{"id":3924,"date":"2022-12-21T14:36:20","date_gmt":"2022-12-21T14:36:20","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3924"},"modified":"2023-01-10T14:11:40","modified_gmt":"2023-01-10T14:11:40","slug":"key-highlights-from-moodys-2023-cybersecurity-report","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/","title":{"rendered":"6 Key Highlights from Moody&#8217;s 2023 Cybersecurity Report"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>Summary: Cyber risk continues to rise as geopolitical tensions mount, and governments and industries are taking action to reduce cyber exposure. Regulations tightening cybersecurity requirements in industry and increasing demand for cyber insurance are two of the significant global policy trends expected in the coming year, according to the <\/em><a href=\"https:\/\/www.moodys.com\/newsandevents\/topics\/2023-Outlooks-00705F\/reports\" target=\"_blank\" rel=\"noopener\"><em>2023 Cyber Risk Global Outlook from Moody\u2019s Investors Service<\/em><\/a><em>. How will these efforts affect businesses and their credit in 2023? <\/em><\/p>\n<h2>Ransomware attacks shift away from the US<\/h2>\n<p>By far, the majority of ransomware attacks\u201449% of all attacks worldwide in 2021\u2014have been directed against the US. However, ransomware groups are beginning to diversify their geographic attack patterns in response to recently increased pressure from the US government through sanctions, arrests, and cryptocurrency seizures. While the US still has the most attacks, its significance is dwindling.<\/p>\n<p>According to Moody\u2019s report, between 2020 and 2022, the global percentage of ransomware attacks in North America decreased from 65% to 46%. While this is happening, there are further attacks in other areas. For instance, the cybersecurity company SonicWall reports that in the first half of 2022, <a href=\"https:\/\/www.sonicwall.com\/2022-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener\">attacks in Europe increased by 63%<\/a>. The change will be favorable for US issuers&#8217; credit but detrimental for businesses in areas where ransomware instances are on the rise.<\/p>\n<h2>Incident reporting mandates are growing<\/h2>\n<p>A significant positive is that the US, EU, Canadian, and Indian governments have taken steps to tighten cybersecurity and disclosure obligations. Standardized disclosure frameworks will boost transparency and probably encourage businesses to prioritize cybersecurity.<\/p>\n<p>Disclosure requirements are beneficial to credit for several reasons. They first give market participants more transparency. Participants could compare businesses based on how well they are managing their cyber risk under the proposed guidelines. Governments also gain from disclosures because they need data to gauge the scope of cyber hazards and create effective countermeasures.<\/p>\n<p>Disclosure requirements aid in creating defense benchmarks that businesses can utilize to strengthen their cybersecurity. They also lessen systemic risk since corporations are given access to information about attack efforts, which they can employ to stop attacks or spot malicious activity on their networks. The <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/cisas-north-star-secure-and-resilient-infrastructure\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity and Infrastructure Security Agency<\/a> (CISA), for instance, gathers cyber event reports from targeted firms, studies patterns, and disseminates anonymized data to assist organizations in managing risk.<\/p>\n<p>However, measures with tight reporting deadlines and public disclosure will increase the risk for their members. \u201cShort timelines for disclosure are one such challenge because public reporting on an attack still in progress could arm hackers with real-time feedback allowing them to make the attack more effective. A disclosure that takes place too soon could hamper an ongoing investigation into an attack. Disclosure mandates add operational burdens, too, especially for entities that report to more than one regulator. The resources required for complying with these measures can be considerable,\u201d writes Leroy Terrelonge, Vice President &#8211; Senior Analyst at Moody\u2019s Investors Service.<\/p>\n<h2>Cyber insurance demand outweighs supply<\/h2>\n<p>Insurance firms continue to be wary of their exposure to systemic cyber risk as the number, size, and sophistication of cyberattacks increase globally. As a result, insurers are boosting costs and limiting their cyberattack coverage. These steps will lessen the risk that insurers face from significant losses. On the other hand, organizations will need to invest more in enhancing their cyber preparedness in order to get cyber insurance or develop alternate techniques for shifting cyber risks as coverage becomes more limited and expensive.<\/p>\n<h2>Six key takeaways<\/h2>\n<p>The report, <a href=\"https:\/\/www.moodys.com\/\" target=\"_blank\" rel=\"noopener\">available to Moody\u2019s subscribers<\/a>, includes six major takeaways:<\/p>\n<ul>\n<li>Attacks involving ransomware will diverge from the US, posing hazards to issuers abroad. The US has intensified its hunt for cyber criminals through sanctions, arrests, and the confiscation of Cryptocurrency. Thus, cybercriminals are shifting their focus to less resistant targets outside of the United States.<\/li>\n<li>Government and regulatory scrutiny will rise. A baseline collection of data concerning the scope of cyberattacks is raised as a result of cybersecurity requirements aimed at tightening disclosure mandates. However, disclosures of attacks could provide hackers with the information they can use to make attacks more efficient.