Top 12 Predictions from Leading
Cybersecurity Experts
ibm.co/cyberthreatanalysis
What’s in store for cybersecurity in 2017?
With the increasing magnitude and frequency
of cyber attacks, how can we stay ahead of
possible threats to counter and mitigate?
ibm.co/cyberthreatanalysis
“2017 will be the year of ‘hunt’
analysis, where organizations will
proactively search through their
network for threats versus having
an alert to indicate a problem.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
The year of hunt analysis
ibm.co/cyberthreatanalysis
“We will see the proliferation of the
Internet of Things as a tool to cause
disruptions and attacks on critical
infrastructure. More cyber attacks
will become crimes that result in
physical harm.”
Michael Goedeker, CEO and Founder
HAKDEFNET and Security Researcher
IoT causes disruptions
ibm.co/cyberthreatanalysis
“Social media providers will
continue to seek the right balance
of cooperating with government and
protecting their business reputation.”
Todd M. Rosenblum, Senior Executive
for i2 Safer Planet
Cybersecurity and social media
ibm.co/cyberthreatanalysis
“Private sector companies will
increasingly participate in military style
‘wargames’ to test the readiness of
their cybersecurity organizations.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
Cybersecurity wargames
ibm.co/cyberthreatanalysis
“Rise of machines—more AI and cognitive
technology will be implemented to make up
for the shortfall in trained and experienced
cybersecurity professionals.”
Morgan Wright, Cyber Terrorism
and Cyber Crime Analyst
Rise of cognitive in cybersecurity
“New cognitive behavior tracking capabilities
will help reduce elevated privilege abuse and
insider threat.”
Shahid Shah, CEO at Netspective Communications,
Cybersecurity and Risk Consultant
ibm.co/cyberthreatanalysis
“Zero-day exploit value on the dark
web will far exceed the amount that
companies are willing to pay for ‘bug
bounties’ due to the overall value of
data amassed.”
Scott N. Schober, CEO Berkeley Varitronics Systems, Inc.
and Author Hacked Again
Zero-day exploit
ibm.co/cyberthreatanalysis
“The security versus convenience
debate will enter the public eye as
high-profile companies suffer incidents
that could have been prevented with
two-factor or strong passwords.”
Tyler Carbone, COO at Terbium Labs
Security vs. convenience debate
ibm.co/cyberthreatanalysis
“Huge DDoS attacks coinciding with fake news
tweets about a major data breach and unreliable,
but viral, social media posts and sloppy tech
reporting by a few bloggers and media sites
will cause a significant, but temporary, drop in
select stocks. The hidden goal of the hackers:
manipulation of stock prices for financial gain.”
Dan Lohrmann, Chief Strategist and
Chief Security Officer at Security Mentor, Inc.
Hackers use fake news
ibm.co/cyberthreatanalysis
“Trust in systems will be broken as
bad guys move from just exfiltrating
data to changing it.”
Caleb Barlow, Vice President of IBM security
Trust will be broken
ibm.co/cyberthreatanalysis
“Companies will seek to quantify the
costs and benefits of new technologies
versus cost and likelihood of a breach,
as information security becomes
less an IT problem and more a risk
management problem.”
Tyler Carbone, COO at Terbium Labs
Rise of cyber risk management
ibm.co/cyberthreatanalysis
“Many custom services in healthcare, retail
and financial depend on knowing customers
and anticipating their future needs. But
personalization data can lead to loss of privacy
and increased security risks. The pressure to
balance these three sometimes conflicting
requirements will increase significantly in 2017.”
Diana Kelley, Global Executive
Security Advisor, IBM
Pressure to balance privacy,
personalization and security
ibm.co/cyberthreatanalysis
“Industries such as energy and
utilities, manufacturing and supply
chains have remained relatively
isolated from major cyber attacks.
This is about to change.”
Michael Kehoe, WW Program Director, IBM
Cyber attacks spread
Be acutely aware of the threatscape
and equip yourself to predict, mitigate
and counter cyber attacks:
ibm.co/cyberthreatanalysis

Top 12 Cybersecurity Predictions for 2017

  • 1.
