2017: The 7 Cyber Security Trends You Can’t Miss
New technologies are constantly being developed, which means that more threats and security risks also continue to develop. All this innovation in hacking and exploiting new technologies, cybersecurity leaders are forced to come up with new ways to protect the future and safeguard businesses. As my colleague, Bally Kehal, proposed his top 4 cyber security predictions of 2017 last week, now I will propose what I foresee happening in the field.
In 2015 we saw countless spear phishing attacks, attacks on payment card data, and a total of over 480 million leaked records. In early 2016, we heard about one of the biggest hacking incidents that led to an incredible $81 million fraudulent transfer, from Bangladesh Bank, which opened up inquiries into authentication vulnerabilities in the SWIFT financial messaging service provider. In a recent webinar by Gartner, Earl Perkins, Research VP, talked about the top Security trends for the following year. Perkins’ main objectives were to stress the importance of these changes and explain how cybersecurity leaders can use these trends to their advantage. Our best predictions of the future, rely on our understanding of our present. With this in mind, here are some current cyber security trends that I believe will continue to grow through 2017.
Risk and Resilience Seek Balance
Security is moving deeper into organizations, and professionals are now under pressure to find the balance between managing risk and building resilience. On the Risk side we are expecting to see issues related to compliance and governance; controlling data and access; privacy (the ability to be able to protect the interests of people and their data); and safety (understanding what kind of impact this technology has on our physical environment and physical well-being). In addition, we have to look at the Resilience side and balance the risk with some of the demands that the businesses are making now in terms of reliability (wanting the service to always be available); speed and assurance; transparency (visibility of the environment in order to gain better control) and value (increase the value of the business and what it provides to customers).
This causes us to look at the idea to of Key Security Principles for Trust and Resilience, which includes shifting our thinking to:
- Risk-Based decision-making model
- Looking at the Data Flow
- Supporting the Business Outcome
- Becoming a Facilitator
- Balancing the investments for security across protection, detection and response
- Looking at the idea of People-Centric Security
It’s important to revisit the security of an organizational structure to ensure it reflects the current mission, can have revised methods used to calculate IT risk to incorporate new variables and factors as well as develop fast-track methods of addressing security requirements, according to Perkins.
Security Disciplines Converge
Security professionals will have to take a critical look at the concept of security, expand their vision and see what the impacts of our data on other areas of security are. Whether it is people who guard facilities or manage systems, it’s important to understand what’s happening with this pervasive digital presence. Knowing that, sooner or later, we are becoming responsible for keeping people and the environment safe, as well as being responsible for information mandates and the way data traverses all of those different environments; we have to be ready to get involved in new areas in digital security and take on more responsibilities. In this case, structuring the way we look at security and the way we address it to accommodate this idea of safely being part of the picture.
This leads security professionals to think about
- Establishing security governance and planning relationships with physical and industrial counterparts.
- Improving cross-discipline procurement methods for security requirements
- Modifying what you view as a security architecture to include additional layers where needed
- Investigating changes in security management and operations which may be required to accommodate convergence
Securing the Supply Chain
Businesses have adapted to the changing environment through supply chain risk management and shifting responsibility so that managers play a larger role in cybersecurity. They need to be aware of what the risks are and of which areas of their supply chain may be vulnerable to cyberattacks. Also, they must make sure that not only their own company but also their suppliers are following best practices in cybersecurity. Providing a security structure which looks at the concept of consumers and providers, and works out a methodology that allows a certain level of visibility and control, is something security professionals need to consider.
Cloud Services Security Assessment Framework includes:
- Identify Business and Risk Context
- Structure and Perform Assessments
- Develop and Implement Treatment Plans
- Monitor for and Address Changes
Gartner predicts that 80-95% of cloud failures by 2020 will be consumers or customers fault because of the inadequate level of responsibility and the lack of expertise. Therefore, it is crucial to develop an enterprise public cloud strategy, work levels of visibility out and control and monitor each cloud model used.
