Hyperconnectivity driven by the rise of the digital-everything economy and the internet of things (IoT) will soon disrupt the cybersecurity landscape in a way that hasn’t been seen in the past—and organizations should act now to be prepared. That’s the assessment from The Information Security Forum (ISF)’s Threat Horizon 2019 report, which frames this year’s trends as setting the stage for much worse scenarios down the road. The rest of 2017, the report noted, will see the rise of more and more connected things, increasing sophistication in crime syndicates, an over-dependence on critical infrastructure and weaponized systemic vulnerabilities, all against a backdrop of crumbling legacy technology and global consolidation. All of that will mean that the impact of data breaches increases dramatically. “How an organization responds to today’s increasing cybersecurity threats will vary based on a number of factors, including its unique blend of people and skills, products and services offered and approach to risk management,” said Steve Durbin, managing director of the ISF. “However, an organization that is well-informed about emerging technologies and corresponding threats will be best placed to make winning decisions. The key differentiating factor will be the degree to which organizations are prepared to meet the challenges of a fully connected society.” That will be critical given the ISF’s expectations for next year. The report predicts that the IoT will continue to leak sensitive information, while opaque algorithms compromise integrity. Also, rogue governments will start to use terrorist groups to launch cyber-attacks, as criminal capabilities expand gaps in international policing. And, researchers will be silenced to hide security vulnerabilities while the cyber-insurance safety net is pulled away. Regulations will fragment the cloud. By 2019, organizations will be faced with a hyper-connected world where the pace and scale of change—particularly in terms of technology—will have accelerated substantially. ISF said that we’ll see premeditated internet outages bringing trade to its knees; ransomware hijacking the IoT; privileged insiders coerced into giving up the crown jewels; automated misinformation and falsified information that compromises performance; subverted blockchains that shatter trust; surveillance laws exposing corporate secrets; privacy regulations impeding the monitoring of insider threats; and a headlong rush to deploy artificial intelligence that will lead to unexpected outcomes. Navigating this calls for a strong collaborative culture with the right people congregating at the right time to play their part in ensuring success, the report postulates. In all, the document highlights nine major threats, broken down into three challenging themes that organizations can expect to face over the next two years as a result of increasing developments in technology: 1. Disruption: From an over reliance on fragile connectivity requiring a seismic shift in the way business continuity is planned, practiced and implemented. 2. Distortion: As trust in the integrity of information is lost, the monitoring of access and changes to sensitive information will become critical as will the development of complex incident management procedures. 3. Deterioration: When controls are eroded by regulations and technology bringing a heightened focus on risk assessment and management in the light of regulatory changes and the increased prevalence of artificial intelligence in everyday technology. “Traditional business models will certainly be disrupted over the next two years, forcing business leaders to develop cutting-edge trading models while dealing with new regulation, advanced technology and distorted information,” said Durbin. “With established controls rendered ineffective by the latest security threats, new and innovative ways must be found to protect an organization’s most critical information assets.” Some of the recommendations include changing up existing business continuity plans to engage with internal and external stakeholders to agree alternative methods of communication (e.g. telex, satellite, microwave); and lobbying for minimum security standards for IoT devices via regulation. Having a clear sense of who has access to which critical assets and how to manage that will be crucial; as will monitoring access and changes made to sensitive information, using tools such as a Federated Identity and Access Management (FIAM) systems and Content Management Systems (CMS). The ISF also recommends building collaboration across the organization, and conducting a risk assessment to understand the impact of metadata being lost by a communications provider. Businesses should also hire AI specialists now. “Moving forward, organizations must prepare themselves for unprecedented levels of collaboration,” said Durbin. “Legal, compliance, audit, HR, IT, information security and other stakeholders must congregate to assess risks and inform the decision-making process. This collaboration should be extended to partners, manufacturers, vendors and regulators to ensure information security requirements are met.”
Home » Fortinet Service Provider Industry News » Hyperconnectivity and IoT Set to Radically Disrupt Cyber by 2019
Carriers’ 5G plans are Rooted in SDN/NFV, Says Ixia Survey
A new survey sponsored by Ixia reinforces the impression that telecommunications companies around the world...
