No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

7 Cybersecurity Predictions for 2018

by Nick Son
February 8, 2018
in Data Privacy, Featured
digital padlock above tablet

The Inherent Risk (and Reward) of Innovation

This year, cybersecurity officers must rethink their end-to-end security ecosystem. Top priority will be identifying and addressing evolving vulnerabilities to people, processes, technologies and service providers. It’s time both to re-evaluate the overarching security strategy and to take a more security-minded approach from the outset – before deploying any solution or architecture.

Emerging trends such as artificial intelligence (AI) and machine learning are seeping into virtually everything technological. Other trends focus on blending the digital and physical worlds to create an immersive, digitally enhanced environment. Still others refer to exploiting connections between an expanding set of people and businesses, as well as devices, content and services to deliver digital business outcomes.

Technology innovation is a double-edged sword, and some would even say that the pace of technology is impacting the pace of human evolution. While there may be additional philosophical or moral questions regarding the aggressive pace and change inherent in technological advancement — which I won’t address here — it marches forward, and we need to actively monitor its progress and impact on our lives.

Human beings are creatures of comfort, but looking to technology to make our lives easier can have negative consequences. We are constantly searching for new and efficient ways technology can support our lifestyles. As we continue to innovate and nurture new technologies, we also encounter new security risks.

In 2018, cybersecurity officers will be forced to rethink their end-to-end security ecosystem to pinpoint evolving vulnerabilities that span people, process, technology and service providers. They will need to both evaluate their holistic security strategy and begin thinking of security from the outset – before deploying any solution or architecture. Most likely, new technologies such as AI, machine learning and IoT will be on top of existing systems, potentially exposing legacy investments (such as industrial machines) to new vulnerabilities. Security professionals will need to anticipate vulnerabilities and risks across a more complex and distributed technology landscape than ever before.

Below are Coalfire’s cybersecurity trends and predictions for 2018:

#1: Attacks on Health Care Will Increase

There’s a perception that health care breaches have become “par for the course,” and that this is an industry that needs to reassess their tools, techniques and teams, which are not adequately advancing with the growing threats. Companies in the health care industry need to reassess their points of vulnerability, which means looking at basic policies, reassessing security spend prioritization and evaluating how information is accessed and protected.

#2: IoT / Connected Devices Will Accelerate Risk

Devices are being IP-enabled at a breakneck pace, which is introducing a plethora of security challenges as components are sourced and assembled from disparate suppliers along an increasingly global supply chain. While IoT-sourced attacks have been relatively limited, it is inevitable that these attacks will escalate. We believe there will be a heavier focus on IoT security, putting the focus on IoT device configurations and communication protections. This will protect businesses from data leakage and disruptions and reassure consumers that they aren’t bringing security threats into their homes and lives. Given the increasing complexity, regulators will focus on the insecurity of IoT to build standards and provide guidance.

#3: Compliance Will Remain a Focus

Like it or not, cybersecurity compliance is a large force in the market, and it’s here to stay. The soon-to-be-enforceable General Data Protection Regulation (GDPR) is a great example. Some security professionals believe – at times, rightfully – that certification or passing a compliance assessment does not necessarily equate to good security. We believe that compliance and privacy regulations will continue to proliferate, and companies will not only need to meet new compliance requirements, but also go beyond compliance to align security with risk to meet rising cyber risk levels.

#4: The Need for Cloud-Based Disaster Recovery Plans Will Grow

Businesses will continue to accelerate their dependence on cloud technologies, and it’s critical to consider the security implications of this trend. In particular, as more mission-critical workloads are hosted off premises than ever before, a strong cloud-based disaster recovery plan is a must, and companies will need to prioritize the development of such a plan if they do not already have one in place.

#5: Cryptocurrency Hacks Will Increase

The cryptocurrency market is still immature. With the high-profile nature of this speculative market and association with cybercrime and other illegal activity, it is an attractive area for hackers to target. Several cryptocurrency markets have already been hacked, and this trend may increase in the years ahead.

#6: Malware Will Get Agile

New malware strains will incorporate artificial intelligence and machine learning to improve their malicious penetration over time. Of course, this means that cybersecurity solutions providers will continue to up the ante by integrating more AI into security solutions.

#7: Skilled People Will Be Critical to Meeting Threats

In an era where everyone is looking toward automation, don’t underestimate the importance of skilled people. Smart people are needed to defend against smart criminals. Cyber risk assessments, penetration testing and “red teaming” will continue to be critical components of counterintelligence in the cybersecurity war. Companies in all industries are advised to hire and partner with the most creative thinkers in the industry who understand not only security, but also the specific cyber risk and technology trends facing your industry. There is no substitute for human talent on the proactive security end of the battle.


Tags: Artificial Intelligence (AI)CryptocurrencyCyber RiskCybercrimeGDPRInternet of Things (IoT)Machine Learning
Previous Post

SMU Launches Multidisciplinary Ethics and Compliance Certificate Program

Next Post

Are We Winning the Battle Against Bribery and Corruption?

Nick Son

Nick Son

Nick Son is VP of Cyber Risk Service at Coalfire, a trusted provider of independent, comprehensive cybersecurity advisory service. He leads a diverse team specializing in enterprise risk management, security engineering and compliance management. His focus is to help clients design optimal enterprise cybersecurity governance frameworks, engineer secure and cost-effective solutions and achieve regulatory compliance.

Related Posts

AU10TIX 2026 Fraud Signals Report

2026 Fraud Outlook Report

by Corporate Compliance Insights
January 16, 2026

Fraud detection in the AI era Special edition report AU10TIX Global Identity Fraud Report Q4 2025 What's in this report...

Allianz Risk Barometer 2026

2026 Risk Barometer

by Corporate Compliance Insights
January 16, 2026

The business risks defining 2026 Annual risk report Allianz Risk Barometer 2026 What's in this report by Allianz Commercial: The...

sharks digital risk concept

2026 Operational Guide to Cybersecurity, AI Governance & Emerging Risks

by Rebeca Vergara Gaona
January 16, 2026

AI has shifted from an emerging fintech area to a clear operational risk linked to cybersecurity and disclosures

news roundup data grungy

Regulatory Penalties Dropped in ’25, Led by Sharp US Decline

by Staff and Wire Reports
January 15, 2026

Political instability driving global divergence in employment rules

Next Post
concept of the world at war

Are We Winning the Battle Against Bribery and Corruption?

reminder to speak up
No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights