What does cyber security have in store for us in 2017? Experts predict that we may see increased attacks while some say more companies will go on the defensive by utilizing cognitive computing to help fight cyber attacks. For more specifics, check out these 12 predictions from cyber security experts that just may help predict, mitigate and counter cyber attacks. Don't wait to make a New Year's resolution—get ready for 2017 now by preparing yourself for future trends in cyber security and threat analysis. ibm.co/cyberthreatanalysis
2. ibm.biz/TourCyberThreatAnalysis
What’s in store for cybersecurity in 2017?
With the increasing magnitude and frequency
of cyber attacks, how can we stay ahead of
possible threats to counter and mitigate?
3. ibm.biz/TourCyberThreatAnalysis
“2017 will be the year of ‘hunt’
analysis, where organizations will
proactively search through their
network for threats versus having
an alert to indicate a problem.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
The year of hunt analysis
4. ibm.biz/TourCyberThreatAnalysis
“We will see the proliferation of the
Internet of Things as a tool to cause
disruptions and attacks on critical
infrastructure. More cyber attacks
will become crimes that result in
physical harm.”
Michael Goedeker, CEO and Founder
HAKDEFNET and Security Researcher
IoT causes disruptions
5. ibm.biz/TourCyberThreatAnalysis
“Social media providers will
continue to seek the right balance
of cooperating with government and
protecting their business reputation.”
Todd M. Rosenblum, Senior Executive
for i2 Safer Planet
Cybersecurity and social media
6. ibm.biz/TourCyberThreatAnalysis
“Private sector companies will
increasingly participate in military style
‘wargames’ to test the readiness of
their cybersecurity organizations.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
Cybersecurity wargames
7. ibm.biz/TourCyberThreatAnalysis
“Rise of machines—more AI and cognitive
technology will be implemented to make up
for the shortfall in trained and experienced
cybersecurity professionals.”
Morgan Wright, Cyber Terrorism
and Cyber Crime Analyst
Rise of cognitive in cybersecurity
“New cognitive behavior tracking capabilities
will help reduce elevated privilege abuse and
insider threat.”
Shahid Shah, CEO at Netspective Communications,
Cybersecurity and Risk Consultant
8. ibm.biz/TourCyberThreatAnalysis
“Zero-day exploit value on the dark
web will far exceed the amount that
companies are willing to pay for ‘bug
bounties’ due to the overall value of
data amassed.”
Scott N. Schober, CEO Berkeley Varitronics Systems, Inc.
and Author Hacked Again
Zero-day exploit
9. ibm.biz/TourCyberThreatAnalysis
“The security versus convenience
debate will enter the public eye as
high-profile companies suffer incidents
that could have been prevented with
two-factor or strong passwords.”
Tyler Carbone, COO at Terbium Labs
Security vs. convenience debate
10. ibm.biz/TourCyberThreatAnalysis
“Huge DDoS attacks coinciding with fake news
tweets about a major data breach and unreliable,
but viral, social media posts and sloppy tech
reporting by a few bloggers and media sites
will cause a significant, but temporary, drop in
select stocks. The hidden goal of the hackers:
manipulation of stock prices for financial gain.”
Dan Lohrmann, Chief Strategist and
Chief Security Officer at Security Mentor, Inc.
Hackers use fake news
12. ibm.biz/TourCyberThreatAnalysis
“Companies will seek to quantify the
costs and benefits of new technologies
versus cost and likelihood of a breach,
as information security becomes
less an IT problem and more a risk
management problem.”
Tyler Carbone, COO at Terbium Labs
Rise of cyber risk management
13. ibm.biz/TourCyberThreatAnalysis
“Many custom services in healthcare, retail
and financial depend on knowing customers
and anticipating their future needs. But
personalization data can lead to loss of privacy
and increased security risks. The pressure to
balance these three sometimes conflicting
requirements will increase significantly in 2017.”
Diana Kelley, Global Executive
Security Advisor, IBM
Pressure to balance privacy,
personalization and security
14. ibm.biz/TourCyberThreatAnalysis
“Industries such as energy and
utilities, manufacturing and supply
chains have remained relatively
isolated from major cyber attacks.
This is about to change.”
Michael Kehoe, WW Program Director, IBM
Cyber attacks spread
15. Be acutely aware of the threatscape
and equip yourself to predict, mitigate
and counter cyber attacks:
ibm.biz/TourCyberThreatAnalysis