Hyperconnectivity driven by the rise of the digital-everything economy and the internet of things (IoT) will soon disrupt the cybersecurity landscape in a way that hasn’t been seen in the past—and organizations should act now to be prepared. That’s the assessment from The Information Security Forum (ISF)’s Threat Horizon 2019 report, which frames this year’s trends as setting the stage for much worse scenarios down the road. The rest of 2017, the report noted, will see the rise of more and more connected things, increasing sophistication in crime syndicates, an over-dependence on critical infrastructure and weaponized systemic vulnerabilities, all against a backdrop of crumbling legacy technology and global consolidation. All of that will mean that the impact of data breaches increases dramatically. “How an organization responds to today’s increasing cybersecurity threats will vary based on a number of factors, including its unique blend of people and skills, products and services offered and approach to risk management,” said Steve Durbin, managing director of the ISF. “However, an organization that is well-informed about emerging technologies and corresponding threats will be best placed to make winning decisions. The key differentiating factor will be the degree to which organizations are prepared to meet the challenges of a fully connected society.” That will be critical given the ISF’s expectations for next year. The report predicts that the IoT will continue to leak sensitive information, while opaque algorithms compromise integrity. Also, rogue governments will start to use terrorist groups to launch cyber-attacks, as criminal capabilities expand gaps in international policing. And, researchers will be silenced to hide security vulnerabilities while the cyber-insurance safety net is pulled away. Regulations will fragment the cloud. By 2019, organizations will be faced with a hyper-connected world where the pace and scale of change—particularly in terms of technology—will have accelerated substantially. ISF said that we’ll see premeditated internet outages bringing trade to its knees; ransomware hijacking the IoT; privileged insiders coerced into giving up the crown jewels; automated misinformation and falsified information that compromises performance; subverted blockchains that shatter trust; surveillance laws exposing corporate secrets; privacy regulations impeding the monitoring of insider threats; and a headlong rush to deploy artificial intelligence that will lead to unexpected outcomes. Navigating this calls for a strong collaborative culture with the right people congregating at the right time to play their part in ensuring success, the report postulates. In all, the document highlights nine major threats, broken down into three challenging themes that organizations can expect to face over the next two years as a result of increasing developments in technology: 1. Disruption: From an over reliance on fragile connectivity requiring a seismic shift in the way business continuity is planned, practiced and implemented. 2. Distortion: As trust in the integrity of information is lost, the monitoring of access and changes to sensitive information will become critical as will the development of complex incident management procedures. 3. Deterioration: When controls are eroded by regulations and technology bringing a heightened focus on risk assessment and management in the light of regulatory changes and the increased prevalence of artificial intelligence in everyday technology. “Traditional business models will certainly be disrupted over the next two years, forcing business leaders to develop cutting-edge trading models while dealing with new regulation, advanced technology and distorted information,” said Durbin. “With established controls rendered ineffective by the latest security threats, new and innovative ways must be found to protect an organization’s most critical information assets.” Some of the recommendations include changing up existing business continuity plans to engage with internal and external stakeholders to agree alternative methods of communication (e.g. telex, satellite, microwave); and lobbying for minimum security standards for IoT devices via regulation. Having a clear sense of who has access to which critical assets and how to manage that will be crucial; as will monitoring access and changes made to sensitive information, using tools such as a Federated Identity and Access Management (FIAM) systems and Content Management Systems (CMS). The ISF also recommends building collaboration across the organization, and conducting a risk assessment to understand the impact of metadata being lost by a communications provider. Businesses should also hire AI specialists now. “Moving forward, organizations must prepare themselves for unprecedented levels of collaboration,” said Durbin. “Legal, compliance, audit, HR, IT, information security and other stakeholders must congregate to assess risks and inform the decision-making process. This collaboration should be extended to partners, manufacturers, vendors and regulators to ensure information security requirements are met.”
Home » Fortinet Service Provider Industry News » Hyperconnectivity and IoT Set to Radically Disrupt Cyber by 2019
Carriers’ 5G plans are Rooted in SDN/NFV, Says Ixia Survey
A new survey sponsored by Ixia reinforces the impression that telecommunications companies around the world...
Most Recent Articles
Cloudy With a Chance of Automation: Telecom in 2018
What does 2018 hold in store for the telecom sector? We asked our own editors and analysts, and gathered up a few third-party forecasts as well.
Verizon Says its Intelligent Edge Will Reduce Network Costs
Putting compute and storage at the edge reduces latency.
Gartner: IT Security Spending to Reach $96 Billion in 2018
Identity access management and security services to drive worldwide spending growth.
Editor’s Corner—Getting inside AT&T, Verizon and CenturyLink’s white box challenges and opportunities
AT&T, CenturyLink, Verizon and social media providers like Facebook are advocating a new way to achieve network virtualization: the white box. Unlike the traditional proprietary vendor approaches,...
AT&T’s Arnoldi: Security cannot be an afterthought
DALLAS—Security is so important to AT&T and its customers, it’s designing its network from the start with security in mind.
Verizon Enterprise Launches Bundled VNS Pricing Scheme
Verizon also plans to integrate unified communications into the VNS platform.
Will SD-WANs Spark Cable Competition?
HR's Alan Breznick says new SD-WAN services could be a game-changer in letting cable extend service reach, which could spark sector competition.
Virtualization is going to happen, but that isn’t the point
A question was raised at The Great Telco Debate event which caused a stir: will virtualization make telcos agile and competitive? Of course it will, but it needs to happen faster was the feedback.
Fortinet extends virtualized Security Fabric apps to AWS users
Extending on their existing relationship, Fortinet announced AWS has joined its Fabric-Ready Partner Program, enabling partners to...
The Challenges of Operationalizing NFV
While NFV provides an opportunity to reduce opex and improve customer experience, it also introduces additional layers of operational complexity.
Why Security Depends on Usability -- and How to Achieve Both
Any initiative that reduces usability will have consequences that make security less effective.
AT&T Preps Its Intelligent Edge for SD-WAN | Light Reading
Josh Goodell, vice president for the intelligent edge at AT&T, talks about the company's CPE platform.
Verizon: MEF 3.0 Reflects Real-World Needs | Light Reading
ORLANDO, 11/27/2017 - Verizon's Shawn Hakl says MEF 3.0 is focused on what carriers need to interconnect in a virtual world.
The case for securing the SD-WAN
The SD-WAN and the move to hybrid connectivity leaves many enterprises unprepared to protect every branch location from new waves of sophisticated attacks.
Q&A: BT’s Neil Sutton Views Global Scale, Security as Cloud Chall
BT recently updated a long-standing deal with AWS in an effort to tackle ongoing cloud challenges of enterprise customers.
Openness - The Key to Rapid Change in the Digital Era - InformationWeek
Change is never easy, particularly in an age of constant change. So, consider new ways to implement change and smooth the process.
The internet of identities is coming and will bring massive IAM changes
New demands for scale, security and machine learning will support massive proliferation of internet-connected devices.
CenturyLink says SD-WAN is just one part of the edge network
CenturyLink says SD-WAN is part of a wider variety of virtual business services it can deliver via its implementation of SDN and NFV.
Ambitious Amsterdam Makes ONAP's Case | Light Reading
First software release fully merges OpenECOMP and OPEN-O into modular architecture, pieces of which are already being put to use and in PoCs.
The cybersecurity skills shortage is an existential threat