Hyperconnectivity driven by the rise of the digital-everything economy and the internet of things (IoT) will soon disrupt the cybersecurity landscape in a way that hasn’t been seen in the past—and organizations should act now to be prepared. That’s the assessment from The Information Security Forum (ISF)’s Threat Horizon 2019 report, which frames this year’s trends as setting the stage for much worse scenarios down the road. The rest of 2017, the report noted, will see the rise of more and more connected things, increasing sophistication in crime syndicates, an over-dependence on critical infrastructure and weaponized systemic vulnerabilities, all against a backdrop of crumbling legacy technology and global consolidation. All of that will mean that the impact of data breaches increases dramatically. “How an organization responds to today’s increasing cybersecurity threats will vary based on a number of factors, including its unique blend of people and skills, products and services offered and approach to risk management,” said Steve Durbin, managing director of the ISF. “However, an organization that is well-informed about emerging technologies and corresponding threats will be best placed to make winning decisions. The key differentiating factor will be the degree to which organizations are prepared to meet the challenges of a fully connected society.” That will be critical given the ISF’s expectations for next year. The report predicts that the IoT will continue to leak sensitive information, while opaque algorithms compromise integrity. Also, rogue governments will start to use terrorist groups to launch cyber-attacks, as criminal capabilities expand gaps in international policing. And, researchers will be silenced to hide security vulnerabilities while the cyber-insurance safety net is pulled away. Regulations will fragment the cloud. By 2019, organizations will be faced with a hyper-connected world where the pace and scale of change—particularly in terms of technology—will have accelerated substantially. ISF said that we’ll see premeditated internet outages bringing trade to its knees; ransomware hijacking the IoT; privileged insiders coerced into giving up the crown jewels; automated misinformation and falsified information that compromises performance; subverted blockchains that shatter trust; surveillance laws exposing corporate secrets; privacy regulations impeding the monitoring of insider threats; and a headlong rush to deploy artificial intelligence that will lead to unexpected outcomes. Navigating this calls for a strong collaborative culture with the right people congregating at the right time to play their part in ensuring success, the report postulates. In all, the document highlights nine major threats, broken down into three challenging themes that organizations can expect to face over the next two years as a result of increasing developments in technology: 1. Disruption: From an over reliance on fragile connectivity requiring a seismic shift in the way business continuity is planned, practiced and implemented. 2. Distortion: As trust in the integrity of information is lost, the monitoring of access and changes to sensitive information will become critical as will the development of complex incident management procedures. 3. Deterioration: When controls are eroded by regulations and technology bringing a heightened focus on risk assessment and management in the light of regulatory changes and the increased prevalence of artificial intelligence in everyday technology. “Traditional business models will certainly be disrupted over the next two years, forcing business leaders to develop cutting-edge trading models while dealing with new regulation, advanced technology and distorted information,” said Durbin. “With established controls rendered ineffective by the latest security threats, new and innovative ways must be found to protect an organization’s most critical information assets.” Some of the recommendations include changing up existing business continuity plans to engage with internal and external stakeholders to agree alternative methods of communication (e.g. telex, satellite, microwave); and lobbying for minimum security standards for IoT devices via regulation. Having a clear sense of who has access to which critical assets and how to manage that will be crucial; as will monitoring access and changes made to sensitive information, using tools such as a Federated Identity and Access Management (FIAM) systems and Content Management Systems (CMS). The ISF also recommends building collaboration across the organization, and conducting a risk assessment to understand the impact of metadata being lost by a communications provider. Businesses should also hire AI specialists now. “Moving forward, organizations must prepare themselves for unprecedented levels of collaboration,” said Durbin. “Legal, compliance, audit, HR, IT, information security and other stakeholders must congregate to assess risks and inform the decision-making process. This collaboration should be extended to partners, manufacturers, vendors and regulators to ensure information security requirements are met.”
Home » Fortinet Service Provider Industry News » Hyperconnectivity and IoT Set to Radically Disrupt Cyber by 2019
Carriers’ 5G plans are Rooted in SDN/NFV, Says Ixia Survey
A new survey sponsored by Ixia reinforces the impression that telecommunications companies around the world...
Most Recent Articles
Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and...
Locking It Down: Securing Multicloud IT Across Industries | Light Reading
As healthcare, financial services, and education move to multi-cloud they face different security requirements.
Windstream's Nichols, Frane discuss why open source is important
While the road to virtualization has included potholes and bad signage, open source can provide the right roadmap, according to Windstream executives.
Windstream embarks on orchestration journey with SDNow service
Windstream is taking on orchestration and virtualization one bite at a time with its SDNow service. Windstream announced a major expansion of its SDN Orchestrated Waves (SDNow) service in October.
Machine Learning, Cloud, Compliance and Business Awareness Drive Cybersecurity
Gartner determine the six trends that it sees driving cybersecurity forward
The Future of Edge Computing: Not Just for IoT
With the continuing avalanche of computing demand and data moving compute and data closer to the user is now a necessity.
Industry Voices—Raynovich: Why large service providers and networking companies missed the SD-WAN boat
While the SD-WAN and network-as-a-service market is booming, some service providers have been slow out of the starting blocks. Futuriom recently released its 2018 SD-WAN Growth Outlook report,...
Expectation vs. reality — where are CSPs in their development of partnership ecosystems? (Reality Check)
In 2018, with the commoditization of voice and data services firmly in the cards, the digital market appears to be the market of choice for communication service providers (CSPs) hoping to boost...
CenturyLink: Security Sales All in the Timing
Enterprises want better security at a lower cost but they aren't going to give up what they've already invested in to get it.
Global carriers agree on common IoT security framework
Sixteen mobile network operators around the world have agreed to use a common security framework for the internet of things that was developed by the GSMA. According to the GSMA, carriers which...
Why Enterprises Struggle with Hybrid Cloud and DevOps
More enterprises are moving to the cloud and implementing DevOps, containers and microservices, but their efforts are falling short of expectations. A recent study from the Ponemon Institute...
The Holy War of Enterprise Tech: One Cloud Isn't Enough
Enterprises may be asking for trouble if they go with a single-cloud strategy.
Why SD-WAN Is Taking Off Now
It's clear that SD-WAN is now seen as the enterprise networking architecture of the future, which is why this market will reach billions of dollars.
Operationalizing SDN with machine learning and artificial intelligence (Reader Forum)
Quo vadis SDN in provider networks? With its promise of network simplification and new revenue streams, software-defined networking has certainly captured the interest of service providers. At its...
IDG Contributor Network: Cybersecurity – how confident (complacent?) are you?
Attention all cybersecurity professionals!We all know that today’s cybersecurity landscape is an ever-changing one. So how often should organizations review their cybersecurity strategy? If it’s a...
Carriers pledge to limit aggregators’ access to customer location data
Following press investigations and congressional concern about leaks and improper use of consumer location data provided by mobile network operators, the national carriers have said that they are...
Improving the Adoption of Security Automation
Four barriers to automation and how to overcome them.
Transforming the market: How technology is creating opportunities for MVNOs
Freelance Technology Journalist Kate O’Flaherty explores how technologies are creating opportunities for Mobile Virtual Network Operators. AI customer service, 5G and virtualisation are among the...
Understand the Power of Internal APIs
Missing the transition from legacy integration to using APIs to connect internal systems might prove the difference between business success and failure.
ETSI's Zero-Touch Group Launches First PoC, Focused on 5G Slicing