REPORTS

State of Incident Response: Asia-Pacific, October 2022

November 1, 2022

Turning Pressure into Preparation

Global business has witnessed an unprecedented scale of cyberattacks in the past year, making it increasingly difficult for security teams to react.

A record number of vulnerabilities were brought to light in 2021, many of which threat actors continue to actively exploit in 2022. Ransomware continues to feature in our Quarterly Threat Landscape Reports; we also saw a number of supply chain vulnerabilities arise, such as Log4J. As businesses attempt to manage and mitigate cyber risk, security professionals are being pushed to their limits.

Kroll’s Cyber Risk team investigates more than 3,200 incidents every year and works with companies on managing their cyber risk. Whether teams are transitioning to a new cloud environment, monitoring day-to-day risks or detecting and responding to incidents, Kroll provides extensive support using our expert team to protect, detect and respond to cyber threats.

This whitepaper sets out how the Asia Pacific (APAC) market has been impacted by vulnerabilities, highlights incident patterns for the region and proposes actionable priorities for the future.

Our research finds that businesses in APAC are feeling the impact of cyberattacks, but many are yet to build out appropriate response plans or have regular access to relevant cyber expertise. Building this “muscle memory” in response to cyber risk can go a long way in reducing the impact of cyberattacks and enabling businesses to recover more quickly.

We urge businesses in APAC to tap into those with extensive experience of dealing with a cyber incident and take a strategic and pragmatic approach to planning response. After all, the worst time to plan for an incident is during one.

Paul Jackson
Regional Managing Director, Asia Pacific
Cyber Risk, Kroll

SHARE:
Price: FREE

About the Provider

Kroll
We bring the unknown to light by helping you manage compliance, navigate litigation, and mitigate risk relating to fraud, impropriety and security threats.

TOPICS

cyber attacks, Cyber incident, Cyber Resilience, Cybersecurity, Incident Response