Hyperconnectivity driven by the rise of the digital-everything economy and the internet of things (IoT) will soon disrupt the cybersecurity landscape in a way that hasn’t been seen in the past—and organizations should act now to be prepared. That’s the assessment from The Information Security Forum (ISF)’s Threat Horizon 2019 report, which frames this year’s trends as setting the stage for much worse scenarios down the road. The rest of 2017, the report noted, will see the rise of more and more connected things, increasing sophistication in crime syndicates, an over-dependence on critical infrastructure and weaponized systemic vulnerabilities, all against a backdrop of crumbling legacy technology and global consolidation. All of that will mean that the impact of data breaches increases dramatically. “How an organization responds to today’s increasing cybersecurity threats will vary based on a number of factors, including its unique blend of people and skills, products and services offered and approach to risk management,” said Steve Durbin, managing director of the ISF. “However, an organization that is well-informed about emerging technologies and corresponding threats will be best placed to make winning decisions. The key differentiating factor will be the degree to which organizations are prepared to meet the challenges of a fully connected society.” That will be critical given the ISF’s expectations for next year. The report predicts that the IoT will continue to leak sensitive information, while opaque algorithms compromise integrity. Also, rogue governments will start to use terrorist groups to launch cyber-attacks, as criminal capabilities expand gaps in international policing. And, researchers will be silenced to hide security vulnerabilities while the cyber-insurance safety net is pulled away. Regulations will fragment the cloud. By 2019, organizations will be faced with a hyper-connected world where the pace and scale of change—particularly in terms of technology—will have accelerated substantially. ISF said that we’ll see premeditated internet outages bringing trade to its knees; ransomware hijacking the IoT; privileged insiders coerced into giving up the crown jewels; automated misinformation and falsified information that compromises performance; subverted blockchains that shatter trust; surveillance laws exposing corporate secrets; privacy regulations impeding the monitoring of insider threats; and a headlong rush to deploy artificial intelligence that will lead to unexpected outcomes. Navigating this calls for a strong collaborative culture with the right people congregating at the right time to play their part in ensuring success, the report postulates. In all, the document highlights nine major threats, broken down into three challenging themes that organizations can expect to face over the next two years as a result of increasing developments in technology: 1. Disruption: From an over reliance on fragile connectivity requiring a seismic shift in the way business continuity is planned, practiced and implemented. 2. Distortion: As trust in the integrity of information is lost, the monitoring of access and changes to sensitive information will become critical as will the development of complex incident management procedures. 3. Deterioration: When controls are eroded by regulations and technology bringing a heightened focus on risk assessment and management in the light of regulatory changes and the increased prevalence of artificial intelligence in everyday technology. “Traditional business models will certainly be disrupted over the next two years, forcing business leaders to develop cutting-edge trading models while dealing with new regulation, advanced technology and distorted information,” said Durbin. “With established controls rendered ineffective by the latest security threats, new and innovative ways must be found to protect an organization’s most critical information assets.” Some of the recommendations include changing up existing business continuity plans to engage with internal and external stakeholders to agree alternative methods of communication (e.g. telex, satellite, microwave); and lobbying for minimum security standards for IoT devices via regulation. Having a clear sense of who has access to which critical assets and how to manage that will be crucial; as will monitoring access and changes made to sensitive information, using tools such as a Federated Identity and Access Management (FIAM) systems and Content Management Systems (CMS). The ISF also recommends building collaboration across the organization, and conducting a risk assessment to understand the impact of metadata being lost by a communications provider. Businesses should also hire AI specialists now. “Moving forward, organizations must prepare themselves for unprecedented levels of collaboration,” said Durbin. “Legal, compliance, audit, HR, IT, information security and other stakeholders must congregate to assess risks and inform the decision-making process. This collaboration should be extended to partners, manufacturers, vendors and regulators to ensure information security requirements are met.”
Carriers’ 5G plans are Rooted in SDN/NFV, Says Ixia Survey
A new survey sponsored by Ixia reinforces the impression that telecommunications companies around the world...
Other content in this Stream
Vodafone, IBM hook up for 5G and cloud-based systems for businesses
Vodafone and IBM have forged a partnership to offer business services and applications that leverage the cloud, IoT, AI and 5G connectivity.
IBM, Vodafone Strike $550M Cloud Deal
US tech giant and UK telco team up to provide cloud and networking services to European business customers.
How 5G can unlock IoT's potential | ZDNet
The Internet of Things will involve an astounding amount of data—and the next generation of wireless communications could play a key role.
The Security Implications for 5G and IoT
With literally billions of IoT devices interconnected across a meshed edge environment, any device can become the weakest link in the security chain and expose the entire enterprise to risk....
Sprint Looks Ahead at 2019 to Broaden Its Managed SD-WAN Service
The provider is looking to bring in additional SD-WAN vendors and build universal CPE in 2019. Visit us at www.sdncentral.com for the complete article.
Will Emerging Threats Tip the Scales?
The traditional process of identifying a threat and then developing a counter defense, or even attempting to anticipate and neutralize new attack strategies, are becoming obsolete.
Fighting the Evolution of Malware
Malware is becoming increasingly destructive. This blog is a short history of this trend, along with steps organizations can take to combat it.
Not Business as Usual: Open Source Changes IT Operations
Open source doesn't just change software: It changes how IT does its job.
AT&T Expands Edge Computing Testing to Enterprise Use Cases
The carrier sees its 5G network technology and edge computing designs as useful to power everything from autonomous driving to video monitoring in smart cities.
Colt launches cloud-based Microsoft portfolio of services
Colt Technology Services announced on Thursday that it's blending its voice and data networks with Microsoft's suite of products for enterprise customers.
AT&T's New Nationwide, Mobile 5G Timeline
The carrier said it would offer nationwide 5G services by 2020 and its spectrum choice reveals some critical details about its coverage plans and its ability to compete with T-Mobile.
Redefining the Cloud and Cloud Security
While the business advantages of the cloud are significant, rapid migration is also introducing complexities and risks that few organizations have adequately prepared for—right at a time when the...
CES 2019: Sprint pairs Curiosity IoT with 5G to power smart cities, autonomous vehicles | ZDNet
Sprint is combining its Curiosity IoT platform and its 5G mobile network to power a smart city in South Carolina and an autonomous vehicle test track in Georgia, and to launch more precise mapping...
The new ways we could get hacked (and defended) in 2019
Experts from the NSA and Darktrace discuss AI, invisible security, and why you really need to change your passwords.
Containers are a work in progress for some telcos
Last year, Kubernetes took center stage in the telecommunications industry as the primary means for managing containers, but there's still work to do. The use of containers is already underway by...
Our Customers Emphasize the Value of FortiGate Secure SD-WAN in Gartner Peer Insights Reviews
Modern SD-WAN solutions not only need to offer uninterrupted application agility and simplicity, but they must also be reinforced with security features. Learn what customers have said about...
IoT: Living on the Edge
Where is your data when you need it? Edge computing offers an alternative to processing all data in the cloud or the data center.
2019: SD-WAN market continues to flourish, but changes are afoot
Using the proverbial hockey-stick analogy, SD-WAN will continue to move upward in 2019, but a maturing market will bring on some changes. There are plenty of fast-track growth numbers out there...
Top telco executives make their 2019 predictions
With 2018 rapidly heading toward the rearview mirror, it's time to take a look at what might be coming down the road in 2019.
Masergy's Ray Watson: Customers Want Security but Pay for Performance