Perspectives
Sometimes, lightning does strike twice. In May this year, an employee working for a multinational in Hong Kong transferred over US$500,000 to various bank accounts based on instructions in an earlier meeting from who she thought was the firmâs CFO â but who turned out to be a digital recreation created and manipulated by sophisticated fraudsters. Just months earlier, a nearly identical âdeepfakeâ scam cost UK-based design and engineering giant Arupâs office in the city over US$25 million.
Â
Incidents like these demonstrate the speed and extent to which the security threats faced by enterprises are changing. Cyberattacks continue to rise; research by CrowdStrike charted a 75% year-on-year jump in cloud environment intrusions in 2023 alone, and a similar spike in victims named on cybercrime-linked sites that leak personal details.
Â
An evolving international threat landscape


Â
Yet according to Thoughtworks security experts, more alarming than the quantitative growth in threats is the way threats are becoming more diverse, sophisticated, and potentially devastating.Â
Â
âOne of the major changes in the cybersecurity landscape is that cybercrime has become more organized,â says Robin Doherty, Principal Consultant, Global Head of BISOs & Business Information Security Officer (BISO), APAC, Thoughtworks. âThere are now a lot of professional cybercrime organizations who even have the equivalent of an HR department, and are operating in countries where they can get away with it. Because of their scale, these organizations can invest in their operations â for example providing ransomware as a service, where they offer for a subscription the use of their malware and their expertise as negotiators, all while protecting their clientsâ identities.âÂ

âThere are now a lot of professional cybercrime organizations who even have the equivalent of an HR department, and are operating in countries where they can get away with it. Because of their scale, these organizations can invest in their operations."
Â
Robin Doherty
Principal Consultant, Global Head of BISOs & Business Information Security Officer (BISO), APAC, ThoughtworksÂ
âExternally, organizations are at risk on multiple fronts, from advanced persistent threats (APTs) and state-sponsored attacks that focus on obtaining sensitive data and destroying key infrastructure, to cyberattacks that capitalize on vulnerabilities in the supply chain,â says Lu Yang, Thoughtworksâ Head of Incubator Service Line Security, China. âRansomware and extortion are also becoming major concerns. Companies that refuse to play along might be threatened with further attacks that target key infrastructure, posing a threat to their ability to provide basic services.âÂ
Â
Many new challenges are emerging as enterprises become more external-facing, outsourcing more aspects of their infrastructure or linking systems and applications with more third-party providers. The proliferation of connected devices and migration of work to non-office locations is another complicating factor.Â
Â
âBuilding boundaries for information systems has to incorporate the element of risk that is introduced with the work from home model or in a shared office environment,â notes Lilly Ryan, Global Secure Delivery Strategy Lead, Thoughtworks. âWe need to be thinking about perimeters in a flexible way. We can no longer rely on physical office boundaries, unless we're in very specific, highly regulated environments.â Â

âAI is what our clients are asking us about the most, and it boils down to two main questions. The first is: What threats does AI bring up that didn't exist five years ago? And the other is: How can I use AI to help my business do security better?â
Â
Lilly Ryan
Global Secure Delivery Strategy Lead, Thoughtworks
Whatâs more, in the same way itâs rewriting other functions, artificial intelligence (AI) is poised to transform the security landscape â for better, and for worse. âAI is what our clients are asking us about the most, and it boils down to two main questions,â says Ryan. âThe first is: What threats does AI bring up that didn't exist five years ago? And the other is: How can I use AI to help my business do security better?âÂ
Â
In light of these changes, thereâs a danger that legacy approaches to security will not be able to keep up. These trends will require businesses to retool their policies, technologies and practices to ensure they build and maintain trust with customers and other stakeholders â not just to protect the enterprise, but also to foster the confidence that creates competitive advantage. After all, when companies are seen to be dropping the ball on cybersecurity, customers are prepared to vote with their feet.
Â
i. AI changing the security picture â and possibilities Â
Â
On a more positive note, the growing prominence of cybercrime and high-profile security incidents mean thereâs more security awareness among business leaders than ever. âWeâre seeing more and more understanding of security as a business concern, not just an IT concern,â says Doherty. âSecurity gets talked about a lot at the highest levels of an organization these days.â Â
Â
For many senior executives, the security implications of AI, and especially GenAI, have become front of mind. In one survey of business and tech leaders by PwC, almost 70% had plans to use GenAI for functions like incident risk and reporting over the next 12 months â but over half also expected GenAI to fuel âcatastrophicâ cyberattacks over the same period.
Â
Yang notes AI allows cybercriminals to automate tasks like finding vulnerabilities, launching brute-force attacks, and crafting convincing phishing scams, making such attacks faster and vastly more scalable. âAI-driven malicious software will also be more difficult to detect, as it continuously adapts to evade traditional security measures,â he explains. Â
Â
As the recent cases in Hong Kong demonstrated, AI-generated content also presents a massive challenge to the standard wisdom around identity and identity verification. Â
Â
âIt will become increasingly difficult to get real information, or to make judgments as to informationâs trustworthiness,â says Yang.