Finding Security-People and Skills
In the next few years, there are going to be critical impacts brought on by Mobile, Cloud, IoT and, generally, the pervasive digital presence. We will arise in newer skill-sets around:
- Contextual Security Monitoring and Response
- Ubiquitous Identity Management
- Data Classification and Data Security Governance
- Employee Security Awareness and Behavior
Most likely this will lead to the necessity finding new security people and the need to accelerate Skills Generation and Convergence by:
- Building long-term IT security workforce plan in collaboration with the relevant business and operation stakeholders
- Shifting view on their primary roles from delivering and managing work to
coaching and developing people
- Using cross team projects and emerging needs to develop high potential specialists into renaissance workers, with versatility
- Mixing traditional and agile recruitment techniques to fill skill gaps
- Evaluating their own skill gaps and start continuous development
Embrace Adaptive Security Approaches
Adapting Security Approaches, in an organization, can help with improving the capabilities of existing systems as well as help reduce threat amplifications. Gartner has stated the goal to be that the “different capabilities” integrate and share information to build a security protection system that is more adaptive and intelligent overall. We can also hear more technology experts talking about the importance of spending less on prevention and investing in detection, response and predictive capabilities. Using the Adaptive Security Approach model, organizations should:
- Shift their security mindset from incident response to continuous response
- Spend less on prevention, invest in detection, response and predictive
- Favor context-aware network, endpoint and application security protection
- Develop a security operations center
- Architect for comprehensive, continuous monitoring at all layers of the ITStack
Extending Security For Digital Businesses
There are still many issues related to securing the pervasive digital presence as an architectural problem. A need to start perceiving issues as multi-layered issues, involving devices or things that may or may not talk like PCs, tablets or mobile phones. By doing so, we end up with communications and integrations issues, or even changes in core business processes, where we may build a process and then tear it down within a matter of weeks. Being able to have an agile infrastructure, that could allow security professionals to do so, will require some key challenges and different approaches:
- Functions applied to security
- Policy management, enforcement
- Monitoring, detection and response
- Access controls and management
- Protect Data, apps, network, platform
Earl Perkins explains how this represents a new world in security and looking at an entirely new concept of what a device is, whether or not the way we approach identifying these devices is available and consistent, and whether this incorporates the idea of a device with an identity. Also, it is important to look at news ways to establish relationships and define interactions between devices and people, devices and devices, and devices and apps.
Pursue Real Data Security
Regarding the pursuit of real data security, we also need to find new approaches. This includes, prioritizing organization wide data security governance and policy, and identifying and implementing risk appropriate data security controls by data type where possible. Also, main data decision makers need to think about implementing Data-Centric Audit and Protection (DCAP) strategy and incorporating big data plans and unique requirements into security strategy.
Developing a Data-Centric Audit and Protection:
1.Data Security Policy
- Data Classification and Discovery Policy
- Data Security Controls
- Activity Monitoring
- Assessment of Users and Permissions
- User Monitoring and Auditing
- Analysis and Reporting
- Blocking, Encryption, Tokenization and Data Masking
In short, cyber security can’t amount to incident response and prevention tactics any longer. With continuous advancements in technologies and hacking tactics, cyber security experts have a whole new gambit of unknowns to tackle. But, if we can change our perspective of the field, responsibilities and training methods, it is possible to have a more secure 2017.
CyberTraining 365’s Data Security and Privacy Training is a comprehensive training solution aimed at teaching employees how to identify, mitigate and report cyber threats; creating awareness of information security risks for all roles across a company, Finance, HR, Legal, IT, Marketing, etc. This training is available on https://datasecurity365.com.
The training is subscription based, which is great for optimizing your budget with rotating seats and has white-labeling availability. This way, you can keep your academy consistent with your internal branding.
On top of this, you can create a wider library for your business with advanced cyber security training courses for your IT team, data security and privacy training for your non-technical employees and the most current, up-to-date methodologies for your cyber security team to keep up with the industry.
CyberTraining 365 is an online academy that offers nearly 1,000 hours of relevant and cutting edge cyber security training. Our training provides the most in-demand industry certification prep courses including EC-Council, CompTIA, (ISC)2 and Cisco; all taught by leading cyber security experts. All of our offerings are aligned with the national initiative for cyber security education (NICE) and ensure the most up-to-date information for this constantly shifting field. With engaging content in a scenario-based format, CyberTraining 365 uses bite-sized micro-learning methodology ensures learners are not overwhelmed with information. On Demand, LMS platform has white-label capabilities ideal for internal training purposes.