Most Recent Articles
Orange Business Services tees up support for Amazon Web Services
Orange Business Services is forming strategic partnerships with cloud providers such as AWS to become a leader for multicloud services. Orange Business Services already has a similar deal in place...
TAG Cyber Annual: Automation, Analytics & Cloud Driving Improved Security Picture
Organization led by former AT&T security chief Ed Amoroso updates third volume of annual reports tracking cybersecurity trends.
Windstream Enterprise's SD-WAN service scores PCI DSS compliance
Windstream announced on Tuesday that its SD-WAN service has met the standard for the Payment Card Industry Data Security Standard (PCI DSS) Version 3.2 Compliance. The PCI DSS compliance was...
Windstream Adds PCI Compliance to SD-WAN
Service provider says the independent compliance is important not just to its retail segment customers but also many other market segments.
IDC report: VNF revenues to hit $16.4B by 2022
After a somewhat rocky start, virtual network functions are poised to grow to $16.4 billion in revenues by 2022, according to an IDC report. Worldwide revenue for the VNF market in 2017 checked in...
Security, Network Capacity Issues Drive Need for IoT Automation
Communications service providers (CSPs) are slowly adopting automated processes for their Internet of Things (IoT) network architecture, with more than 80% of CSPs who participated in this month's...
Move Securely to the Cloud: Gain the Advantages
Organizations can reap the full benefits of the cloud and avoid potential security risks by following four fundamental steps.
Industry Voices—Doyle: 5 myths about multi-access edge computing
Multi-access edge computing (MEC) is a network architecture that supports compute and storage capacity at the edge of the network. Proponents believe that MEC provides substantial performance...
AT&T's Gilbert: AI Critical to 5G Infrastructure
AI and machine learning are essential to scaling the deployment and configuration of the exploding numbers of cellsites needed for 5G, says Mazin Gilbert in the first of a two-part series.
Vodafone's Heeran: Time to move on from NFV; focus instead on cloud
Vodafone's Fran Heeran is pretty much done with NFV and ready to bear down on cloudifcation. Heeran took over the reins of Vodafone's virtualization effort in July of last year when he was hired...
Lean, Mean & Agile Hacking Machine
Hackers are thinking more like developers to evade detection and are becoming more precise in their targeting.
Fortinet Adds Network Access Control for IoT Security to Its Security Fabric
The company acquired NAC vendor Bradford Networks earlier this summer. Today it’s essentially rebranding Bradford’s technology as FortiNAC. Visit us at www.sdncentral.com for the complete...
Collaboration will be key for telcos in an era of shared 5G networks
The sheer cost of rolling out a nationwide 5G network may not be justifiable based on the potential returns any single operator will be able to generate.
Growing fangs: Immutable workloads and the tansforming telco (Reader Forum)
FANG – Facebook, Amazon, Netflix and Google – is taking a bite out of traditional service providers’ business. By competing with telecommunication service providers (telcos) to create and optimize...
How Some Service Providers Are Using SD-WAN the Wrong Way
Most current SD-WAN services are too limited in scope and too defensive in strategy, a veteran analyst warns.
Transforming legacy infrastructure into powerful and profitable next-generation cloud communications services (Reader Forum)
To quote the famous Rolling Stones song, “You can’t always get what you want, but you can get what you need.” That’s wisdom for communications service providers (CSPs) and the large, global...
AT&T, Verizon, T-Mobile and Sprint rally around security standard for IoT
U.S. wireless industry association CTIA announced a new security certification program targeting the IoT space.
Telecom networks under far greater malware pressure than global norm: Lastline
Telecommunications networks are a proving ground for cybercriminals and their malware, according to Lastline's Global Threat Intelligence Network.
Survey says: 12% of operators moving to commercial 5G deployment by year’s end
According to a poll by IHS Markit, 82% of operators rated ultralow latency as the chief technical driver for 5G, followed by decreased cost per bit (76%) and increased network capacity (71%).
Editor’s Corner—No quick fixes when it comes to VNF interoperability