âIt will become increasingly difficult to get real information, or to make judgments as to informationâs trustworthiness.âÂ
Â
Lu Yang
Head of Incubator Service Line Security, Thoughtworks
As Ryan puts it: âThe questions GenAI really brings up are: What mechanisms do we have to trust that someone is who they say they are? And what does that mean for the decisions that we make based on that information? We have to be extra careful in thinking about what information we trust, what can be faked and what can't, knowing that it's not only technically possible for fakes to happen in an academic sense, but also possible for fairly average criminals to create them, with conventional off-the-shelf technologies.â  Â
Â
âThe main fear that exists at the moment is that with the advent of large language models (LLMs), it will be easier to quickly come up with unique attacks that may be more likely to succeed, because models can integrate information about how specific recipients or companies respond to information or how they communicate,â says Doherty. âFor example, if you took all of Thoughtworksâ internal data or internal emails and fed them into an LLM, you could generate very convincing emails in the style of Thoughtworks and send them to employees.âÂ
Â
This means some of the standard advice to employees on how to spot scam or phishing attempts will need to be updated. âWe need to revisit assumptions about things like what a phishing email looks like,â Ryan points out. âIf weâre telling people theyâre usually full of typos, well â ChatGPT doesnât really make typos.â Â
Â
Thinking further out, companies will also have to consider the security implications of integrating AI into features like chatbots. Not only can these veer dangerously âoff scriptâ â Canadian flag carrier Air Canada was recently held liable for a chatbot giving a customer erroneous advice â but as Ryan notes, to build or run chatbots many companies will upload massive amounts of data and documentation to third-party services, increasing vendor and supply chain security risks.Â
Â
Yet while being conscious of the risks, itâs also important for organizations to remember AI can play a positive role. âAI is excellent when it comes to determining patterns and bridging the gaps between human and machine communications, so it can make incidents easier to query or analyze,â says Ryan.Â
Â
âAI can be a great cybersecurity ally,â agrees Yang. âIts ability to analyze vast amounts of data and recognize patterns makes it the ideal tool for calling out suspicious activity, and enhancing the speed and accuracy of threat detection.âÂ
Â
Doherty counsels business leaders to keep both AIâs security risks and potential in perspective. âItâs still early days,â he says. âMany security tools will talk up the benefits of their approach but are based on basic logic. Snake oil is very prevalent in the security industry, and you find a lot of vendors just attaching the latest buzzwords to their products.â

"Snake oil is very prevalent in the security industry, and you find a lot of vendors just attaching the latest buzzwords to their products.â
Â
Robin Doherty
Principal Consultant, Global Head of BISOs & Business Information Security Officer (BISO), APAC, ThoughtworksÂ
ii. Constructing an effective security posture: Technology, models and practices Â
Â
So what constitutes a âgoodâ security approach or investment? According to Thoughtworks experts, business leaders should adopt a holistic approach that spans people, process and technology.Â
Â
âDon't focus on technology at the expense of everything else, which is a common mistake,â says Doherty. âOrganizations that are less mature from a security point of view tend to go to technology first. There are some basic security tools that you need, but you also need to invest in your people and your processes.â Â
Â
âGenerally, organizations overestimate the reach and effectiveness of security products and automation, leading to many hidden threats,â agrees Yang. âItâs only by considering the multiple factors that come into play and adopting a proactive and adaptive approach that you can build a strong cybersecurity posture.âÂ
Â
The elements of such an approach include the establishment of formal security frameworks; regular reviews and updates to risk management plans to keep up with the threat landscape; and expanding the defense toolkit where necessary to combat high-level threats, Yang explains. âNew technologies such as AI and machine learning need to be correctly applied to shore up defenses.âÂ
Â
In a hybrid work environment, enterprises also have to acknowledge they may need to cede more control over security than they used to. âWe still see security frameworks and models based on the idea that you will have a network located entirely within a physical office building, and all of the laptops are going to be Windows laptops, and they're going to be managed by your company's staff,â says Ryan. âSome people live in that world. But increasingly many of us don't.âÂ

