Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its Threat Horizon report. The document provides a two-year, forward-looking projection of the biggest security threats we can expect to face. Earlier this year, the report detailed the top nine threats to watch for from 2016 to 2018. Let’s take a moment to remind ourselves of these threats and how to address them.
1. The IoT leaks sensitive information
With the dramatic increasing adoption of IoT devices in the workplace, companies must leverage security processes such as enterprise mobility management (EMM) and mobile threat prevention (MTP) with policies and procedures implemented well in advance.
2. Opaque algorithms compromise integrity
Sacrificing security for efficiencies is a losing proposition. Therefore, companies must understand when digital and/or human liability poses a problem and proactively address potential risks in a transparent manner.
3. Rogue governments use terrorist groups to launch cyber attacks
Threat intelligence is a constant conversation at the state and federal levels, and will continue to be as criminals and terrorists expand their cyber capabilities. We must be vigilant and open to collaboration to recognize and stop threat actors.
4. Unmet board expectations exposed by a major incident
Open and direct communication between senior-level management is imperative about all topics, and particularly will be a focus related to risk appetite. Be sure to align security expectations based on the function’s current and future capability.
5. Researchers silenced to hide security vulnerabilities
Just as companies must incorporate policies and procedures related to information access and usage in house, similar contracts may need to be drawn up with vendors and other external stakeholders to properly address identified vulnerabilities.
6. Cyber insurance safety net is pulled away
With cyber attacks on the rise, many companies are using cyber insurance to hedge against the risk of a data breach. However, as these breaches continue to occur, insurers may devise costly exceptions within plans that companies should be aware of and prepared to address.
7. Disruptive companies provoke governments
Companies who are disrupting their sector will likely draw major attention from politicians and regulators, who may try to become increasingly interventionist. Political influence and engagement will be key, along with identifying context around product and service delivery.
8. Regulations fragment the cloud
The handling the personal data is always a sensitive subject, but when it comes to storing such information in the cloud, regulation and legislation may make it even trickier. Stay engaged and involved with potential changes on the horizon.
9. Criminal capabilities expand gaps in international policing
Threat intelligence capabilities are critical for organizations of all sizes, and will continue to be so as cyber criminals become more cunning. Don’t let your guard down; start implementing security measures now and evolve them as capabilities advance.
Download a copy of the full Threat Horizon report here. Then, contact us for help preparing your organization to address these risks before they can cause harm to your business.
