Header Ads

Cyber Security Trends in 2017

By Vikas Kapoor, Practice Head - Cyber Security at In2IT Technologies

In 2016, data breaches continued to take place across government, financial, healthcare, technology, education, retail, and other industries. A quick view of databreachlevelindex.com shows that daily on an average four million data records were stolen or lost, across the globe. This is a very alarming and a growing number especially for cyber security professionals, irrespective of whether they work at a strategic, tactical, or operational level in any organization. Such incidents have led to significant losses – financial, data, reputational, others, and because of these – at times even job losses. In the recent past, security professionals have realized that the defenses of the past are incomplete given the significant change in threat landscape because of significant high-speed advancement in technologies.



So what are organizations and security professionals thinking to do in 2017?

In 2017, many organizations will conduct a Comprehensive Security Program Assessment to take a relook at their entire cyber security across people, processes, and products. As an outcome of the assessment, following will be factored in the roadmap of cyber security.

Technology: New products will penetrate the market

Cyber security industry has seen several waves in terms of adoption of security products. The first wave was of host and network defense with mostly anti-virus, firewalls, intrusion detection systems, URL filtering, and email filtering. The second wave was mostly about access control and security testing with user/privilege access management, 2-factor authentication, PKI, vulnerability assessment, and penetration testing. The recent ongoing one is more specialized in nature - security information and events management (SIEM), data loss prevention (DLP), threat intelligence, end point protection (including MDM), web application firewalls (WAF), among others.



In 2017 and beyond, organizations will see new type of security products coming extensively in the market. In last two years, US and Israel based security companies have seen a lot of investment activity. There is heightened private equity investment in cyber security in addition to large security companies acquiring niche players. In 2017, organizations will see the following security products being actively getting into the system:

·         Bug Bounty Platforms
·         Crowd Security Intelligence Platform
·         Cyber Ranges
·         Hunt Operations Platform
·         Website Defacement Monitors
·         Incident Response Platform
·         Breach Detection Platform
·         Social Media Security Platform
·         Cognitive Security Platform


As such, organizations should evaluate fitment of new security products in their portfolio of defense in their cyber security roadmaps.



People: Co-sourcing ‘variable’ cyber security talent will become central



If we create a list of type of security product, their vendors, and the specific security product of those vendors, the list becomes very large. As a simple example, let’s take firewalls. Gartner’s magic quadrant has 15 firewall vendors within which there are umpteen number of firewall products. Chances are that your organization would be using Palo Alto, CheckPoint, Cisco, or Fortinet. Others would be using any of the remaining 11. Finding talent to manage these firewalls isn’t that difficult. However, once you add the full landscape of security products that your organization has or might procure – intrusion detection systems, endpoint protection, mobile device security, web application firewalls, security information and events management, data loss protection, vulnerability assessment, threat intelligence, and many others that will be seen in near future – the search for right security talent becomes very difficult.



Add to this the vast regulatory and industry compliance knowledge required – PCI/DSS, Sarbanes-Oxley, data privacy, ISO27001, HIPAA, NIST, and many others – the talent search (and then talent retention!) becomes very tiring for management. Further making matters worse is the ever-evolving cyber security both in offense and in defense. Managing all this within organizational budgets becomes extremely difficult for a CIO/CISO.

As such, in 2017, organizations will increase co-sourcing especially around new technologies and for those that are labor intensive (such as SIEM, DLP, VA/PT). By effective use of co-sourcing organizations can have a very balanced mix of cost and control, unlike in the otherwise heave internal or completely outsourced models. The co-sourcing models in cyber security are changing with partners open to ideas of ‘variable security resources’ i.e. ones where SMEs become available on need basis. For example, if your organization has two sequential projects of a SIEM and DLP that would require partner resources, partners are now more open to provide say a SIEM Alert Analyst now and a DLP Expert later under the same annual contract. Organizations which will make use of co-sourcing effectively in 2017, will have an edge over their peer organizations.

Policies, processes, and procedures: Automation will be key

Policies, standards, processes, and procedures are key to any organization. Over the years, the IT service delivery and management industry has matured a lot with most of the processes automated by either custom development or by adoption of ITSM tools. Similarly, the earlier governance, risk, and compliance industry which used piles of papers to demonstrate risks, controls, test of design of controls, test of operating effectiveness of controls, among others, got streamlined with advent of operational risk tools such as Archer. 





