
attack. The term “quickly“ means different things to different CIOs, but the fact is that many of them do not
have a good grasp of what will happen after an attack.
One way to improve the understanding of and response to attacks is to run regular cyberattack simulation
exercises. Simulations can train employees to respond effectively in different scenarios to minimize damages
and help the organization discover blind spots in their systems that threat actors may use as breach access
points. It’s encouraging to note that just 4% of survey respondents had not conducted any sort of incident
response exercise in the past two years. However, among the organizations that have conducted simulation
exercises, only 27% Ied board members in the process. While no business can perfectly protect itself from
every attack, every business can map out what is likely to happen, communication protocols, and how it can
quickly recover.
In addition to testing operational crisis readiness based on predefined scenarios, organizations are starting
to continuously test their defenses through automated penetration testing. Automated attack simulations
use the same AI tools and processes employed by bad actors in an effort to continuously reduce the attack
surface without waiting for the next planned simulation exercise.
As Artificial Intelligence (AI) and machine learning (ML) transition from the early adoption phase to the
mainstream, the supporting technology will become more powerful, take on more roles and disrupt the risk
and compliance landscape of virtually every organization.
Enterprises are exploring how AI can help implement greater operational efficiencies by automating simple,
repetitive tasks and enhancing complex communications.
But the challenges are evolving and growing in complexity at an alarming rate. Key challenges include:
• Disruption — Millions of jobs may be eliminated by generative AI unless intended use guidelines and
policies are established and enforced
• Data protection and privacy — AI running across organizations to grow the business has little oversight
on the potential exposure of personal data and the overall impacts on privacy and consumer protection
• Legal and compliance — The US and the EU are introducing AI-related laws and regulations and
designing blueprints for an AI Bill of Rights, including how the incorrect or unethical use of AI can subject
organizations to compliance penalties
• Reputational risk — While AI is a growth driver, poor implementation and usage inexperience can lead to
consumer dissatisfaction and reputational brand damage
• Cybersecurity — Hackers can use AI to increase the volume and sophistication of attacks and steal
confidential data sets and AI models to sell on the dark web.
Because there are so many unknowns surrounding the risks of AI, there is a tendency to simply say, “You can’t
use it until we fix it.”
Wipro utilizes the NIST AI RMF Core in conjunction with the OECD Framework to classify and provide
outcomes and actions that enable dialogue, understanding and activities to manage AI risks and responsibly
develop trustworthy AI systems. Trustworthy AI is safe, secure, resilient, explainable and interpretable,
privacy-enhanced, fair, valid, reliable, accountable and transparent.
These rules of engagement help security leaders to have informed conversations with stakeholders that
have a vested interest in using AI systems. Once a governance process is established, classification of the
systems can be put in place and risks may be documented. Only then can the organization build cybersecurity
controls and protection mechanisms directly into the AI system and data model and provide a foundational
infrastructure. It is a multi-step journey in the wake of an ever-expanding attack surface introduced by AI
systems.
