No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

7 Cybersecurity Predictions for 2018

by Nick Son
February 8, 2018
in Data Privacy, Featured
digital padlock above tablet

The Inherent Risk (and Reward) of Innovation

This year, cybersecurity officers must rethink their end-to-end security ecosystem. Top priority will be identifying and addressing evolving vulnerabilities to people, processes, technologies and service providers. It’s time both to re-evaluate the overarching security strategy and to take a more security-minded approach from the outset – before deploying any solution or architecture.

Emerging trends such as artificial intelligence (AI) and machine learning are seeping into virtually everything technological. Other trends focus on blending the digital and physical worlds to create an immersive, digitally enhanced environment. Still others refer to exploiting connections between an expanding set of people and businesses, as well as devices, content and services to deliver digital business outcomes.

Technology innovation is a double-edged sword, and some would even say that the pace of technology is impacting the pace of human evolution. While there may be additional philosophical or moral questions regarding the aggressive pace and change inherent in technological advancement — which I won’t address here — it marches forward, and we need to actively monitor its progress and impact on our lives.

Human beings are creatures of comfort, but looking to technology to make our lives easier can have negative consequences. We are constantly searching for new and efficient ways technology can support our lifestyles. As we continue to innovate and nurture new technologies, we also encounter new security risks.

In 2018, cybersecurity officers will be forced to rethink their end-to-end security ecosystem to pinpoint evolving vulnerabilities that span people, process, technology and service providers. They will need to both evaluate their holistic security strategy and begin thinking of security from the outset – before deploying any solution or architecture. Most likely, new technologies such as AI, machine learning and IoT will be on top of existing systems, potentially exposing legacy investments (such as industrial machines) to new vulnerabilities. Security professionals will need to anticipate vulnerabilities and risks across a more complex and distributed technology landscape than ever before.

Below are Coalfire’s cybersecurity trends and predictions for 2018:

#1: Attacks on Health Care Will Increase

There’s a perception that health care breaches have become “par for the course,” and that this is an industry that needs to reassess their tools, techniques and teams, which are not adequately advancing with the growing threats. Companies in the health care industry need to reassess their points of vulnerability, which means looking at basic policies, reassessing security spend prioritization and evaluating how information is accessed and protected.

#2: IoT / Connected Devices Will Accelerate Risk

Devices are being IP-enabled at a breakneck pace, which is introducing a plethora of security challenges as components are sourced and assembled from disparate suppliers along an increasingly global supply chain. While IoT-sourced attacks have been relatively limited, it is inevitable that these attacks will escalate. We believe there will be a heavier focus on IoT security, putting the focus on IoT device configurations and communication protections. This will protect businesses from data leakage and disruptions and reassure consumers that they aren’t bringing security threats into their homes and lives. Given the increasing complexity, regulators will focus on the insecurity of IoT to build standards and provide guidance.

#3: Compliance Will Remain a Focus

Like it or not, cybersecurity compliance is a large force in the market, and it’s here to stay. The soon-to-be-enforceable General Data Protection Regulation (GDPR) is a great example. Some security professionals believe – at times, rightfully – that certification or passing a compliance assessment does not necessarily equate to good security. We believe that compliance and privacy regulations will continue to proliferate, and companies will not only need to meet new compliance requirements, but also go beyond compliance to align security with risk to meet rising cyber risk levels.

#4: The Need for Cloud-Based Disaster Recovery Plans Will Grow

Businesses will continue to accelerate their dependence on cloud technologies, and it’s critical to consider the security implications of this trend. In particular, as more mission-critical workloads are hosted off premises than ever before, a strong cloud-based disaster recovery plan is a must, and companies will need to prioritize the development of such a plan if they do not already have one in place.

#5: Cryptocurrency Hacks Will Increase

The cryptocurrency market is still immature. With the high-profile nature of this speculative market and association with cybercrime and other illegal activity, it is an attractive area for hackers to target. Several cryptocurrency markets have already been hacked, and this trend may increase in the years ahead.

#6: Malware Will Get Agile

New malware strains will incorporate artificial intelligence and machine learning to improve their malicious penetration over time. Of course, this means that cybersecurity solutions providers will continue to up the ante by integrating more AI into security solutions.

#7: Skilled People Will Be Critical to Meeting Threats

In an era where everyone is looking toward automation, don’t underestimate the importance of skilled people. Smart people are needed to defend against smart criminals. Cyber risk assessments, penetration testing and “red teaming” will continue to be critical components of counterintelligence in the cybersecurity war. Companies in all industries are advised to hire and partner with the most creative thinkers in the industry who understand not only security, but also the specific cyber risk and technology trends facing your industry. There is no substitute for human talent on the proactive security end of the battle.


Tags: Artificial Intelligence (AI)CryptocurrencyCyber RiskCybercrimeGDPRInternet of Things (IoT)Machine Learning
Previous Post

TRACE: Doping at the Olympics

Next Post

Are We Winning the Battle Against Bribery and Corruption?

Nick Son

Nick Son

Nick Son is VP of Cyber Risk Service at Coalfire, a trusted provider of independent, comprehensive cybersecurity advisory service. He leads a diverse team specializing in enterprise risk management, security engineering and compliance management. His focus is to help clients design optimal enterprise cybersecurity governance frameworks, engineer secure and cost-effective solutions and achieve regulatory compliance.

Related Posts

ftx arena miami

2023: The Year of Crypto Compliance

by Ben Richmond
January 11, 2023

The November collapses of FTX and BlockFi, two of the world’s biggest cryptocurrency exchanges, were shocking — and devastating for...

cisa website

What Can Your Organization Learn From the New CISA Strategic Plan?

by FTI Consulting
January 11, 2023

Cyber threats against organizations of all sizes are only rising as scammers and fraudsters become more and more sophisticated. Kyung...

data minimization practices_w

Ransomware Threats Are Growing. How Can Boards Protect Mission-Critical Assets?

by Jim DeLoach
December 14, 2022

As the sophistication level of cyber attackers continues to rise, there’s probably not a business on Earth that isn’t at...

dirty words

For Cybersecurity Teams, ‘Audit’ Doesn’t Have to Be a Dirty Word.

by Troy Fine
December 7, 2022

Let’s face it: Nobody wants to be audited. For the average Joe, an IRS audit is a hassle (at best)....

Next Post
concept of the world at war

Are We Winning the Battle Against Bribery and Corruption?

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT