Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Top 12 Cybersecurity Predictions for 2017


Published on

No industry is immune from a cyberattack. In fact, cyber experts are predicting that we may see a rise in attacks and a spread as industries previously on the fringe now face direct hits. The question is, “What’s in store for us in 2017?”

Published in: Technology
  • ⇒ ⇐ This service will write as best as they can. So you do not need to waste the time on rewritings.
    Are you sure you want to  Yes  No
    Your message goes here

Top 12 Cybersecurity Predictions for 2017

  1. 1. Top 12 Predictions from Leading Cybersecurity Experts
  2. 2. What’s in store for cybersecurity in 2017? With the increasing magnitude and frequency of cyber attacks, how can we stay ahead of possible threats to counter and mitigate?
  3. 3. “2017 will be the year of ‘hunt’ analysis, where organizations will proactively search through their network for threats versus having an alert to indicate a problem.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis The year of hunt analysis
  4. 4. “We will see the proliferation of the Internet of Things as a tool to cause disruptions and attacks on critical infrastructure. More cyber attacks will become crimes that result in physical harm.” Michael Goedeker, CEO and Founder HAKDEFNET and Security Researcher IoT causes disruptions
  5. 5. “Social media providers will continue to seek the right balance of cooperating with government and protecting their business reputation.” Todd M. Rosenblum, Senior Executive for i2 Safer Planet Cybersecurity and social media
  6. 6. “Private sector companies will increasingly participate in military style ‘wargames’ to test the readiness of their cybersecurity organizations.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis Cybersecurity wargames
  7. 7. “Rise of machines—more AI and cognitive technology will be implemented to make up for the shortfall in trained and experienced cybersecurity professionals.” Morgan Wright, Cyber Terrorism and Cyber Crime Analyst Rise of cognitive in cybersecurity “New cognitive behavior tracking capabilities will help reduce elevated privilege abuse and insider threat.” Shahid Shah, CEO at Netspective Communications, Cybersecurity and Risk Consultant
  8. 8. “Zero-day exploit value on the dark web will far exceed the amount that companies are willing to pay for ‘bug bounties’ due to the overall value of data amassed.” Scott N. Schober, CEO Berkeley Varitronics Systems, Inc. and Author Hacked Again Zero-day exploit
  9. 9. “The security versus convenience debate will enter the public eye as high-profile companies suffer incidents that could have been prevented with two-factor or strong passwords.” Tyler Carbone, COO at Terbium Labs Security vs. convenience debate
  10. 10. “Huge DDoS attacks coinciding with fake news tweets about a major data breach and unreliable, but viral, social media posts and sloppy tech reporting by a few bloggers and media sites will cause a significant, but temporary, drop in select stocks. The hidden goal of the hackers: manipulation of stock prices for financial gain.” Dan Lohrmann, Chief Strategist and Chief Security Officer at Security Mentor, Inc. Hackers use fake news
  11. 11. “Trust in systems will be broken as bad guys move from just exfiltrating data to changing it.” Caleb Barlow, Vice President of IBM security Trust will be broken
  12. 12. “Companies will seek to quantify the costs and benefits of new technologies versus cost and likelihood of a breach, as information security becomes less an IT problem and more a risk management problem.” Tyler Carbone, COO at Terbium Labs Rise of cyber risk management
  13. 13. “Many custom services in healthcare, retail and financial depend on knowing customers and anticipating their future needs. But personalization data can lead to loss of privacy and increased security risks. The pressure to balance these three sometimes conflicting requirements will increase significantly in 2017.” Diana Kelley, Global Executive Security Advisor, IBM Pressure to balance privacy, personalization and security
  14. 14. “Industries such as energy and utilities, manufacturing and supply chains have remained relatively isolated from major cyber attacks. This is about to change.” Michael Kehoe, WW Program Director, IBM Cyber attacks spread
  15. 15. Be acutely aware of the threatscape and equip yourself to predict, mitigate and counter cyber attacks: