Security Trends For 2022 - The Need For Talent & Cloud Migration

It’s been another challenging 12 months in cyber security with several major breaches during an already turbulent year. 
 
We saw the damaging ransomware attack on Colonial Pipeline, one of most high profile security stories of the year. The attack shut down a 5,500-mile-long pipeline on the east coast of the US, fueling fears over risks to critical infrastructure and global supply chains. 

 
In May, we saw President Biden sign an executive order designed to tackle the nation’s cybersecurity issues head-on, including supply chain security, and, perhaps the most important order of business, a call for government agencies to adopt a zero trust approach.
 
It’s also been the year of crypto currencies, deepfake technology and growth in fraud and scams associated with the pandemic.
 
As we look ahead to another 12 months in the industry, we focus on two trends for 2022.

1. Impact Of The Talent Shortage 

Microsoft  announced a partnership recently with community colleges around the US to provide free resources in an attempt to help end the shortage in cybersecurity professionals by 2025. The question is whether this shortage of readily available talent will impact the security industry over the next year or so and how technology can help to mitigate this. 
 
In the immediate future, the talent shortage will remain a problem. We have found this ourselves. It is getting better, but more investment is needed. People are recognising that security is an interesting and lucrative career, but there aren’t enough people and I think there will always be a struggle to keep up with growing demand. 
 
Look at it from a technology perspective, and it stands to reason that if there are less security incidents to manage, there is less need to recruit new talent into the industry and the impact of the talent shortage will be greatly reduced. 
 
We need to give them the tools that they were hiring services to do in the first place. The shortage is not going away any time soon so solutions need to be built around it. Better solutions will mean fewer incidents.
 
We need automation of solutions and automatic remediation. These tools will need to adapt to changing environments and to be built with a more holistic approach in mind, off-premises, on-premises, in the cloud and in a hybrid environment as work models evolve. 
 
All of this falls under the umbrella of zero trust, and this is the blueprint that businesses should be using as the building blocks to robust security. 
 
2. A Move To The Cloud Will Finally Happen 

While other industries moved operations to the cloud some time ago, there has been some hesitation to shift away from on-premises operations for security leaders. 
 
With the increase in sophisticated threats coming through as many employees work remotely, security leaders can no longer depend on legacy systems for protection, but instead need to shift to cloud native solutions. Factors, such as the increase in ransomware attacks, may influence more security leaders to finally move to cloud based solutions. 
 
But what will drive people and businesses to move to the cloud is the need to do security better. It stands to reason that if they need to improve their approach with security then the cloud is almost certainly going to be the way to go.
 
We are also seeing the pendulum beginning to swing in the favour of the user experience. The emphasis is on how you can carry out your job without negatively impacting the workflow processes and the device choice for the end user. Users must be able to work as and when they expect to and as fast as usual, but security is still implemented. 
 
This points all to the cloud because you need that scalability, you need that global view, device coverage, and you need to be in between the end user and the cloud services that they are accessing. 

Mark Guntrip is Senior Director, Cybersecurity Strategy at Menlo Security

You Might Also Read:

Cyber Security In 2022:

 

« Are Remote Contractors A Cyber Security Risk?
Education Should Focus On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.