The cyber security industry will go through similar change in 2017 and beyond. For example, if we take an incident management policy, process, and procedure of say ten global organizations, chances are that they would vary significantly. However, this will change. Incident Management Platforms will see a lot of proliferation in 2017. Similarly, entire security operations centers will see a lot of automation overall in terms of the processes as an example around “Responding” to cyber-attacks.

Conclusion

Overall, with the changes in offense and defense of cyber security across technology, legal, regulatory, geo, political, and other changes, 2017 will also see a lot of change. It becomes an imperative to take a holistic, fresh look at your organization to by taking the first step of conducting a Comprehensive Security Program Assessment to create a roadmap for next two to three years.

95 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. Most of the time I don’t make comments on websites, but I'd like to say that this article really forced me to do so. Really nice post! tech blogs

    ReplyDelete
  3. This robot is a merging of innovation - mechanical technology, sensors, self-rulingly prescient examination, warm imaging, and possibly a couple of progressively innovative "things" that the maker presently can't seem to freely uncover. tech ethics

    ReplyDelete
  4. I can’t believe focusing long enough to research; much less write this kind of article. You’ve outdone yourself with this material without a doubt. It is one of the greatest contents. arris sb8200

    ReplyDelete
  5. We are really grateful for your blog post. You will find a lot of approaches after visiting your post. I was exactly searching for. Thanks for such post and please keep it up. Great work. light therapy lamp

    ReplyDelete
  6. I've been looking for info on this topic for a while. I'm happy this one is so great. Keep up the excellent work Antminer S19 Pro 110 Review

    ReplyDelete
  7. The element which makes this blog unique is the optimism seen throughout.
    Arsprojecta

    ReplyDelete
  8. With its WiFi & 3G Web connection, the iPhone is a impressive gadget for keeping up to date with all the latest news and current affairs, and here are 4 topmost ways of receiving the newest information. Sky News App. The Sky News App presents up to date news to your iPhone, using a streamline and attractive Interface. Categories run along the top of the interface and are changed between with a touch, and the news articles in each category appear with a thumbnail picture down the interface, it's an Interface which works great.ventarticle

    ReplyDelete
  9. In any case, it is imperative to direct an intensive record verification before recruiting the administrations of any security organization.
    security guard for construction site

    ReplyDelete
  10. This article is a connecting with wealth of accommodating educational that is intriguing and exquisitely formed. I perceive your troublesome work on this and thank you for this information. I know it very well that if anyone visits your blog, by then he/she will undeniably come back to it.



    impresoras

    ReplyDelete
  11. Great Article Cyber Security Projects projects for cse Networking Security Projects JavaScript Training in Chennai JavaScript Training in Chennai The Angular Training covers a wide range of topics including Components, Angular Directives, Angular Services, Pipes, security fundamentals, Routing, and Angular programmability. The new Angular TRaining will lay the foundation you need to specialise in Single Page Application developer. Angular Training

    ReplyDelete
  12. One of the biggest security costs to business is human security officers (guards). No one knows for sure, 24response but it has been estimated that there are at least 2-million security guards providing guard functions in the USA.

    ReplyDelete
  13. The Council has similar powers as are vested in a Common Court for requiring the disclosure and creation of records, getting proof on oaths.it companies perth

    ReplyDelete
  14. However, there are some legitimate purposes to learning hacking techniques. The US government is training hackers to engage in the so called "How to hire a cybersecurity expert".

    ReplyDelete
  15. I am looking for and I love to post a comment that "The content of your post is awesome" Great work! Cryptocurrency

    ReplyDelete
  16. No other software tool allows you to monitor reactions to your invite, send automated updates and update your CRM with relevant information. Data Science tech events

    ReplyDelete
  17. It's really nice and meanful. it's really cool blog. Linking is very useful thing.you have really helped lots of people who visit blog and provide them usefull information. is can i run it accurate

    ReplyDelete
  18. Hey, I am so thrilled I found your blog, I am here now and could just like to say thank for a tremendous post and all round interesting website. Please do keep up the great work. I cannot be without visiting your blog again and again. news today

    ReplyDelete
  19. This deplorable circumstance happens on the grounds that the Forex market is ever evolving. Indeed, even specialists can't foresee the development with any extraordinary level of conviction.simultaneous localization and mapping

    ReplyDelete
  20. This is such a great resource that you are providing and you give it away for free. I love seeing blog that understand the value. Im glad to have found this post as its such an interesting one! I am always on the lookout for quality posts and articles so i suppose im lucky to have found this! I hope you will be adding more in the future... شبکه های اجتماعی

