Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions

Cybersecurity, or rather the lack thereof, dominated headlines throughout 2017. This isn’t likely to change in 2018, with GDPR just around the corner.

Charl van der Walt, Chief Security Strategy Officer at the UK’s largest independent cyber security company SecureData, shares his thoughts on the key trends that will impact cybersecurity next year.

Businesses are living on borrowed cyber time

The 2007 financial crisis brought to light just how interconnected today’s economy really is. All areas of business were affected, with exposure to debt being shared. The cybersecurity industry is no different. Security ‘debt’ is a liability or obligation to pay or render something. Technical Debt is already a well understood concept in software development, the cost of additional rework caused by choosing an easy solution now instead of using a better approach that would take longer or cost more. 

This translates well into security; not as the potential downside resulting from a decision to compromise, but as the direct, concrete, real-time and quantifiable cost of a trade-off between the best possible approach to securing something and the more attractive, practical, convenient or affordable approach. 

Security debt, can be compared to, monetary debt. If debt is not repaid, it can accumulate ‘interest’ and grows over time until it is repaid. It sits on a business’ balance sheet in big red letters for all the world to see, speaking to the very heart of the business, its value. If business have more liabilities in the form of security and other debt than it has assets, then you’re bankrupt and eventually you must fail.

In 2018 we may see the damaging effects of Security Debt that has been stacking up in the form of legacy code, 3rd party libraries and dependencies, and even architectures used by companies. This has been building up for the past 30 years, and may be catastrophic if the right set of circumstances come to pass. Companies have been living on borrowed security for too long, and 2018 may the year when those debts get collected.

Offense is the best defence

Governments globally have been reading up on von Clausewitz, Thucydides and Patton, before settling on Sun Tzu’s teachings to inform next-generation cyber capabilities and techniques that support national and international interests. 
As a result, we’ll see a rise in offensive cyber security with ability and budget beyond civilian imagination. Eventually, these techniques will find their way into the civilian internet, where they will wreak havoc, think Stuxnet and WannaCry, but on steroids. As the threat level escalates behind the weight of massive government investment, an industry-led clarion will herald a call for governments to protect a civilian Internet that cannot be expected to defend itself against military-grade threats. 
Throughout 2018 and beyond, business will accept and expect that their governments will take responsibility for national infrastructure defence, and policing in the cyber realm will become an extension of your Bobbies on the beat.

Cyber insurance becomes big business

GDPR fines come into play next year, and business is still running around in a mad panic. Nobody wants to be fined an inordinate amount of money for a data breach. This has led to a business area blossoming out of recognition that Government can only do so much when it comes to protecting business. Cyber insurance policies will come to the fore, and businesses will lap them up in an effort to plug the residual risk. The approach promises to remove uncertainty and angst from the issue of information security. 

Unfortunately, this will mean that businesses of all sizes will seek out the minimum cyber security investment laid out by insurers, government, and regulators, rather than going above and beyond to protect their own, and their customers’ data.

Cryptocurrency will get regulated

With new technologies there is often a fear of what is not understood. As cybercrime evolves, and hackers find new ways of monetising pre-existing attack methods, suddenly we see cryptocurrency and ransomware uttered in the same breath. In 2018, we might see governments the world over adopting cryptocurrency, and therefore regulating it in order to stem the flow of cryptocurrency-driven cybercrime. This will undoubtedly be a regulatory challenge, but to ensure a safer online ecosystem for business and consumers alike, it will be one that needs to be addressed.

It’s the beginnings of a cyber bloc party

As governments battle it out in cyberspace, the question of cyber balkanisation rears its head. In 2018, we will see an escalation of the drama around Kaspersky and the US government. 

The long-term implication of this could be game-changing. As governments globally take America’s lead and start rejecting security software, and then sensitive apps and entire operating systems on the grounds of National Security, we will inevitably see cyber balkanisation levels not seen since the Cold War. 

Smaller countries that don’t have their own security vendors, or can’t afford to build their own OS stacks will be forced to align with one major power or another, creating new blocs that will spell out the state of play sooner than we realise. How this will impact enterprise security is unknown, but we won’t be able to rule it out as an area for concern.

Information Security Buzz

You Might Also Read:

Cyber Security Insurance:

Bitcoin: UK And EU Will Crackdown On Crime & Tax Evasion:

Three Cybersecurity Trends Business Should Address:

Ransomware Analysis Suggests A  Bleak Future:
 

« UK Cybersecurity Firm Sophos Is Trouncing Silicon Valley
Iran Turns Off The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

Future Planet Capital

Future Planet Capital

Future Planet is the impact-led, global venture capital firm built to invest in high growth potential companies from the world's top research centres.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.