No industry is immune from a cyberattack. In fact, cyber experts are predicting that we may see a rise in attacks and a spread as industries previously on the fringe now face direct hits. The question is, “What’s in store for us in 2017?”
ibm.co/cyberthreatanalysis
What’s in store for cybersecurity in 2017?
With the increasing magnitude and frequency
of cyber attacks, how can we stay ahead of
possible threats to counter and mitigate?
ibm.co/cyberthreatanalysis
“2017 will be the year of ‘hunt’
analysis, where organizations will
proactively search through their
network for threats versus having
an alert to indicate a problem.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
The year of hunt analysis
ibm.co/cyberthreatanalysis
“We will see the proliferation of the
Internet of Things as a tool to cause
disruptions and attacks on critical
infrastructure. More cyber attacks
will become crimes that result in
physical harm.”
Michael Goedeker, CEO and Founder
HAKDEFNET and Security Researcher
IoT causes disruptions
ibm.co/cyberthreatanalysis
“Social media providers will
continue to seek the right balance
of cooperating with government and
protecting their business reputation.”
Todd M. Rosenblum, Senior Executive
for i2 Safer Planet
Cybersecurity and social media
ibm.co/cyberthreatanalysis
“Private sector companies will
increasingly participate in military style
‘wargames’ to test the readiness of
their cybersecurity organizations.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
Cybersecurity wargames
ibm.co/cyberthreatanalysis
“Rise of machines—more AI and cognitive
technology will be implemented to make up
for the shortfall in trained and experienced
cybersecurity professionals.”
Morgan Wright, Cyber Terrorism
and Cyber Crime Analyst
Rise of cognitive in cybersecurity
“New cognitive behavior tracking capabilities
will help reduce elevated privilege abuse and
insider threat.”
Shahid Shah, CEO at Netspective Communications,
Cybersecurity and Risk Consultant
ibm.co/cyberthreatanalysis
“Zero-day exploit value on the dark
web will far exceed the amount that
companies are willing to pay for ‘bug
bounties’ due to the overall value of
data amassed.”
Scott N. Schober, CEO Berkeley Varitronics Systems, Inc.
and Author Hacked Again
Zero-day exploit
ibm.co/cyberthreatanalysis
“The security versus convenience
debate will enter the public eye as
high-profile companies suffer incidents
that could have been prevented with
two-factor or strong passwords.”
Tyler Carbone, COO at Terbium Labs
Security vs. convenience debate
ibm.co/cyberthreatanalysis
“Huge DDoS attacks coinciding with fake news
tweets about a major data breach and unreliable,
but viral, social media posts and sloppy tech
reporting by a few bloggers and media sites
will cause a significant, but temporary, drop in
select stocks. The hidden goal of the hackers:
manipulation of stock prices for financial gain.”
Dan Lohrmann, Chief Strategist and
Chief Security Officer at Security Mentor, Inc.
Hackers use fake news
ibm.co/cyberthreatanalysis
“Trust in systems will be broken as
bad guys move from just exfiltrating
data to changing it.”
Caleb Barlow, Vice President of IBM security
Trust will be broken
ibm.co/cyberthreatanalysis
“Companies will seek to quantify the
costs and benefits of new technologies
versus cost and likelihood of a breach,
as information security becomes
less an IT problem and more a risk
management problem.”
Tyler Carbone, COO at Terbium Labs
Rise of cyber risk management
ibm.co/cyberthreatanalysis
“Many custom services in healthcare, retail
and financial depend on knowing customers
and anticipating their future needs. But
personalization data can lead to loss of privacy
and increased security risks. The pressure to
balance these three sometimes conflicting
requirements will increase significantly in 2017.”
Diana Kelley, Global Executive
Security Advisor, IBM
Pressure to balance privacy,
personalization and security
ibm.co/cyberthreatanalysis
“Industries such as energy and
utilities, manufacturing and supply
chains have remained relatively
isolated from major cyber attacks.
This is about to change.”
Michael Kehoe, WW Program Director, IBM
Cyber attacks spread
Be acutely aware of the threatscape
and equip yourself to predict, mitigate
and counter cyber attacks:
ibm.co/cyberthreatanalysis