"Devices, cloud, identity â those are the new points where organizations need to build guardrails.â
Â
Robin Doherty
Principal Consultant, Global Head of BISOs & Business Information Security Officer (BISO), APAC, ThoughtworksÂ
âHistorically, people thought the network perimeter was the only place you needed to apply security controls,â agrees Doherty. âBut now that's not sufficient because a lot of what we do as businesses is in the cloud or on people's devices that are not necessarily on the network. Devices, cloud, identity â those are the new points where organizations need to build guardrails.âÂ
Â
This makes investing in the teamâs ability to understand and detect security problems and risks doubly important. Doherty advocates embracing offensive security â that is, actually simulating cyber incidents and attacks â to get the most accurate picture of the enterpriseâs defenses and weak spots.Â
Â
âThere's a maxim in security that it's a lot easier to be an attacker than a defender, because as a defender, you have to plug thousands of gaps â but as an attacker, you only have to find one,â he says. âIf you just keep buying tools and plugging them in with the thinking that they work well enough, youâre probably going to have gaps. But if you pay people to specifically figure out how to attack your organization, they will find the holes in those configurations for you.âÂ
Â
Threat modeling â taking the time to map out the risks that the organization may face, evaluating their likelihood and potential impact; and deciding where controls are best allocated accordingly â is another valuable exercise.Â
Â
âOrganizations can look at it as a Swiss cheese model for risk,â Doherty explains. âIf you have one big piece of cheese with lots of holes in it, attackers only need to find one hole. If you have many layers of cheese, they need to find the holes in each. What that means is don't invest in one place. Create layers.âÂ
Â
The Swiss cheese security model


Working through security challenges in a structured way can ensure priorities are set and resources channeled wisely.Â
Â
âThe most important thing is to make sensible decisions about what information you have, where you want it to be, and how that matches with the realities of people working wherever they are and with third parties that you may not have the greatest visibility over,â says Ryan. âThen instead of throwing money at something very shiny, figuring out the minimum practical things for you to be doing, because there are certainly going to be lots of solutions out there.â  Â
Â
When assessing an enterpriseâs weak spots, security teams often zero in on the people â but according to Doherty itâs rare that incidents are driven by the human factor alone. âWhen you look for what went wrong, it's usually quite easy to find a mistake made by a person; it's a bit harder to analyze that mistake and figure out what caused it,â he says. âItâs usually not just a person waking up one day and deciding to make a mistake; it's normally the system around them that guides them to that mistake. Or at least a combination of the two.âÂ
He urges business leaders to take a page from health and safety culture. âOne example is road traffic design,â Doherty explains. âIf you have a car full of rowdy passengers and a distracted driver who runs into a concrete post on the side of the road, you could easily write it off as a tragic result of human error and believe there's nothing that can be done from a road administrator's point of view. But if you think about it critically, you should acknowledge that people make mistakes when they're under pressure or distracted, which are very normal problems in IT and security as well. So maybe you remove the concrete posts from the side of the road, rather than expecting every driver to be perfect.âÂ
Â
In other words, design choices and deliberate decision-making can do more to embed security than most tech tools. Data is a case in point. As so many intrusions and issues are focused on data, the first priority should be to reassess what kind of data the company is gathering and is therefore forced to protect.Â
Â
âIdentity information is where many data breaches occur, and we know we can't stop those from happening 100% of the time, but you can curb their impact by limiting the amount of data that can be stolen in the first place,â says Ryan. âItâs easy to just gather as much data as you can, because it contains a lot of insights if you ask the right questions. But itâs very important to revisit questions around the data that youâre gathering, to make sure you understand why it's important, and whether you really need it.âÂ

