Top 12 Predictions from
Leading Cybersecurity Experts
ibm.co/threatintelligence
What will 2016 hold for cybersecurity?
Expect continued developments as both
the public and private sectors implement
intelligence-led approaches to threats.
ibm.co/threatintelligence
12
“New data sources arising from the
Internet of Things and biometrics will
lead to a renewed government interest
in using big data to prevent terrorism.”
Andrew Borene, federal manager, i2 Safer Planet
ibm.co/threatintelligence
11
“Private organizations will increase
their visibility into the dark web
to become more proactive about
cyberthreats than ever before.”
Bob Stasio, senior product manager for
cyber threat analysis, i2 Safer Planet
ibm.co/threatintelligence
10
“The international community will create safe
zones in Syria to stem the mass migration to
Europe, and big data analytics will play an
integral role in enforcing identity resolution
and border security in those safe zones.”
Todd Rosenblum, senior executive for
worldwide big data, i2 Safer Planet
ibm.co/threatintelligence
“Companies and government agencies
will begin using block-chain encryption
to protect against cyberthreats.”
Bob Stasio
9
ibm.co/threatintelligence
“Auditability and managed access of
US citizens’ personal data will be an
increasingly important requirement
for US national security agencies.”
Todd Rosenblum
8
ibm.co/threatintelligence
7
“Companies will begin properly
inventorying digital assets and data as
part of their risk management strategies,
heightening understanding of threat
surfaces and ways of minimizing them.”
Shahid Shah, CEO, Netspectives Communication
ibm.co/threatintelligence
“‘Big X’ consulting firms will offer
their customers cyberintelligence-as-
a-service consulting options.”
Bob Stasio
6
ibm.co/threatintelligence
“Vulnerability curators will become
increasingly prevalent as companies
learn to share breach data.”
Shahid Shah
5
ibm.co/threatintelligence
“Continued cybersecurity breaches and
state-sponsored cyber espionage will lead
to spikes in cybersecurity spending on both
workforce and software solutions.”
Andrew Borene
4
ibm.co/threatintelligence
“Large financial organizations will
continue divesting themselves
of managed security services to
create their own fusion centers.”
Bob Stasio
3
ibm.co/threatintelligence
“Third-party libraries and software
components will increasingly gain
attention as CIOs and CISOs realize
how many vulnerabilities they create.”
Shahid Shah
2
ibm.co/threatintelligence
1
“The market for behavioral
analytics and threat detection
offerings will continue unabated.”
Bob Stasio
Prepare yourself for future trends
in cybersecurity and threat analysis.
ibm.co/threatintelligence

Top 12 Predictions from Leading Cybersecurity Experts