15
Top 12 Predictions from Leading Cybersecurity Experts

Top 12 cyber security predictions for 2017

Embed Size (px)

Citation preview

Page 1: Top 12 cyber security predictions for 2017

Top 12 Predictions from LeadingCybersecurity Experts

Page 2: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

What’s in store for cybersecurity in 2017? With the increasing magnitude and frequency of cyber attacks, how can we stay ahead of

possible threats to counter and mitigate?

Page 3: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“2017 will be the year of ‘hunt’ analysis, where organizations will proactively search through their network for threats versus having an alert to indicate a problem.”

Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis

The year of hunt analysis

Page 4: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“We will see the proliferation of the Internet of Things as a tool to cause disruptions and attacks on critical infrastructure. More cyber attacks will become crimes that result in physical harm.”

Michael Goedeker, CEO and Founder HAKDEFNET and Security Researcher

IoT causes disruptions

Page 5: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Social media providers will continue to seek the right balance of cooperating with government and protecting their business reputation.”

Todd M. Rosenblum, Senior Executive for i2 Safer Planet

Cybersecurity and social media

Page 6: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Private sector companies will increasingly participate in military style ‘wargames’ to test the readiness of their cybersecurity organizations.”

Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis

Cybersecurity wargames

Page 7: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Rise of machines—more AI and cognitive technology will be implemented to make up for the shortfall in trained and experienced cybersecurity professionals.”Morgan Wright, Cyber Terrorism and Cyber Crime Analyst

Rise of cognitive in cybersecurity

“New cognitive behavior tracking capabilities will help reduce elevated privilege abuse and insider threat.”Shahid Shah, CEO at Netspective Communications, Cybersecurity and Risk Consultant

Page 8: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Zero-day exploit value on the dark web will far exceed the amount that companies are willing to pay for ‘bug bounties’ due to the overall value of data amassed.”

Scott N. Schober, CEO Berkeley Varitronics Systems, Inc. and Author Hacked Again

Zero-day exploit

Page 9: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“The security versus convenience debate will enter the public eye as high-profile companies suffer incidents that could have been prevented with two-factor or strong passwords.”

Tyler Carbone, COO at Terbium Labs

Security vs. convenience debate

Page 10: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Huge DDoS attacks coinciding with fake news tweets about a major data breach and unreliable, but viral, social media posts and sloppy tech reporting by a few bloggers and media sites will cause a significant, but temporary, drop in select stocks. The hidden goal of the hackers: manipulation of stock prices for financial gain.”

Dan Lohrmann, Chief Strategist and Chief Security Officer at Security Mentor, Inc.

Hackers use fake news

Page 11: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Trust in systems will be broken as bad guys move from just exfiltrating data to changing it.”

Caleb Barlow, Vice President of IBM security

Trust will be broken

Page 12: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Companies will seek to quantify the costs and benefits of new technologies versus cost and likelihood of a breach, as information security becomes less an IT problem and more a risk management problem.”

Tyler Carbone, COO at Terbium Labs

Rise of cyber risk management

Page 13: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Many custom services in healthcare, retail and financial depend on knowing customers and anticipating their future needs. But personalization data can lead to loss of privacy and increased security risks. The pressure to balance these three sometimes conflicting requirements will increase significantly in 2017.”

Diana Kelley, Global Executive Security Advisor, IBM

Pressure to balance privacy, personalization and security

Page 14: Top 12 cyber security predictions for 2017

ibm.biz/TourCyberThreatAnalysis

“Industries such as energy and utilities, manufacturing and supply chains have remained relatively isolated from major cyber attacks. This is about to change.”

Michael Kehoe, WW Program Director, IBM

Cyber attacks spread

Page 15: Top 12 cyber security predictions for 2017

Be acutely aware of the threatscape and equip yourself to predict, mitigate

and counter cyber attacks: ibm.biz/TourCyberThreatAnalysis