    ReplyDelete
  21. I appreciate everything you have added to my knowledge base.Admiring the time and effort you put into your blog and detailed information you offer.Thanks. you can visit

    ReplyDelete
  22. The web site is lovingly serviced and saved as much as date. So it should be, thanks for sharing this with us. News

    ReplyDelete
  23. Hi there! Nice stuff, do keep me posted when you post again something like this! creare sito ecommerce

    ReplyDelete
  24. Hello I am so delighted I located your blog, I really located you by mistake, while I was watching on google for something else, Anyways I am here now and could just like to say thank for a tremendous post and a all round entertaining website. Please do keep up the great work. sviluppo siti web Milano

    ReplyDelete
  25. Most web hosting companies will provide a link to a demo of the control panel they use with their hosting plans. The control panel used is a matter of preference, but it should be user friendly. ssd vps hosting

    ReplyDelete
  26. Excellent to be visiting your blog again, it has been months for me. Rightly, this article that I've been served for therefore long. I want this article to finish my assignment within the faculty, and it has the same topic together with your article. Thanks for the ton of valuable help, nice share. empresa de seguridad privada

    ReplyDelete
  27. Major thankies for the post.Really thank you! Really Great. content://com.android.browser.home/index

    ReplyDelete
  28. Very informative post! There is a lot of information here that can help any business get started with a successful social networking campaign. news

    ReplyDelete
  29. I read a article under the same title some time ago, but this articles quality is much, much better.
    How you do this..content://com.android.browser.home/index

    ReplyDelete
  30. I have read your blog it is very helpful for me. I want to say thanks to you. I have bookmark your site
    for future updates.https://1asiaqq.net

    ReplyDelete
  31. AsiaQQ adalah Situs Judi Online, BandarQQ, DominoQQ, PokerQQ, QQ Online, Situs QQ, Poker Online, Agen BandarQ Online 24 jam...https://1asiaqq.net/

    ReplyDelete
  32. SMO Course Delhi help in improving your sites organic search results. By connecting with people from different locations online, you can broaden your business and increase the chances people will link to your business.

    ReplyDelete
  33. Numerous organizations list a technology as one of their upper hands. Is this legitimate? Sometimes indeed, however In many cases no. collaborative todo list

    ReplyDelete
  34. Your content is nothing short of brilliant in many ways. I think this is engaging and eye-opening material. Thank you so much for caring about your content and your readers. Security Windows

    ReplyDelete
  35. Thank you for sharing very useful blog and SEO Services Delhi and SEO Services Delhi keep share more information

    ReplyDelete
  36. Thank you for sharing very useful blog and SEO Freelancer keep share more information

    ReplyDelete
  37. Best and cheapest services of Vashikaran Specialist Delhi and keep share more information

    ReplyDelete
  38. Queue Manager - Solution for queueing and barricading. Crowd barriers solutions, Call us now 09910398708. Quick delivery time, Start from Rs.1500, Que Management.

    ReplyDelete
  39. Consider this a guard dog that keeps vigil long after the prisoners have resigned to bed or when the house is empty. These marvel gadgets are not simply an extraordinary assistance during robberies; they additionally avert would be criminals who typically try not to get into properties that have the defensive shield of a security system. cctv camera installation near me

    ReplyDelete
  40. You might comment on the order system of the blog. You should chat it's splendid. Your blog audit would swell up your visitors. I was very pleased to find this site.I wanted to thank you for this great read!! Security Services london

    ReplyDelete
  41. We specialize in providing high quality ceramic products. In order to bring to customers safe ceramic products for human health. gomsuhcm.com is the largest ceramic dealer in HCMC. We always make sure the product is of the correct quality as described. Products specialized in trading branded ceramics Bat Trang, Ceramics Minh Long, Ceramics gifts. Please contact us for a free consultation. Hotline: 0947 836 567

    Ceramics Shop in Ho Chi Minh City - Supplying high-quality Bat Trang ceramic products. Bat Trang Ceramics products such as ceramic cups, ceramic pots, teapots ,.