âItâs easy to just gather as much data as you can, because it contains a lot of insights if you ask the right questions. But itâs very important to revisit questions around the data that youâre gathering, to make sure you understand why it's important, and whether you really need it.â
Â
Lilly Ryan
Global Secure Delivery Strategy Lead, Thoughtworks
âPractice data minimization,â agrees Doherty. âDon't collect information if you don't need it, and delete it when you don't need it anymore.âÂ
Â
Organizations can also reduce risk by learning to think in terms of âsupply chainâ rather than âenterpriseâ security, choosing the partners they work with carefully and capping the number where possible.Â
Â
âMore than ever thereâs a number of different parties involved in any given piece of software or service we might be using, or building,â Ryan points out. âIt can be really hard to trace that all the way back to find out where something has gone wrong, or feel certain that youâve got control from beginning to end.âÂ
Â
Supply chain risk is also increasing as AI capabilities are bundled into commonly used solutions like Microsoft 365 that can give employees access without the executives who âcontrolâ security even being aware, Ryan points out.Â
Â
However, rather than looking to ban or completely eliminate the use of such tools, business leaders âshould accept that some things are out of the companyâs control, and provide a âpaved roadâ to encourage teams to use tools in the right way,â she says.Â
Â
Part of that âpaved roadâ is a clear security policy, which Thoughtworks experts recommend even the smallest enterprise set out â and refresh regularly.Â
âIt's not just about having the words written on a piece of paper,â says Doherty. âThe more important thing is that the organization is following the practices in the policy, adapting and evolving them, and documenting that continuously.âÂ
Â
âThe approach that Thoughtworks has taken is explicitly governing,â he adds. âHaving an industry standard framework that you assess yourself against regularly, or getting an external company to do it. Whichever approach you take, you should get recommendations to continually evolve and improve the security framework that you're using.â  Â
Â
iii. Fostering a security mindset and culture Â
Â
As the boundaries of the enterprise and the threat landscape change, adoption and implementation of security policies have become a more enterprise-wide responsibility than they might have been in past. As Yang puts it: âShifting tech and business practices such as longer data processing times, and the growing adoption of cloud, remote work and automation, mean modern security practices have evolved from being the primary domain of security teams to an organizational effort.â

"The growing adoption of cloud, remote work and automation, mean modern security practices have evolved from being the primary domain of security teams to an organizational effort.â
Â
Lu Yang
Head of Incubator Service Line Security, Thoughtworks
This means that while the function may rest primarily with a security or IT team, protecting the organization is a collective responsibility.  Â
Â
âIt's crucial to look at the root causes and collaborate more with other departments, focusing on the business perspective,â says Yang. âForming functional working groups across the organization is an effective way to implement and execute the organizationâs cybersecurity strategy. Importantly, establishing a feedback mechanism allows identified needs to be incorporated into ongoing security management to create a more comprehensive security posture.â Â
The security feedback loop


Â
Diversity of views and experience can also make direct contributions to an enterpriseâs resilience. âWhen we're building software, and we're looking at threat modeling, we want to make sure we have at least one representative from each major group of stakeholders because there are always going to be needs that somebody has that you didn't anticipate,â Ryan explains. âGetting different perspectives also means someone will realize: âOh, actually, every second Thursday, the cleaners come in and they also have a set of keys to the officeâ â a vulnerability youâve never considered. You don't want to make the room so crowded that nobody can have a conversation. But you need to take a holistic view.â  Â
Â
âPeople in security tend to come from risk management, accountancy, or technology but there are much fewer people with non-standard or unusual backgrounds in the realm, who can bring new ways of looking at these very complex problems,â agrees Doherty.  Â
Â
Strong executive sponsorship helps rally this diverse group of stakeholders and underlines that security is a priority. âOne of the things we advocate is business leaders taking ownership of security and integrating it into their strategies, rather than it being relegated to a purely tech problem,â Doherty says. âThere should always be a board member or an executive with an idea about what the organization should invest in.â
Â
Training for business leaders can help build this capability, since many executives will lack formal security experience.Â
Â
âDirectors and executives are paying more attention than they used to, but they're also approaching these topics from a low base of existing knowledge, so keeping them informed on the latest developments in cybersecurity practices is really important,â says Doherty. âItâs also critical that the information that is presented to them is accessible and useful. When people come to you with ideas, whether salespeople or senior executives, you need to be able to prioritize needs over the fads. And that relies on having that understanding of the threat model, the strategy and where you're heading.âÂ
Â
Yang recommends appointing a chief information security officer (CISO) to lead the organizationâs cybersecurity strategy and oversee its implementation in close coordination with the IT and risk leadership. âAt the highest levels of the organization, there needs to be maximum support and commitment and that includes allocating resources to cybersecurity,â he says. âTraditionally, the security department operated in its own lane, but nowadays it's all about teamwork.âÂ
Â
Beyond the management tier, embedding âsecurity championsâ throughout the enterprise can pave the way for policies and practices to be integrated at the day-to-day level.Â
Â
âWe have a program where we identify people on product or delivery teams who take some ownership for security,â says Doherty. âAs theyâre not security experts, or generally didnât start off that way, they get training, and get connected to a community of their peers, and to the security team. They become a way of assuring the organization that necessary security controls are being integrated into the products that they're building.âÂ
Â
Moving from security policies to a security culture also requires honesty and transparency â as well as a degree of bravery, Ryan notes.