    Top 12 Predictionsfrom Leading Cybersecurity Experts
  • 2.
    ibm.co/cyberthreatanalysis What’s in storefor cybersecurity in 2017? With the increasing magnitude and frequency of cyber attacks, how can we stay ahead of possible threats to counter and mitigate?
  • 3.
    ibm.co/cyberthreatanalysis “2017 will bethe year of ‘hunt’ analysis, where organizations will proactively search through their network for threats versus having an alert to indicate a problem.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis The year of hunt analysis
  • 4.
    ibm.co/cyberthreatanalysis “We will seethe proliferation of the Internet of Things as a tool to cause disruptions and attacks on critical infrastructure. More cyber attacks will become crimes that result in physical harm.” Michael Goedeker, CEO and Founder HAKDEFNET and Security Researcher IoT causes disruptions
  • 5.
    ibm.co/cyberthreatanalysis “Social media providerswill continue to seek the right balance of cooperating with government and protecting their business reputation.” Todd M. Rosenblum, Senior Executive for i2 Safer Planet Cybersecurity and social media
  • 6.
    ibm.co/cyberthreatanalysis “Private sector companieswill increasingly participate in military style ‘wargames’ to test the readiness of their cybersecurity organizations.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis Cybersecurity wargames
  • 7.
    ibm.co/cyberthreatanalysis “Rise of machines—moreAI and cognitive technology will be implemented to make up for the shortfall in trained and experienced cybersecurity professionals.” Morgan Wright, Cyber Terrorism and Cyber Crime Analyst Rise of cognitive in cybersecurity “New cognitive behavior tracking capabilities will help reduce elevated privilege abuse and insider threat.” Shahid Shah, CEO at Netspective Communications, Cybersecurity and Risk Consultant
  • 8.
    ibm.co/cyberthreatanalysis “Zero-day exploit valueon the dark web will far exceed the amount that companies are willing to pay for ‘bug bounties’ due to the overall value of data amassed.” Scott N. Schober, CEO Berkeley Varitronics Systems, Inc. and Author Hacked Again Zero-day exploit
  • 9.
    ibm.co/cyberthreatanalysis “The security versusconvenience debate will enter the public eye as high-profile companies suffer incidents that could have been prevented with two-factor or strong passwords.” Tyler Carbone, COO at Terbium Labs Security vs. convenience debate
  • 10.
    ibm.co/cyberthreatanalysis “Huge DDoS attackscoinciding with fake news tweets about a major data breach and unreliable, but viral, social media posts and sloppy tech reporting by a few bloggers and media sites will cause a significant, but temporary, drop in select stocks. The hidden goal of the hackers: manipulation of stock prices for financial gain.” Dan Lohrmann, Chief Strategist and Chief Security Officer at Security Mentor, Inc. Hackers use fake news
  • 11.
    ibm.co/cyberthreatanalysis “Trust in systemswill be broken as bad guys move from just exfiltrating data to changing it.” Caleb Barlow, Vice President of IBM security Trust will be broken
  • 12.
    ibm.co/cyberthreatanalysis “Companies will seekto quantify the costs and benefits of new technologies versus cost and likelihood of a breach, as information security becomes less an IT problem and more a risk management problem.” Tyler Carbone, COO at Terbium Labs Rise of cyber risk management
  • 13.
    ibm.co/cyberthreatanalysis “Many custom servicesin healthcare, retail and financial depend on knowing customers and anticipating their future needs. But personalization data can lead to loss of privacy and increased security risks. The pressure to balance these three sometimes conflicting requirements will increase significantly in 2017.” Diana Kelley, Global Executive Security Advisor, IBM Pressure to balance privacy, personalization and security
  • 14.
    ibm.co/cyberthreatanalysis “Industries such asenergy and utilities, manufacturing and supply chains have remained relatively isolated from major cyber attacks. This is about to change.” Michael Kehoe, WW Program Director, IBM Cyber attacks spread
  • 15.
    Be acutely awareof the threatscape and equip yourself to predict, mitigate and counter cyber attacks: ibm.co/cyberthreatanalysis