Hyperconnectivity driven by the rise of the digital-everything economy and the internet of things (IoT) will soon disrupt the cybersecurity landscape in a way that hasn’t been seen in the past—and organizations should act now to be prepared. That’s the assessment from The Information Security Forum (ISF)’s Threat Horizon 2019 report, which frames this year’s trends as setting the stage for much worse scenarios down the road. The rest of 2017, the report noted, will see the rise of more and more connected things, increasing sophistication in crime syndicates, an over-dependence on critical infrastructure and weaponized systemic vulnerabilities, all against a backdrop of crumbling legacy technology and global consolidation. All of that will mean that the impact of data breaches increases dramatically. “How an organization responds to today’s increasing cybersecurity threats will vary based on a number of factors, including its unique blend of people and skills, products and services offered and approach to risk management,” said Steve Durbin, managing director of the ISF. “However, an organization that is well-informed about emerging technologies and corresponding threats will be best placed to make winning decisions. The key differentiating factor will be the degree to which organizations are prepared to meet the challenges of a fully connected society.” That will be critical given the ISF’s expectations for next year. The report predicts that the IoT will continue to leak sensitive information, while opaque algorithms compromise integrity. Also, rogue governments will start to use terrorist groups to launch cyber-attacks, as criminal capabilities expand gaps in international policing. And, researchers will be silenced to hide security vulnerabilities while the cyber-insurance safety net is pulled away. Regulations will fragment the cloud. By 2019, organizations will be faced with a hyper-connected world where the pace and scale of change—particularly in terms of technology—will have accelerated substantially. ISF said that we’ll see premeditated internet outages bringing trade to its knees; ransomware hijacking the IoT; privileged insiders coerced into giving up the crown jewels; automated misinformation and falsified information that compromises performance; subverted blockchains that shatter trust; surveillance laws exposing corporate secrets; privacy regulations impeding the monitoring of insider threats; and a headlong rush to deploy artificial intelligence that will lead to unexpected outcomes. Navigating this calls for a strong collaborative culture with the right people congregating at the right time to play their part in ensuring success, the report postulates. In all, the document highlights nine major threats, broken down into three challenging themes that organizations can expect to face over the next two years as a result of increasing developments in technology: 1. Disruption: From an over reliance on fragile connectivity requiring a seismic shift in the way business continuity is planned, practiced and implemented. 2. Distortion: As trust in the integrity of information is lost, the monitoring of access and changes to sensitive information will become critical as will the development of complex incident management procedures. 3. Deterioration: When controls are eroded by regulations and technology bringing a heightened focus on risk assessment and management in the light of regulatory changes and the increased prevalence of artificial intelligence in everyday technology. “Traditional business models will certainly be disrupted over the next two years, forcing business leaders to develop cutting-edge trading models while dealing with new regulation, advanced technology and distorted information,” said Durbin. “With established controls rendered ineffective by the latest security threats, new and innovative ways must be found to protect an organization’s most critical information assets.” Some of the recommendations include changing up existing business continuity plans to engage with internal and external stakeholders to agree alternative methods of communication (e.g. telex, satellite, microwave); and lobbying for minimum security standards for IoT devices via regulation. Having a clear sense of who has access to which critical assets and how to manage that will be crucial; as will monitoring access and changes made to sensitive information, using tools such as a Federated Identity and Access Management (FIAM) systems and Content Management Systems (CMS). The ISF also recommends building collaboration across the organization, and conducting a risk assessment to understand the impact of metadata being lost by a communications provider. Businesses should also hire AI specialists now. “Moving forward, organizations must prepare themselves for unprecedented levels of collaboration,” said Durbin. “Legal, compliance, audit, HR, IT, information security and other stakeholders must congregate to assess risks and inform the decision-making process. This collaboration should be extended to partners, manufacturers, vendors and regulators to ensure information security requirements are met.”