âSecurity requires a space to ask hard questions, especially where the answers might not be very clear cut. It requires us to imagine the worst case scenario, and that's not always comfortable."
Â
Lilly Ryan
Global Secure Delivery Strategy Lead, Thoughtworks
âSecurity requires a space to ask hard questions, especially where the answers might not be very clear cut,â she explains. âIt requires us to imagine the worst case scenario, and that's not always comfortable. But it does mean that if we spend the time to anticipate some of those issues, and think about the impacts and their context and our needs as a business, we're going to come up with answers that meet those needs, and enable us to make decisions that are aligned with them â rather than just picking solutions up off the shelf.âÂ
Â
Doherty also urges enterprises to break down some of the fears and misconceptions around security as a topic. âTo ensure buy-in and participation from throughout the organization, the first thing you can do is make it fun,â he says. âPeople expect security to be boring so anything that's a step up from a 50-page document they have to read as part of an onboarding is an improvement. At Thoughtworks we've run weeklong cybersecurity awareness and capability campaigns centered around the idea of defense in depth, and made a mascot for that â a blue-ringed octopus.â
Â
âThe other thing is to make security professionally interesting,â Doherty adds. âWhen we have security champions on a team, we make clear this is a benefit to the individual. By getting involved and learning about security, youâre making yourself more valuable to future employers because this is a capability that most organizations are lacking.âÂ
Â
Taking smaller security incidents as a learning experience that allows the team to test out incident response plans can also help build skills and readiness for larger events â and remove some of the fear around them.Â
Â
âYou have to prepare for the breadth of reality and the fact that things will go wrong," says Ryan. âDoing a bit of thinking and practicing ahead of time should help make incidents less scary if they happen â because sometimes they do.â Â
Â
iv. Embedding readiness and resilienceÂ
Â
Though incidents and more sophisticated threats may be almost inevitable, Thoughtworks experts counsel enterprises not to succumb to negativity about the security outlook.Â
Â
As Doherty puts it: âThereâs a never-ending stream of stories in the media about the next big security breach â but that stream of bad news is not really unexpected. It's often the end result of some of the actions taken or not taken in the past.â Â
Â
âWhile thereâs a lot of apprehension, even panic about security at the moment, in a sense itâs positive that itâs become a bigger issue as itâs approaching a tipping point,â Ryan points out. âMore people and organizations have direct experience with things like data breaches and are improving their practices as a result, because theyâre personally invested in making change.âÂ
Â
âThe market is the driving force behind government and private sector investments,â Doherty agrees. âOverall concern for security has increased among the general public, which drives government action and organizationsâ investment into boosting cybersecurity and these are positive developments overall.âÂ
Â
Research shows both governments and enterprises devoting more resources to the cybersecurity struggle, with spending to climb 14% in 2024 alone, led by growth in the cloud security and data privacy segments, according to Gartner.
Â
Global investment in security surges


Â
However, even as investments grow, âthe challenge is getting the balance right,â says Doherty, managing resources carefully while not neglecting the need to develop security culture and practices.Â
Â
âYou want to be investing enough to keep the risk within your tolerance threshold, but not any more than that. If you're not increasing your security investment, then you're probably not keeping pace with the change that's occurring in the threat landscape. Unfortunately, a lot of organizations are probably being outpaced at the moment because the state of the economy over the last few years has resulted in them having less to invest.â  Â
Â
Even in a tougher economic environment, Yang advises enterprises to keep a close eye on developments in both the threat landscape and security solutions, as being proactive about security brings a number of rewards.Â
Â
âItâs extremely important to use all the tools at our disposal to solve vulnerability problems,â he says. âBy doing that, organizations can create more flexible systems, protect their sensitive data and cultivate a culture of trust and openness. That not only reduces risk, but also strengthens relationships with key stakeholders, to ensure long-term success.â

âItâs extremely important to use all the tools at our disposal to solve vulnerability problems. By doing that, organizations can create more flexible systems, protect their sensitive data and cultivate a culture of trust and openness. That not only reduces risk, but also strengthens relationships with key stakeholders, to ensure long-term success.â
Â
Lu Yang
Head of Incubator Service Line Security, Thoughtworks
About the contributors

Robin Doherty
Principal Consultant, Global Head of BISOs & Business Information Security Officer (BISO), APAC, ThoughtworksÂ

Lilly Ryan
Global Secure Delivery Strategy Lead, Thoughtworks

Lu Yang
Head of Incubator Service Line Security, Thoughtworks
Perspectives delivered to your inbox
Â
Timely business and industry insights for digital leaders.
Â
The Perspectives subscription brings you our expertsâ best podcasts, articles, videos and events to expand upon our popular Perspectives publication.Â