<\/li>\n<li>The adoption of passwordless technology will be delayed, but it will offer a robust cyber defense. Organizations will be able to almost eradicate successful phishing assaults with passwordless solutions. Slow adoption, however, will offer attackers a base to work from.<\/li>\n<li>Deepfake-enabled fraud will increase, and hacktivism will become more active. Hacktivism was virtually absent for a decade and a half, but it has recently made a comeback with more advanced technology and government backing, increasing the threat. Attacks that use deep learning are also developing, and con artists will exploit this technology to increase the credibility of their frauds.<\/li>\n<li>The supply of cyber insurance will not keep up with demand. A credit positive for insurers seeking to lessen their exposure to losses is increasing premiums and narrowing coverage. On the other hand, issuers will need to invest in better cyber hygiene or develop alternate risk transfer methods, including using the cloud. Organizations can shift some of their risk to the cloud, but they must also maintain excellent security and keep an eye on their cloud providers&#8217; IT policies.<\/li>\n<li>Risk mitigation will increasingly involve estimating the expected financial loss from a cyberattack. Managers will be able to make better decisions and communicate risk exposure and risk mitigation measures through a more data-driven approach.<\/li>\n<\/ul>\n<p>Do you want to discuss this topic with one of our experts? Please visit our <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">Contact Us<\/a> page to request more information or connect with a Subject Matter Expert (SME).<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":3926,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[2188,2193,2192,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Key Highlights from Moody&#039;s 2023 Cybersecurity Report<\/title>\n<meta name=\"description\" content=\"Regulations tightening cybersecurity requirements in industry and increasing demand for cyber insurance are expected next year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Key Highlights from Moody&#039;s 2023 Cybersecurity Report\" \/>\n<meta property=\"og:description\" content=\"Regulations tightening cybersecurity requirements in industry and increasing demand for cyber insurance are expected next year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-21T14:36:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-10T14:11:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"6 Key Highlights from Moody&#8217;s 2023 Cybersecurity Report\",\"datePublished\":\"2022-12-21T14:36:20+00:00\",\"dateModified\":\"2023-01-10T14:11:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/\"},\"wordCount\":1665,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Finance Sector\",\"Water Sector\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/\",\"name\":\"6 Key Highlights from Moody's 2023 Cybersecurity Report\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png\",\"datePublished\":\"2022-12-21T14:36:20+00:00\",\"dateModified\":\"2023-01-10T14:11:40+00:00\",\"description\":\"Regulations tightening cybersecurity requirements in industry and increasing demand for cyber insurance are expected next year.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Key Highlights from Moody&#8217;s 2023 Cybersecurity Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 Key Highlights from Moody's 2023 Cybersecurity Report","description":"Regulations tightening cybersecurity requirements in industry and increasing demand for cyber insurance are expected next year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/","og_locale":"en_US","og_type":"article","og_title":"6 Key Highlights from Moody's 2023 Cybersecurity Report","og_description":"Regulations tightening cybersecurity requirements in industry and increasing demand for cyber insurance are expected next year.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-12-21T14:36:20+00:00","article_modified_time":"2023-01-10T14:11:40+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png","type":"image\/png"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"6 Key Highlights from Moody&#8217;s 2023 Cybersecurity Report","datePublished":"2022-12-21T14:36:20+00:00","dateModified":"2023-01-10T14:11:40+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/"},"wordCount":1665,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png","keywords":["Cybersecurity","Energy Sector","Finance Sector","Water Sector"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/","name":"6 Key Highlights from Moody's 2023 Cybersecurity Report","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png","datePublished":"2022-12-21T14:36:20+00:00","dateModified":"2023-01-10T14:11:40+00:00","description":"Regulations tightening cybersecurity requirements in industry and increasing demand for cyber insurance are expected next year.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/12\/129.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/key-highlights-from-moodys-2023-cybersecurity-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"6 Key Highlights from Moody&#8217;s 2023 Cybersecurity Report"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3924"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3924"}],"version-history":[{"count":3,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3924\/revisions"}],"predecessor-version":[{"id":3959,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3924\/revisions\/3959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3926"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}