Hyperconnectivity driven by the rise of the digital-everything economy and the internet of things (IoT) will soon disrupt the cybersecurity landscape in a way that hasn’t been seen in the past—and organizations should act now to be prepared. That’s the assessment from The Information Security Forum (ISF)’s Threat Horizon 2019 report, which frames this year’s trends as setting the stage for much worse scenarios down the road. The rest of 2017, the report noted, will see the rise of more and more connected things, increasing sophistication in crime syndicates, an over-dependence on critical infrastructure and weaponized systemic vulnerabilities, all against a backdrop of crumbling legacy technology and global consolidation. All of that will mean that the impact of data breaches increases dramatically. “How an organization responds to today’s increasing cybersecurity threats will vary based on a number of factors, including its unique blend of people and skills, products and services offered and approach to risk management,” said Steve Durbin, managing director of the ISF. “However, an organization that is well-informed about emerging technologies and corresponding threats will be best placed to make winning decisions. The key differentiating factor will be the degree to which organizations are prepared to meet the challenges of a fully connected society.” That will be critical given the ISF’s expectations for next year. The report predicts that the IoT will continue to leak sensitive information, while opaque algorithms compromise integrity. Also, rogue governments will start to use terrorist groups to launch cyber-attacks, as criminal capabilities expand gaps in international policing. And, researchers will be silenced to hide security vulnerabilities while the cyber-insurance safety net is pulled away. Regulations will fragment the cloud. By 2019, organizations will be faced with a hyper-connected world where the pace and scale of change—particularly in terms of technology—will have accelerated substantially. ISF said that we’ll see premeditated internet outages bringing trade to its knees; ransomware hijacking the IoT; privileged insiders coerced into giving up the crown jewels; automated misinformation and falsified information that compromises performance; subverted blockchains that shatter trust; surveillance laws exposing corporate secrets; privacy regulations impeding the monitoring of insider threats; and a headlong rush to deploy artificial intelligence that will lead to unexpected outcomes. Navigating this calls for a strong collaborative culture with the right people congregating at the right time to play their part in ensuring success, the report postulates. In all, the document highlights nine major threats, broken down into three challenging themes that organizations can expect to face over the next two years as a result of increasing developments in technology: 1. Disruption: From an over reliance on fragile connectivity requiring a seismic shift in the way business continuity is planned, practiced and implemented. 2. Distortion: As trust in the integrity of information is lost, the monitoring of access and changes to sensitive information will become critical as will the development of complex incident management procedures. 3. Deterioration: When controls are eroded by regulations and technology bringing a heightened focus on risk assessment and management in the light of regulatory changes and the increased prevalence of artificial intelligence in everyday technology. “Traditional business models will certainly be disrupted over the next two years, forcing business leaders to develop cutting-edge trading models while dealing with new regulation, advanced technology and distorted information,” said Durbin. “With established controls rendered ineffective by the latest security threats, new and innovative ways must be found to protect an organization’s most critical information assets.” Some of the recommendations include changing up existing business continuity plans to engage with internal and external stakeholders to agree alternative methods of communication (e.g. telex, satellite, microwave); and lobbying for minimum security standards for IoT devices via regulation. Having a clear sense of who has access to which critical assets and how to manage that will be crucial; as will monitoring access and changes made to sensitive information, using tools such as a Federated Identity and Access Management (FIAM) systems and Content Management Systems (CMS). The ISF also recommends building collaboration across the organization, and conducting a risk assessment to understand the impact of metadata being lost by a communications provider. Businesses should also hire AI specialists now. “Moving forward, organizations must prepare themselves for unprecedented levels of collaboration,” said Durbin. “Legal, compliance, audit, HR, IT, information security and other stakeholders must congregate to assess risks and inform the decision-making process. This collaboration should be extended to partners, manufacturers, vendors and regulators to ensure information security requirements are met.”