SECURITY TRENDS
GEOGRAPHY & SECTOR
GEOGRAPHIES:
Americas, Europe, APMEA (Asia Pacific, Middle East and
Africa)
• CISO reporting
• Investment priorities
Downtime Due to
Ransomware Attacks
CISO Reporting
33% of organizations that
55% CISOs report to CIO experienced ransomware attack in
and 25% report to CEO
the last 3 years, faced a downtime
of 11 to 30 days
97% of the boards have 37% said their 3rd party suppliers
established some form of reported a security breach last
cybersecurity oversight* year
Downtime Due to
Ransomware Attacks
CISO Reporting
44% of organizations that
58 %
CISOs report to the CIO experienced a ransomware
and 25% report to the CEO attack in the last three years
faced downtime of 11 to 30 days
We analyzed responses from the State of These sector-specific responses were further
Cybersecurity Report 2023 research across seven analyzed to produce 10 critical trends:
industry sectors:
• Cadence of cyber risk reporting
SECTORS:
• Board cyber expertise
BFSI: Banking, Financial Services, Insurance
• CISO reporting
Communications: Telecommunications
• Top cyber risks
Consumer: Consumer Goods, Retail, Distribution, • Confidence in cyber controls
Travel & Hospitality, Transportation, Media,
• Recent data breach
Education, Public services
• Third-party security breach
ENU: Energy, Natural Resources, Utilities
• Downtime due to ransomware attacks
Healthcare: Life Sciences, Medical Devices • Percentage of annual IT budget allocated for
Manufacturing: Industrial Process Manufacturing, security
Automobile • Investment priorities
97% of the boards have 46% said their 3rd party suppliers
established some form of reported a security breach last
cybersecurity oversight* year
Downtime Due to
Ransomware Attacks
CISO Reporting
52% of organizations that
62 %
CISOs report to the CIO experienced a ransomware
and 21% report to the CEO attack in the last three years
faced downtime of 11 to 30 days
87% of the boards have 20% said their 3rd party suppliers
established some form of reported a security breach last
cybersecurity oversight* year
Downtime Due to
Ransomware Attacks
CISO Reporting
31% of organizations that
58 %
CISOs report to the CIO experienced a ransomware
and 32% report to the CEO attack in the last three years faced
downtime of 11 to 30 days
69% of the boards have 26% said their 3rd party suppliers
established some form of reported a security breach last
cybersecurity oversight* year
Downtime Due to
Ransomware Attacks
CISO Reporting
31% of organizations that
45 %
CISOs report to the CIO experienced a ransomware
and 29% report to the CEO attack in the last three years faced
downtime of 11 to 30 days
STATE OF
ATTACKS
BREACHES & LAWS
39%
• Cybersecurity regulatory change of nation-state
attacks targeted the
private sector
Nation-State Cyber Warfare
From 2018 to 2022, 39% of nation-state attacks
have targeted the private sector, exposing
organizations to all manner of threats, including
espionage, digital lockdowns and damage to
critical infrastructure. It is not the first time
in recent history that cyberspace has served
as a “second battlefield.” But it’s becoming an
increasingly frequent phenomenon.
• The vast majority (82%) of attacks were That the US was the top target country should be
espionage-related. of concern to businesses that operate there. At
the same time, it is worth noting that the most
• The main aggressors are China, Iran, North
aggressive nation-states have hostile relations
Korea, and Russia.
with the US. Businesses in the crossfire of
• Many countries were victims, but the US was hostilities should be mindful of the geopolitical
the biggest target, followed by countries that implications of nation-state attacks.
border Russia.
With the expansion of email phishing templates In addition to the rise of nation-state attacks,
available to a growing population of threat actors, organizations are facing increasing exposure to
phishing attacks flourished throughout the sophisticated attacks from non-state actors. The top
pandemic. We are seeing more targeted attacks three threats in this year’s report are email phishing
on IT administrators, R&D, and senior executives (81%), ransomware attacks (79%), and third-party
using social platforms to gather specific insights. risks (68%). A few notes on our findings:
With the expansion of email phishing templates available to a growing population of threat actors, phishing
attacks flourished throughout the pandemic. Now we are seeing more targeted attacks on IT administrators,
R&D and senior executives who use social platforms. The growing use of outsourced SaaS IT for HR services
with new corporate domains has also created additional phishing exposures. Omni-channel “deep phishing”
attacks leveraging generative AI will make the detection of fakes even more challenging. Additional AI insights
can be found in section 4—The Future of Cybersecurity.
Ransomware threat actors have changed their Global supply chains have linked various third
modus operandi from digital lockdowns to parties – outsourcing partners, distributors,
multivariate extortion tactics. In addition to locking suppliers, captives and affiliates — with varying
down systems through encryption, extortion tactics degrees of cybersecurity hygiene and maturity.
now include threatening senior executives with the This has increased the number of cyberattacks
release of their stolen data on the dark web. through third parties.
