Five Cyber Security Predictions for 2016

Information security and risk management professionals will rebel against cookie-cutter approaches to cyber security in 2016, that’s just one of many ways that prevention, detection and response to cyber threats will change in the next year, according to a new report from Forrester Research.

“Security investments based on a checklist of technology required to meet compliance fails to address underlying or existing vulnerabilities,” Forrester authors Rick Holland and Heidi Shey contend. “Assess the maturity of your security program to build a strategic road map to reach higher levels of maturity, and identify existing gaps and centers of excellence.” In particular, Forrester gives five cybersecurity predictions and resulting actions to be taken in 2016:

We’ll See Ransomware for a Medical Device or Wearable
Security and risk professionals should focus on the human factor to combat phishing; identify data assets and access paths to understand the types of data that wearables and Internet of Things devices are collecting; secure data collection as well as data analysis points, starting with medical devices collecting data and continuing to the location where analysis occurs; and re-examine existing security functions through an Internet of Things lens.

The US Government Will Experience Another Significant Breach
Forrester gives a bleak assessment of the government’s security capabilities. “It will be cyber security as usual for the U.S. government, with lower morale as federal employees question the government’s ability to protect sensitive data and hire qualified cyber security experts.” In short, the government is short-staffed, under-budgeted and lacking internal discipline.

Security and Risk Pros Will Increase Spending on Prevention by 5 to 10 Percent
“You may have heard claims that prevention is dead,” according to Forrester. “This couldn’t be farther from the truth.” The firm recommends investing in new varieties of prevention that employ “exploit” prevention techniques; being skeptical of vendors that offer only detection technologies; and maximizing existing detection capabilities before investing in new ones.

Defense Contractors Will Fail to Woo Private Industry with ‘Military Grade’ Security
Contractors see a big opportunity in the commercial sector and have been buying up complementary companies, but have difficulty understanding private-sector requirements and dynamics, according to Forrester. “Many assume that purchase orders will rain down from the heavens with the mere mention of statements like, ‘We’ve been fighting the advanced persistent threat for 15 years.’” So, question defense contractors about their commercial experience, see through the ‘Military Grade’ claims as a higher tier product, because that isn’t a given (see F-35 Joint Strike Fighter jet), and understand that a long-term commitment to commercial markets is a traditional concern when working with defense contractors.”

HR Departments Will Offer Identity and Credit Protection as an Employee Benefit
“Keeping up with the times, potential challenges associated with fighting fraud, identity theft, medical identity theft and damage to personal online reputation will drive HR pros to bring in identity and credit protection and resolution services as an employee benefit,” Forrester notes. So, build a closer relationship with HR, and revamp and jumpstart your security awareness program.

Information-Management: http://bit.ly/1TkwPkU

 

« N. Korea Employs Grads for Cyber Warfare
OPM Hack Was Criminal - Not China Government Sponsored »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.