12 Prédictions Majeures sur la Cyber Sécurité en 2017
Transcript of 12 Prédictions Majeures sur la Cyber Sécurité en 2017
Top 12 Predictions from LeadingCybersecurity Experts
ibm.co/cyberthreatanalysis
What’s in store for cybersecurity in 2017? With the increasing magnitude and frequency of cyber attacks, how can we stay ahead of
possible threats to counter and mitigate?
ibm.co/cyberthreatanalysis
“2017 will be the year of ‘hunt’ analysis, where organizations will proactively search through their network for threats versus having an alert to indicate a problem.”
Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis
The year of hunt analysis
ibm.co/cyberthreatanalysis
“We will see the proliferation of the Internet of Things as a tool to cause disruptions and attacks on critical infrastructure. More cyber attacks will become crimes that result in physical harm.”
Michael Goedeker, CEO and Founder HAKDEFNET and Security Researcher
IoT causes disruptions
ibm.co/cyberthreatanalysis
“Social media providers will continue to seek the right balance of cooperating with government and protecting their business reputation.”
Todd M. Rosenblum, Senior Executive for i2 Safer Planet
Cybersecurity and social media
ibm.co/cyberthreatanalysis
“Private sector companies will increasingly participate in military style ‘wargames’ to test the readiness of their cybersecurity organizations.”
Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis
Cybersecurity wargames
ibm.co/cyberthreatanalysis
“Rise of machines—more AI and cognitive technology will be implemented to make up for the shortfall in trained and experienced cybersecurity professionals.”Morgan Wright, Cyber Terrorism and Cyber Crime Analyst
Rise of cognitive in cybersecurity
“New cognitive behavior tracking capabilities will help reduce elevated privilege abuse and insider threat.”Shahid Shah, CEO at Netspective Communications, Cybersecurity and Risk Consultant
ibm.co/cyberthreatanalysis
“Zero-day exploit value on the dark web will far exceed the amount that companies are willing to pay for ‘bug bounties’ due to the overall value of data amassed.”
Scott N. Schober, CEO Berkeley Varitronics Systems, Inc. and Author Hacked Again
Zero-day exploit
ibm.co/cyberthreatanalysis
“The security versus convenience debate will enter the public eye as high-profile companies suffer incidents that could have been prevented with two-factor or strong passwords.”
Tyler Carbone, COO at Terbium Labs
Security vs. convenience debate
ibm.co/cyberthreatanalysis
“Huge DDoS attacks coinciding with fake news tweets about a major data breach and unreliable, but viral, social media posts and sloppy tech reporting by a few bloggers and media sites will cause a significant, but temporary, drop in select stocks. The hidden goal of the hackers: manipulation of stock prices for financial gain.”
Dan Lohrmann, Chief Strategist and Chief Security Officer at Security Mentor, Inc.
Hackers use fake news
ibm.co/cyberthreatanalysis
“Trust in systems will be broken as bad guys move from just exfiltrating data to changing it.”
Caleb Barlow, Vice President of IBM security
Trust will be broken
ibm.co/cyberthreatanalysis
“Companies will seek to quantify the costs and benefits of new technologies versus cost and likelihood of a breach, as information security becomes less an IT problem and more a risk management problem.”
Tyler Carbone, COO at Terbium Labs
Rise of cyber risk management
ibm.co/cyberthreatanalysis
“Many custom services in healthcare, retail and financial depend on knowing customers and anticipating their future needs. But personalization data can lead to loss of privacy and increased security risks. The pressure to balance these three sometimes conflicting requirements will increase significantly in 2017.”
Diana Kelley, Global Executive Security Advisor, IBM
Pressure to balance privacy, personalization and security
ibm.co/cyberthreatanalysis
“Industries such as energy and utilities, manufacturing and supply chains have remained relatively isolated from major cyber attacks. This is about to change.”
Michael Kehoe, WW Program Director, IBM
Cyber attacks spread
Be acutely aware of the threatscape and equip yourself to predict, mitigate
and counter cyber attacks: ibm.co/cyberthreatanalysis