    76 Nguyen Gian Thanh, Ward 15, District 10, Ho Chi Minh 70010

    090 269 38 66

    ReplyDelete
  42. Digital Novelty Documents is an independent company That utilize its own digital and rare Technologies to produce and register all sorts of identification and travel documents into government databases. We have developed unique techniques to produce passports , Visas, SSN , Driving license, I.D cards, Birth certificates, diplomas and many other documents of very high quality. The challenge about this is the recognition of these documents at the level of scans, police officers and other check mechanisms around the world. We have done an amazing job with this aspects. We do not only produce genuine copies of these documents, but we also have the appropriate requirements to register them into the database of the government at hand. We cover the production of documents in over 110 countries in (All USA states, All CANADA states, South America, Europe, Australia, Asia and Africa and counting) We Produce Both Real Database registered passport, license, SSN, I.D cards, Birth certificates, diplomas which are legally used. We also have credible solutions for high quality Counterfeit bills online.
    . buy driving license online

    ReplyDelete
  43. The style of writing is excellent and also the content is top-notch.
    domain name blog

    ReplyDelete
  44. very interesting post.this is my first time visit here.i found so mmany interesting stuff in your blog especially its discussion..thanks for the post! Click Here

    ReplyDelete
  45. Nice blog. Best Hosting in Nepal - 24/7 Instant Support and 99% Server Uptime. Best Web Hosting in Nepal. Call us now 9779869421801. Affordable price, Starting from NPR.999/year Only.

    ReplyDelete
  46. Cool you inscribe, the info is really salubrious further fascinating, I'll give you a connect to my scene. email extractor software free download full version

    ReplyDelete
  47. The best way to use this method is to find the ads that rhyme with your business. For instance, you do not want to put your ads in the motorcycle section, when you are in the video gaming business. where to buy Instagram story views

    ReplyDelete
  48. Find the best essays on is my friend's profile page. AI Tech Assessment Tool

    ReplyDelete
  49. When your website or blog goes live for the first time, it is exciting. That is until you realize no one but you and your. Cyber Security Awareness Training

    ReplyDelete
  50. There are numerous perspectives to a framework engineering including specialized and business arranged and furthermore some administration situated viewpoints, for example, execution guides. Anyway approving every one of these viewpoints is neither viable nor fundamental for guaranteeing the framework design is legitimate and will set the right long haul bearing for the enterprise framework. Resume Builder App

    ReplyDelete
  51. Are you searching for private limited company registration in Dhaka, Bangladesh? Legal Adda is a leader in online pvt ltd company registration in Bangladesh.
    Company Registration in Bangladesh
    Smart Outsourcing Solutions is the best company and providing Static, Dynamic, E-commerce,Online Shopping and News Portal website development, Domain Registration, Cheap Web Hosting, Cloud Hosting, WordPress Hosting, Reseller Hosting,
    Virtual Private Server (VPS) and Dedicated Hosting,Internet Marketing/Digital Marketing like SEO,
    outsourcing institute

    ReplyDelete
  52. An attention-grabbing dialogue is price comment. I believe that it is best to write more on this matter, it might not be a taboo topic but usually people are not sufficient to talk on such topics. To the next. Cheers Unique Dofollow Backlinks

    ReplyDelete
  53. All activities of discipline ought to be recorded and kept in a representative document. mélybölcsős fuvarozás Europa-Road Kft.

    ReplyDelete
  54. When you use a genuine service, you will be able to provide instructions, share materials and choose the formatting style. best security company in singapore

    ReplyDelete
  55. Thank you again for all the knowledge you distribute,Good post. I was very interested in the article, it's quite inspiring I should admit. I like visiting you site since I always come across interesting articles like this one.Great Job, I greatly appreciate that.Do Keep sharing! Regards, security companies in Singapore

    ReplyDelete
  56. I really loved reading your blog. It was very well authored and easy to understand. Unlike other blogs I have read which are really not that good.Thanks alot! https://securityguardagency2345.blogspot.com/2021/09/guard-agency-offerings-provide-and.html

    ReplyDelete
  57. Took me time to read all the comments, but I really enjoyed the article. It proved to be Very helpful to me and I am sure to all the commenters here! It’s always nice when you can not only be informed, but also entertained! tube packaged goods

    ReplyDelete
  58. Boost your website's rankings today. Buy the highest quality backlinks from SEO London agency. Proven powerful. Buy do-follow backlinks that will increase your website's SEO value. Proven to rank all niches. Zero Deindexation.

