{"id":3528,"date":"2025-06-06T15:34:57","date_gmt":"2025-06-06T14:34:57","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=3528"},"modified":"2025-06-06T15:34:57","modified_gmt":"2025-06-06T14:34:57","slug":"exploring-cybersecurity-insights-for-2025-learnings-from-maersks-former-ciso","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/exploring-cybersecurity-insights-for-2025-learnings-from-maersks-former-ciso\/","title":{"rendered":"Exploring Cybersecurity Insights for 2025: Learnings from Maersk&#8217;s Former CISO"},"content":{"rendered":"<p>.<\/p>\n<p>This article analyzes key insights and lessons from his perspective, providing indispensable advice for future-proofing our cybersecurity strategies.<\/p>\n<p><strong>Article:<\/strong><\/p>\n<p><strong>A Watershed Moment Aboard The SS Maersk: NotPetya Strikes<\/strong><\/p>\n<p>In June of 2017, a ransomware attack known as NotPetya shocked the world by crippling one of its most significant targets: AP Moller Maersk.<\/p>\n<p>The shipping giant was brought to an operational standstill as the rapidly spreading malware infiltrated its systems, resulting in a staggering $300 million in damages .<\/p>\n<p>An unseen nemesis had swiftly struck at its heart.<\/p>\n<p>More than just a cautionary tale on the threats posed by cybercrime, Maersk\u2019s recovery marked a turning point for the cybersecurity industry, according to the company&#8217;s former Chief Information Security Officer (CISO) Adam Banks.<\/p>\n<p><strong>Facing A New Reality: Recognizing System Efficiency Vs.<\/p>\n<p>Cyber Resilience<\/strong><\/p>\n<p>As Banks pointed out, many companies have long prioritized system efficiency over security.<\/p>\n<p>This mindset poses a critical vulnerability in our digital era, where ransomware attacks like NotPetya can exploit system weaknesses to devastating effect.<\/p>\n<p>&#8220;For a time, we lost sight of the need for resilience.<\/p>\n<p>We allowed efficiency to become everything,&#8221; Banks said. &#8220;NotPetya was a wake-up call reminding us that when you digitalize, you also expose yourself to new risks.&#8221;<\/p>\n<p><strong>A Lesson Learnt: Building Robust Foundations<\/strong><\/p>\n<p>The painstaking process of recovery forced Maersk to reevaluate its cybersecurity framework.<\/p>\n<p>Banks stressed the need for robust foundations built upon regular reviews of system vulnerabilities, robust AMI backups, and proper network segregations.<\/p>\n<p>He emphasized that foundational cybersecurity practices still contribute significantly to a resilient defense by preventing lateral movement within systems necessary for malware like NotPetya to inflict maximum damage.<\/p>\n<p><strong>Moving Forward: Cybersecurity in 2025<\/strong><\/p>\n<p>Banks foresees cybersecurity in 2025 being defined by well-established foundations and the strategic implementation of emerging technologies.<\/p>\n<p>He underlines the importance of a balanced defensive strategy, combining robust essential practices with agile technologies like AI and machine learning.<\/p>\n<p>\u201cOur job as security professionals is to manage risk, not eliminate it.<\/p>\n<p>And in doing so, we must ensure foundational security doesn\u2019t get left behind in the shadow of the bright, shiny new technologies,\u201d Banks concluded.<\/p>\n<p><strong>Follow-Up Reading:<\/strong><\/p>\n<p>1. <a href=\"https:\/\/www.zdnet.com\/article\/maersk-forced-to-reinstall-4000-servers-45000-pcs-due-to-notpetya-attack\/\" >&#8220;Maersk forced to reinstall 4000 servers, 45000 PCs due to NotPetya attack&#8221; &#8211; ZDNet<\/a><br \/>\n2. <a href=\"https:\/\/www.hpe.com\/us\/en\/insights\/articles\/the-lessons-from-the-2017-cyber-attacks-on-maersk-and-the-nhs-1903.html\">&#8220;The lessons from the 2017 cyber-attacks on Maersk and the NHS\u201d &#8211; HPE<\/a><br \/>\n3. <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" >&#8220;How NotPetya, a single piece of code, crashed the world&#8221; &#8211; Wired<\/a><\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>. This article analyzes key insights and lessons from his perspective, providing indispensable advice for<\/p>\n","protected":false},"author":1,"featured_media":3529,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-3528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=3528"}],"version-history":[{"count":1,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3528\/revisions"}],"predecessor-version":[{"id":3530,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3528\/revisions\/3530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media\/3529"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=3528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=3528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=3528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}