Recently reported intrusions into pipeline systems, Advancements in generative AI will turbocharge
water treatment plants, electrical grids and all manner of attacks. While generative AI has
industrial plants have heightened the concern enormous potential to be applied defensively
about risks to OT environments. An example of this in security management, its use for offensive
threat is in Ukraine, where there have been attacks purposes will be propelled by the ubiquity of the
on electrical and nuclear plants. Other OT-related technology. Use cases for generative AI in offensive
attacks include those on an oil plant in Italy, a cyberattacks include:
power plant in India and public PLC systems of
• Generative-AI enabled social engineering
water plants across the globe. While the growth in
digital industrial operations allows for seamless • GAN-forcing password attacks by way of
data exchange, the lack of visibility into real-time brute-force
threats and changes within legacy OT environments • Malware code engineering
has increased cyber risk.
• Exploit development leveraging generative AI
• Advanced PII (Basic PII, gender, date of birth, identification numbers, driving license numbers)
• Advanced PII + financials (tax information, payment card information, bank account statements)
As shown in Figure 7, 38% of all data breaches included advanced PII, a sharp increase from 25% in 2020.
Breaches involving advanced PII + financials increased slightly to 20% in 2022 from 17% in 2020. Breaches
involving basic PII almost tripled from 8% in 2020 to 20% in 2022.
35%
respectively. This stands to reason because
attackers are motivated by profit and these
three sectors contain perhaps the richest trove
of advanced PII data and are therefore the most Technology
lucrative. Again, attackers are motivated by profit.
To understand an industry’s exposure to threats,
all one needs to do is follow the money.
29%
Consumer
17%
Health
29%
experienced a repeat incursion within three years of breached organizations
of the first breach. However, in many instances, experienced repeated
the second breach did not directly correlate with incursions within 3 years
the previous one. In some cases, it’s the work
of a new threat actor, spurred into action after
learning about the original breach. This illustrates
extended periods, and some are never discovered.
one unfortunate effect of breach publicity and the
This means organizational visibility into repeat
way it continues to bring harm to the enterprise.
breaches often may be obscured.
In addition, many breaches go undetected for
29%
49% 51% 71%
Multiple
Breaches
Not Breached Single
Breached Breach
• Breach categorization
Data breach notification requirements
• Mandatory notification to affected parties
Stringent
Lenient
Figure 13: Heat map of country-specific regulations relating to international data transfers
Stringent
Lenient
REGULATORY CHANGES:
India introduces Digital Personal Data Protection Bill scrapping the old Personal
Data Protection Bill
After public consultation, the revised data protection bill will undergo revisions before it is tabled in
Parliament. The bill aims to balance the rights of individual privacy and lawful processing.
Connecticut: Connecticut Personal Data Privacy and Online Monitoring Act (effective 1 July 2023)
STATE OF
CYBER
CAPABILITIES
Governments are forcing businesses to prioritize cybersecurity risk governance, mitigation strategies, and
incident reporting and response, with the help of local regulators, CERTs, and quasi-government agencies.
Regulatory changes have helped to evolve the fiduciary responsibility of boards to ensure that appropriate
risk management strategies are in place. In the U.S., the SEC is routinely creating new regulations, such as the
proposed SEC Release No. 33-11038, which will eventually compel organizations to declare the cybersecurity
expertise of board directors.
Some 87% of organizations surveyed have a mechanism for cybersecurity board oversight. Currently, 38%
of organizations surveyed have an independent board-appointed advisor. Only 32% have a designated board
member with cyber risk experience and just 17% of boards have formed a cybersecurity subcommittee. As
new regulations encourage boards to instigate more cyber risk governance accountability, we expect the
percentage of boards with a designated board expert and/or the percentage of boards with a designated
subcommittee to grow in the coming years. Well-sourced and coordinated board expertise will make business
alignment, budgeting and communications more effective — both internally across the enterprise and
externally with regulators.
The percentage of boards with a designated cybersecurity expert, and the percentage
of boards with a designated cyber subcommittee will continue to grow.
The primary research explored the CISO reporting point: about 54% of the organizations highlighted that it
was under the CIO. Interestingly, about 25% of organizations also had direct reporting to the CEO or indirect
supervisory review cadences. About 20% of the reporting was spread across other C-level reporting such as
the COO, CRO, CFO and CLO.