Carriers’ 5G plans are Rooted in SDN/NFV, Says Ixia Survey
A new survey sponsored by Ixia reinforces the impression that telecommunications companies around the world...
Other content in this Stream
5 Emerging Technologies That 5G Positively Disrupt
In the next few years we will see the emergence of 5G network technology. Here are the five areas that will likely see the biggest impact.
Automation Makes Network Security a Much Bigger Priority
Automation will help companies meet customer demand and stay competitive, but it also makes the security stakes that much higher. Here are some key ingredients for a comprehensive network security...
CenturyLink charts its own virtualization pathway
When it comes to virtualization, CenturyLink is blazing its own trail by using software and tools that were developed in-house.
Kagan: Frontier AnyWare lets you manage your company from the cloud
Frontier Business is expanding their AnyWare business service offering. They let users manage their company’s usage through the Frontier Cloud. This service is growing into a fully integrated set...
Verizon’s wireless chief on 5G use cases: retail, manufacturing, gaming and more
The chief executive of Verizon’s wireless business offered a few more insights into the company’s 5G strategy.
Fortinet Secure SD-WAN Gives the Performance of a Lifetime, Recommended by NSS Labs
Fortinet is the only vendor with security capabilities to receive SD-WAN Recommended Rating in the first NSS Labs Software-Defined Wide Area Networking Test Report.
Accenture Strategy: Cost reduction should be a deep building block of planning
A report from Accenture Strategy counsels communications service providers to drastically adjust and deepen their cost-reduction strategies. Doing so will free up money for new services that are...
Why Problems With Service Chaining Are Stalling NFV
Since ETSI set standards for NFV six years ago, the technology has yet to reach its full potential as operators get stuck on physical limitations. Visit us at www.sdncentral.com for the complete...
SDN, NFV, 5G Part of AT&T’s 2018 Capex Splurge
“But once you get there those investments you are making to achieve that goal ebb out. They either come down or effectively stabilize,” said CFO John Stephens.
Fortinet and IBM Sign Cyber Threat Information Sharing Agreement
Fortinet and IBM Security have now announced that they will actively share cyber threat information.
CenturyLink's Anil Simlot on automation, SDN and NFV
CenturyLink's Anil Simlot has a lot on his plate now that he's the new leader of the telco's virtualization organization. Simlot, vice president of virtual services development and support, is now...
Smart home is $11.2bn opportunity, but are the telcos ready for it?
ABI Research estimates the smart home segment could potentially be worth in the region of $11.2 billion by 2022, but the diversification question still remains for the telcos.
AI and 5G go hand-in-hand for network operations
As network attacks get more sophisticated, AI can help with threat detection As it continues to develop, 5G will become increasingly complex. The need to deploy virtualized, programmable...
AT&T's Mazin Gilbert discusses game plan for next-generation networks
For Mazin Gilbert, vice president of advanced technology and systems at AT&T Labs, edge networking is just a piece of the larger networking puzzle that involves mobile applications, autonomous...
CenturyLink Gives Customers a Direct Link to IBM Cloud
CenturyLink is making it possible for its cloud customers to directly link to the IBM Cloud. This means that enterprises can bypass public internet.
Google intends to make GCP the most secure cloud platform
I attended my first Google Next conference last week in San Francisco and came away quite impressed. Clearly, Google is throwing its more and more of its engineering prowess and financial...
Fortinet Announces Enhancements to Our Security Services Portfolio
Fortinet's threat intelligence security subscriptions ensure that your Fortinet security solutions are tuned continuously with up-to-the-minute insight into threats occurring anywhere in the world...
AT&T's Gilbert discusses how to engineer an autonomous network
AT&T's Mazin Gilbert has a lot of balls in the air when it comes to juggling the telco's virtualization and open source initiatives. Gilbert, vice president of advanced technology, AT&T Labs, is...
Join Fortinet at Black Hat USA 2018 in Las Vegas
Join us in Las Vegas
Orange Business Services' John Isch: Think of security first when planning for SD-WAN services