Home » Fortinet Service Provider Industry News » Hyperconnectivity and IoT Set to Radically Disrupt Cyber by 2019
Carriers’ 5G plans are Rooted in SDN/NFV, Says Ixia Survey
A new survey sponsored by Ixia reinforces the impression that telecommunications companies around the world...
Most Recent Articles
OpenStack Promises More Focused Edge Work
New strategic initiatives aimed at filling the technology gaps around specific use cases including NFV and the edge.
SD-WAN is Dead. Long Live Secure SD-WAN!
In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as...
Verizon: Lack of Interoperability, Consistency Slows Automation
Verizon executive Vickie Lonker thinks both vendors and network service providers can do a better job to move forward faster.
Verizon accelerates business' network virtualization journey with new network bundles
Verizon has taken another step to enable businesses to advance their virtualization plans with its new Virtual Network Services Solution Bundles, a set of tools and services it says can streamline...
Microsoft introduces Azure Sphere to protect your IoT
It's a comprehensive system meant to secure some of the most vulnerable devices connected to the internet.
Verizon Closes the Loop on Virtual Services
New service bundles let customers more easily access virtual services to speed their own transformations, and will lead to self-service soon.
Verizon report: Ransomware top malware threat of 2017, moving into critical systems
Verizon released its Data Breach Investigations Report (DBIR) this morning, the massive, in-depth analysis of last year's security breaches, based on 53,000 security incidents from 67 contributing...
State of SDN and NFV — Hype or Reality?
SDN and NFV are a reality today, but is it the reality that the industry wanted? It's up to the SDN community to set realistic expectations and be candid about the challenges. Visit us at...
CenturyLink Increases Cybersecurity Capabilities Post-Level 3 Buy
Enhanced threat awareness feeds into CenturyLink's portfolio of security services, including it's cloud-based Adaptive Threat Intelligence offering, which includes enhancements such as the ability...
Service Providers Have Work Ahead for SD-WAN Security | Light Reading
Communications service providers that are specialists in software-defined wide-area networking believe they're doing a good job on SD-WAN security but need to consider some enhancements to...
Etisalat, Singtel, SoftBank and Telefónica become security superheroes
Etisalat, Singtel, SoftBank and Telefónica have teamed up to form the Global Cyber Security Alliance, patrolling the shadowy information highway to protect innocent punters from the evils of...
CenturyLink CTO: SDOs Crucial to Automation
Aamir Hussain joined MEF's Board of Directors and points to its LSO work and the API frameworks provided by TM Forum as important.
AT&T will let the market pick the SD-WAN vendor winners, losers, sees interop potential
AT&T certainly has plenty of SD-WAN experience, but admits that vendor solutions are far from equal.
5G is a security risk right now – ENISA
The European Union Agency for Network and Information Security, ENISA, has released a research papers which highlights the security flaws of yesteryear are still a threat in the 5G world of tomorrow.
Amdocs Leverages ONAP to Win Microsoft as a Customer
Amdocs' leadership position in ONAP seems to have given it an entrée with a major public cloud provider. And an Amdocs exec says open source is an environment where you cannot disconnect technical...
AT&T Preps White Box Routers for 5G
AT&T looks to expand its white box router approach to macro sites and small cells for 5G.
ONF Operators Take Charge of Edge SDN
New strategic initiative led by eight major operators will spell out for vendors exactly how operators want new open networks to be built.
Accenture CIO: Journey to Cloud Accelerates Tech Upgrades
Accenture CIO Andrew Wilson is 2 years into a 3-year journey to put 90% of the company's IT infrastructure into the cloud. Here's how that cloud commitment helped accelerate a recent IT project.
IDG Contributor Network: You’re too busy to get your security right
Every now and then the topic of being a security generalist comes up in a conversation. Almost every organization has a person who deals with a wide variety of security matters. Security isn’t...
Why Open Source & Hardware Integration Can Work for Service Providers | Light Reading