As modern enterprises
continue their digital
transformation journeys,
organizational design
strategies to manage cyber
risk will undergo major
revisions. Both the health of
the business and the safety
of its people are at stake.
We’ve noted the importance of
adding cyber expertise to the
board. Properly positioning risk
management responsibilities
below the board level is also
important. IT may not be the
best fit for governing risk
32%
• 79% identified security orchestration
and automation—an important set of
technologies that can help streamline costs
of organizations spend
and efficiently scale an enterprise’s defenses.
greater than 10% of
• 71% called out Zero Trust networks—the their overall IT budget
emerging standard for authentication in on security
highly networked environments.
• 67% are investing in third-party risk management and supply chain security in response to the new multi-
party risk in digital transformations.
• 46% of the organizations globally have indicated OT/IoT security as priority area, however the percentage of
focus on OT security spend is higher for ENU (56%) and Manufacturing (71%) sectors.
To manage costs, many organizations have invested in automation. Although automation may help to avoid simple
repetitive tasks, generative AI could soon improve detection processes in the expanding cloud environment attack
surfaces. CISOs are concerned about the security risks related to the increased use of generative AI. One step
organizations are taking in 2023 is restricting access to public AI systems.
Although automation may help to avoid simple repetitive tasks, generative AI could soon improve detection
processes in the expanding cloud environment attack surfaces.
Over the last decade, data privacy has been a primary focus area for organizations due to more stringent
state, country, regional and international privacy rules. Recent heavy fines on leading technology firms have
put the spotlight back on the core principles of privacy and its intersection with data residency and
cross-border data transfers.
GLOBAL INSIGHT
61%
of organizations have
highlighted new and
evolving localized privacy
regimes to be a priority
focus area
With the adoption of IoT and Cloud technologies and with data
heavy use cases, the so-called 3 Vs of data – volume, velocity
and variety – have seen a massive uptick. Businesses need
to derive value from data while meeting the organization’s
obligations to comply with increasingly stringent privacy
regulations. Security teams have been tasked with developing
effective strategies for meeting these two objectives and
mitigating the threat of losing intellectual property (IP) and
non-public information (NPI).
GLOBAL INSIGHT
8.72/10
was rated as the top
data security control
Despite generational technology leaps, attackers have continued to use timeless tactics for exploiting
weaknesses in software and infrastructure that stem from bad cyber hygiene.
In our research, organizations identified various stages of the vulnerability management lifecycle. Asset
identification and discovery topped the list at 79% but can be considered a broader problem for IT at large.
Risk analysis prioritization was next at 68% followed by vulnerability scanning at 65%. Solving these top three
vulnerability lifecycle management challenges enables security teams to greatly enhance their knowledge of
attack paths, exploits in the wild, and the availability of patches or compensating controls to minimize risks by
remediating prioritized weaknesses.
Cost reductions through OpEx savings in IAM operations and a focus on digital transformation initiatives
involving Customer IAM (CIAM) will help IAM strategies become more business-aligned.
According to our research, 57% of the respondents highlighted OpEx reduction leveraging IAM-as-a-Service
as a key priority. Revenue generation by modernizing CIAM was cited by 42% of the surveyed organizations.
OPEX reduction helps the IT and Security organizations align to any austerity pressures, while CIAM helps the
business establish future revenue streams using security as a key enabler.
