/
랜섬웨어 억제

Dr. Larry Ponemon on Why Containment — Not Prevention — Is the Future of Cybersecurity

A headshot of Larry Ponemon
Dr. Larry Ponemon, founder of the Ponemon Institute

What keeps Dr. Larry Ponemon, founder of the Ponemon Institute and author of the long-running Cost of a Data Breach report, up at night? In my recent conversation with him, he had a definitive answer: ransomware.

“Ransomware is a gateway to huge problems,” he said. “It starts small, but then it becomes insidious.”

Ponemon has spent over two decades studying the true impact of cyberattacks. His latest research, The Global Cost of Ransomware Study sponsored by Illumio, shows a troubling trend. Even as cybersecurity spending increases, attacks are growing more frequent, more costly — and harder to contain.

“We used to think prevention was the goal,” he told us. “But it’s not practical anymore. The focus now needs to be on how fast you can contain the damage.”

In this post, we’ll break down Ponemon’s key insights on why prevention has become a false promise, what’s changing in ransomware tactics, and how Zero Trust and strong leadership can help organizations stay resilient, even when the worst happens.

Cybersecurity’s prevention myth

Many organizations still invest in tools that promise to stop attacks. But that promise is often broken.

“We used to think prevention was the goal,” Ponemon said. “But it’s not practical anymore. The focus now needs to be on how fast you can contain the damage.”

His research backs that up. Even as spending increases, breaches are becoming more frequent and more expensive. “For every one threat we catch, there are probably 10 or 20 we don’t even know about until it’s too late,” he said.

AI is being used to generate phishing messages, create adaptive malware, and bypass defenses. What feels quiet now may be the calm before the storm.

The reality is that we can’t stop every breach. But we can contain them to reduce the damage they cause when they’re able to spread freely inside the network.  

We used to think prevention was the goal. But it’s not practical anymore. The focus now needs to be on how fast you can contain the damage.

Why breach containment matters now

Ponemon believes we haven’t yet seen the worst of ransomware. He warns that AI-powered attacks are on the rise, and the next wave could cost trillions.

In The Global Cost of Ransomware Study, Ponemon found:

  • On average, 25% of critical systems go down during a ransomware attack and stay down for 12 hours.  
  • It takes 132 hours to fully contain the attack, using both internal teams and external help.
  • Over half of organizations paid the ransom, but only 13% recovered all their data.

“Boards and C-level executives need to understand that these are not just technical issues, they’re reputational and operational risks,” Ponemon said.

This reinforces a key point: the quicker you contain an attack, the better you can protect your operations and your reputation.

Zero Trust is ready for modern cybersecurity challenges

From Ponemon’s perspective, Zero Trust continues to be the best strategy for dealing with modern cyberattacks — but only if it’s implemented properly.

Zero Trust, if implemented correctly, can be very effective,” Ponemon said. “But a lot of organizations think they have Zero Trust when they really don’t.”

He warns against treating it as a checkbox. Real Zero Trust limits lateral movement and helps contain attacks. But it also requires collaboration across teams and a leader who owns the outcome.

So how can organizations collaborate to prepare for the next attack? Ponemon recommends:

  • Focusing on time to contain, not just prevention
  • Assigning clear ownership of cyber resilience
  • Training employees across the entire organization on ransomware tactics, especially social engineering
  • Embracing Zero Trust as both a strategy and a mindset

Most of all, we need to shift our thinking. “It’s not about stopping everything,” he said. “It’s about staying standing when the worst happens.”

Want to hear my full discussion? Listen to this week’s episode on Apple Podcasts, Spotify, or wherever you get your podcasts. You can also read a full transcript of the episode.  

관련 주제

관련 기사

전 세계 랜섬웨어 비용 연구: 수치를 통해 알 수 있는 사실
랜섬웨어 억제

전 세계 랜섬웨어 비용 연구: 수치를 통해 알 수 있는 사실

공격자들이 운영 중단으로 전환하는 방법, 예방만으로는 충분하지 않은 이유, 제로 트러스트와 마이크로세그멘테이션이 랜섬웨어에 미치는 영향을 어떻게 억제하는지 알아보십시오.

Illumio로 락비트 랜섬웨어 공격을 억제하는 방법
랜섬웨어 억제

Illumio로 락비트 랜섬웨어 공격을 억제하는 방법

LockBit 랜섬웨어의 작동 방식과 2022년 여름 Illumio 제로 트러스트 세그멘테이션이 LockBit 랜섬웨어 공격을 어떻게 억제했는지 알아보십시오.

랜섬웨어로부터 보호하기 위한 4가지 핵심 원칙
랜섬웨어 억제

랜섬웨어로부터 보호하기 위한 4가지 핵심 원칙

이러한 4가지 핵심 원칙을 준수하고 구현하면 랜섬웨어를 방지하는 방법과 관련하여 조직을 보호하는 데 도움이 됩니다.더 읽어보기.

랜섬웨어 억제에 Illumio를 사용해야 하는 9가지 이유
랜섬웨어 억제

랜섬웨어 억제에 Illumio를 사용해야 하는 9가지 이유

Illumio의 실시간 가시성과 간단한 제어가 미사용 RDP 포트와 같은 랜섬웨어 위험의 가장 큰 원인을 어떻게 빠르게 줄일 수 있는지 알아보십시오.

전 세계 랜섬웨어 비용 연구: 수치를 통해 알 수 있는 사실
랜섬웨어 억제

전 세계 랜섬웨어 비용 연구: 수치를 통해 알 수 있는 사실

공격자들이 운영 중단으로 전환하는 방법, 예방만으로는 충분하지 않은 이유, 제로 트러스트와 마이크로세그멘테이션이 랜섬웨어에 미치는 영향을 어떻게 억제하는지 알아보십시오.

2025년 랜섬웨어: 비용, 추세 및 위험 감소 방법
랜섬웨어 억제

2025년 랜섬웨어: 비용, 추세 및 위험 감소 방법

공격자가 보안 격차를 악용하는 방법, 랜섬웨어가 이제 비즈니스 모델이 된 이유, 마이크로세그멘테이션을 통해 위협을 차단할 수 있는 방법을 알아보십시오.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?