    ReplyDelete
  59. Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. check more info about Security Company

    ReplyDelete
  60. This is actually the kind of information I have been trying to find. Thank you for writing this information. https://securityserviceincambodia348794372.wordpress.com/2022/01/03/a-review-of-a-security-service-in-cambodia/

    ReplyDelete
  61. Thank you so much as you have been willing to share information with us. We will forever admire all you have done here because you have made my work as easy as ABC. https://medium.com/@mitia.dera/security-services-in-cambodia-464074ed3779

    ReplyDelete
  62. Thanks for posting this info. I just want to let you know that I just check out your site and I find it very interesting and informative. I can't wait to read lots of your posts. best cambodian security company

    ReplyDelete
  63. I can set up my new idea from this post. It gives in depth information. Thanks for this valuable information for all,.. https://securityservices518270229.wordpress.com/2022/01/20/how-to-find-the-best-security-services-provider-for-your-cambodian-business/

    ReplyDelete
  64. We have sell some products of different custom boxes.it is very useful and very low price please visits this site thanks and please share this post with your friends. security company phnom penh

    ReplyDelete
  65. Yes i am totally agreed with this article and i just want say that this article is very nice and very informative article.I will make sure to be reading your blog more. You made a good point but I can't help but wonder, what about the other side? !!!!!!THANKS!!!!!! best security services

    ReplyDelete
  66. https://doramasflix.me/Hola, bienvenido a Doramasmp4.me. Aquí puedes ver todos los dramas españoles en alta calidad de video. Mire hoy City of Streamer capitulo 30 sub video en español aquí en línea. Siga viendo Ver Doramas en línea, así como Dormas Sub Español, aquí mismo. Dormamasmp4 le proporcionará un servicio de video de la mejor calidad. Mira y disfruta de City of Streamer capitulo 30 sub español. Deja tu mejor reseña sobre doramasmp4 también.

    ReplyDelete
  67. I appreciate everything you have added to my knowledge base.Admiring the time and effort you put into your blog and detailed information you offer.Thanks. Serious Security CCTV Sydney

    ReplyDelete
  68. Interesting post. I Have Been wondering about this issue, so thanks for posting. Pretty cool post.It 's really very nice and Useful post.Thanks Serious Security CCTV Sydney

    ReplyDelete
  69. Thank you for nice information
    Visit :
    Here

    ReplyDelete
  70. This comment has been removed by the author.

    ReplyDelete
  71. Very informative post! There is a lot of information here that can help any business get started with a successful social networking campaign. https://site-7175425-6523-7912.mystrikingly.com

    ReplyDelete
  72. I was reading some of your content on this website and I conceive this internet site is really informative ! Keep on putting up. https://security-service-in-cambodia.mystrikingly.com/

    ReplyDelete
  73. Thank you for nice information
    Please visit our website
    Click Here

    ReplyDelete
  74. Hello, this weekend is good for me, since this time i am reading this enormous informative article here at my home. security company in cambodia

    ReplyDelete
  75. A touch board configuration is just a graphical connection point that discussions to mechanization hardware, it fuses pictures, text, fastens or in any event, moving pictures and transferred video. Yealink A20
    Yealink Meetingbar A20

    ReplyDelete
  76. Awesome and interesting article. Great things you've always shared with us. Thanks. Just continue composing this kind of post. security company in sihanoukville

    ReplyDelete
  77. It is included in my habit that I often visit blogs in my free time, so after landing on your blog. I have thoroughly impressed with it and decided to take out some precious time to visit it again and again. Thanks. cambodia security company

    ReplyDelete
  78. When your website or blog goes live for the first time, it is exciting. That is until you realize no one but you and your. security service in cambodia

    ReplyDelete
  79. Great job for publishing such a beneficial web site. Your web log isn’t only useful but it is additionally really creative too. cambodian security guard

    ReplyDelete
  80. Thank you for nice information
    Visit Mywebsite
    Visit Us

    ReplyDelete
  81. i never know the use of adobe shadow until i saw this post. thank you for this! this is very helpful. get security company service

    ReplyDelete
  82. This is such a great resource that you are providing and you give it away for free. I love seeing blog that understand the value of providing a quality resource for free. https://security-company21.mystrikingly.com/

    ReplyDelete
  83. This comment has been removed by the author.

    ReplyDelete
  84. Thanks for a wonderful share. Your article has proved your hard work and experience you have got in this field. Brilliant .i love it reading. school security guard

    ReplyDelete
  85. A very awesome blog post. We are really grateful for your blog post. You will find a lot of approaches after visiting your post. khmer security company

    ReplyDelete
  86. Thank you because you have been willing to share information with us. we will always appreciate all you have done here because I know you are very concerned with our. http://security5670.pages10.com/Security-Services-What-You-Need-To-Know-Before-You-Hire-The-Blue-and-Red-On-Site-45875268

    ReplyDelete

Powered by Blogger.