57% of organizations
highlighted OpEx
reduction leveraging IAM
as a Service as a key focus
As a result, security professionals are not exactly brimming with confidence in their ability to understand
cyber risks. Just 51% of the surveyed organizations are highly confident about their understanding of cyber
risks. Only 18% of organizations are highly confident in their ability to detect attacks that find their way
GLOBAL INSIGHT
STATE OF
COLLABORATION
59%
• Potential lawsuits (after disclosure of an attack), and
GLOBAL INSIGHTS
only37%
of organizations use
formal TPRM software
35%
experienced their
third -party supplier
getting breached
27%
aspects of cybersecurity strategic planning, and this
includes board participation in simulation exercises. But
almost three-quarters (73%) of surveyed organizations
did not include board directors in their exercises. Board of organizations showing
involvement is a golden opportunity for companies to active board participation in
improve collaboration efforts. Only 27% of the surveyed cybersecurity simulation exercises
organization witnessed participation of board members
in simulation exercises. This may be the one place
where many organizations can improve their ability to SECTORAL INSIGHT
collaborate. Although tabletop exercises are a quick
way to check for cybersecurity preparedness, full-scale
functional simulations can give better insight into what a
Top three
sectors 43%
BFSI
cybersecurity posture looks like. A functional simulation witnessing
with the collaboration of all relevant teams—including
highest
participation of 43%
board members Communications
the board— will help analyze potentially negative impacts
in a real-time setting, which in turn helps to optimize
29%
in cyber
responses as part of an enterprise’s incident response
simulation are:
playbook. Technology
Figure 33 suggests that insurance companies may need to produce plans that provide more coverage at a
reasonable premium. But here’s the challenge for insurance companies: they have struggled to diversify risk across
different domains and/or predict future risk based on past trends as a result of rapidly evolving threat scenarios.
This results in higher premiums. And in most cases, the calculation of exact damages is difficult because of the
nature of the attacks and the cascading damage that follows.
At the very least, organizations need to take a hard look at cyber insurance as a method of managing cyber
and ask, “Are we adequately protected?” This is a conversation that CISOs might have with the CFO or head of
risk management, both of whom have the expertise and tools to evaluate cyber and regulatory risk. They could
become part of the collaborative team.
FUTURE OF
CYBER
SECURITY
Introduction: The long view on patent / Machine Learning (ML), Blockchain, Internet of
submissions Things (IoT), 5G, Quantum Computing, and Digital
Twin. This analysis was performed by scanning
One way to identify future cyber technology trends patents submitted from 2018 onwards covering
is to analyze patent submissions. It’s important to all geographies. More specifically, this technology
gain insights into how organizations are making trend analysis focuses on twenty-one countries.
investments and how they are protecting them This analysis also tries to map patent submission
with patents. Generally, it takes years for a new activities in cybersecurity patent tech radar areas.
technology to begin maturing. Consider generative
AI, which is currently experiencing unprecedented Cybersecurity Patent Submission Trend
growth. Generative AI has been in R&D for many
It is observed that, since 2018, 24900+ patent
years, but is only making headlines now. We
families (technology inventions) have been
take a long view on the future of cybersecurity
submitted in the cross-section of relevant
that is tied to the premise that patents highlight
cybersecurity practice areas, industry domains
the beginning of a process designed to push
and technologies. Every year, starting from
technology solutions forward and eventually
2018, there was an increase in number of patent
drive new revenue streams. As the noted futurist
submissions. This specifies that there is an
Ray Kurzweil has suggested, the future comes
increased emphasis in research, technology
faster than one thinks. As disruptive technologies
growth and its adoption in cybersecurity. It is
accelerate, CISOs may need to think like futurists
worth noting that the data for 2021 and 2022
to stay ahead of security innovations.
is incomplete (due to standard time lag in
Research Scope publication procedure at patent offices across
the world) and is expected to be higher when all
This research was conducted for nine the patent applications submitted at different
cybersecurity practice areas like Data Security, patent offices are published. Consequently, the
Application Security, Network Security, Cloud aggregated patent submission numbers shown
Security, Endpoint security etc. across top six key here for the years 2019, 2020 would be higher than
emerging technologies, Artificial Intelligence (AI) the numbers reported in the previous editions of
SOCR.
Which countries are leading the The reality is that while China leads in overall
submissions, the race for global dominance in new
race in patent submissions?
technology patents is still in the early stages. Any
Although China leads in overall submissions, concerns regarding the geopolitical implications of
the race for global dominance in new technology China’s domestic filings may be premature.
patents is still in the early stages. Any concerns
Many of the patents filed by China and the U.S. are
regarding the geopolitical implications of China’s
in different technology domains. Most of the U.S.
domestic filings may be premature.
patents are related to data security, device security
Our data show that China today is leading in total and network protection. Many China-filed patents
patents filed, with more than 19,000 in 2022. The U.S. pertain to cloud security, threat intelligence using AI /
was second, with more than 4,500 patents filed. It’s ML and blockchain.
important to note that only 6% of the Chinese patents
were submitted in the U.S. and other geographies.
This suggests that Chinese patents are largely
domestic and unprotected outside China.
• Consumer
• Healthcare
• Technology
Consumer industry
Within the consumer industry domain, most patent
submissions have been in media, followed by travel and
hospitality. The greatest number of submissions have been
related to user account security, privacy protection, and
personally identifiable information (PII).
Healthcare industry
Technology industry
Figure 37 shows how IoT security led the race before 2023 with more than 2,400 technological inventions. It
was followed by homomorphic encryption with over 1,700 patent families, and decentralized identity with
more than 1,400 patent families in just the past few years. The adoption of homomorphic encryption, DID, OT
security, and breach and attack simulation were at least partially responsible for the significant growth in
patent filings. Other areas have seen relatively modest growth. Newer entrants, such as XDR, serverless and
function security, external attack surface management, and cloud infrastructure entitlement management,
appear to be gaining some momentum.
It is notable that IoT and decentralized identity are at the top of this analysis. It is a reminder of where the
internet is going, with the recent trend of decentralization at the heart of IoT and Web3. These are technologies
that are adaptive to major architectural shifts in modern IT, and CISOs should keep them on their radar.
SECTORAL INSIGHT
• Data security: A deep dive into patent submissions in data security reveals that protection against
unauthorized access is enabled by unique mechanisms of data encryption, tokenization, and key
management across all applications and platforms.
• Device security: In device security practice, AI/ML leads in patent filings (2,335) followed by blockchain
(1,144), IoT (802), 5G (697), digital twin (476), and quantum computing (196).
• Network security: In network security, AI/ML (2,057) again dominates, followed by blockchain (768), IoT
(756), 5G (645), quantum computing (84), and digital twin (83).
• Technology implementation. AI/ML again dominates the field, followed by blockchain, IoT, and 5G. Digital
twins and quantum computing appear to be gaining momentum in this practice area.
The primary research (external) involved surveying security leadership throughout US, Europe and APMEA
geographies. A questionnaire with 30 questions about trends, governance, security practices, collaboration
and best practices was administered over two months. The survey was anonymous, and the responses were
processed at an aggregated level to arrive at insights. The CDC research was conducted on aggregated data
from Wipro’s CDCs across North America, Europe, India, the Middle East, and the APAC region.
The secondary research, carried out by the SOCR core team, involved various public databases and research
platforms to supplement the primary research and correlate trends in the cybersecurity domain. This year,
Wipro collaborated with our Ventures partners, security product partners, and academia to bring together
their perspectives on the changing cybersecurity landscape.
345 24,900+
organizations surveyed patents filed worldwide over
across 21 countries last five years are analyzed
1,100+ 28
nation-state attack data associated partners
of last 5 years analyzed
23
countries data protection
laws are analyzed
Americas 1 Americas 2
John Hermans
Head of Europe
Rene Morel
Head of APMEA
Karthikeyan S
Consultant, Cybersecurity & Risk Services
Sayan Sarkar
Consultant, Cybersecurity & Risk Services
References
• https://www.cfr.org/cyber-operations/
• https://www.sec.gov/rules/proposed/2022/33-11038.pdf
• https://iapp.org/resources/
• https://piwik.pro/privacy-laws-around-globe/
• https://www.dlapiperdataprotection.com/
Disclaimer:
This document is an informatory report on cybersecurity and cyber risk and should not be misconstrued as professional consultancy. No warranty
or representation, expressed or implied, is made by Wipro on the content and information shared in this report. In no event shall Wipro or any
of its employees, officers, directors, consultants or agents become liable to users of this report for the use of the data contained herein, or for
any loss or damage, consequential or otherwise. Some of the content and data have been contributed by partner companies or collected from
third-party sources with professional care and diligence, and have been reported herein; nonetheless, Wipro doesn’t warrant or represent the
accuracy and fitness for purpose of the content and data.