Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Cyber Resilience Think Tank Forecasts Four Key Trends to Hit the Cybersecurity Industry

Consolidation Cyber Resilience Risk and Microbreaches Forecasted in Mimecast’s Latest Ebook

Mimecast Limited, a leading email and data security company, announced the availability of Commencing a New Decade: 2020 Predictions, the latest eBook from the Cyber Resilience Think Tank (CR Think Tank). This group of security leaders recently gathered to reflect on the past decade and forecast the major trends expected in 2020 and beyond. The eBook is designed to provide expert insight to global industry influencers on what to expect and how to prepare for the upcoming security challenges organizations may face this coming year.

During the CR Think Tank meeting, much of the discussion centered on the transformations of the SaaS, InfoSec and Application Security industries. The group also covered the challenges associated with not including security from the start.

Recommended AI News: RPA in Healthcare: The Key to Scaling Operational Efficiency

To best prepare for a strong and strategic 2020, the CR Think Tank outlined four key trends that will impact how organizations approach cybersecurity.

1.       DevOps and Security Efforts will Align to Mitigate Business Risk

New features, bug fixes, configuration changes, and much more are delivered and iterated upon quickly to provide the best possible end user and customer experience. However, because of the constant iterations and improvements, security can no longer be an afterthought. DevOps teams are dependent on cloud deployments, which means that security must be top of mind at every stage of the application development process.

According to Malcolm Harkins, chief trust and security officer at Cymatic, DevSecOps has lagged because security processes, tools, and procedures that slow down the development process, but automation could be the answer. When standards are automated into the task at hand, DevSecOps can suit the needs of development, security and operations.

2.       Industry Consolidation will Increase the Possibility of a Breach

After a period of explosive innovation and growth in the security solutions space, 2019 saw a busy year of consolidation, with larger players snapping up smaller ones to expand their portfolios.

Related Posts
1 of 40,645

Shawn Valle, chief security officer at Rapid7, commented that there will be an onslaught of new players that acquired their way into key positions: “We could see new leaders in all things cloud security and all things security applications.”

Beyond the economic implications for the industry, consolidation in cybersecurity has another angle that all organizations need to consider. The complexity that comes with diverse security technologies and the ecosystems where they operate together injects risk around inadvertently acquiring your next breach. To mitigate this challenge, security leaders must be brought into mergers and acquisitions in the early stages of planning to have a greater understanding of the security posture and capabilities of the company being acquired.

Christina Van Houten, chief strategy officer at Mimecast, said, “Most companies use M&A to buy growth and revenue, but traditional financial due diligence is no longer enough to ensure success. Achieving a deep understanding of the technology and how it will function inside the broader ecosystem is critical.” She also noted that more emphasis should be put on building relationships at all levels within the organization well before the transaction takes place. “The ‘softer side’ of M&A is a hugely important part of the due diligence process in the days following the acquisition. This requires a great deal of thoughtfulness and programmatic cross-organizational collaboration, but when done right, the acquiring company and combined entity become stronger, delivering a better solution for customers.”

3.       Attack Simulation will Grow as Pen Testing Becomes Table Stakes

When it comes to building defenses against attackers, what worked in years past will no longer be sufficient in 2020. Traditional pen testing has been considered a key pillar of good cybersecurity because it forces leaders and analysts to proactively push the bounds of what they’re doing, continuously validating the tools and alerting inside security environments. Beyond kicking the tires to ensure everything is functioning properly, programs have been used as valuable training approaches and to demonstrate system capabilities and processes to stakeholders.

Harkins noted that this brings the shortage of cybersecurity professionals to mind. While pen testing is expensive in resources and limited in scope, attack simulation technology looks much more appealing for high yields and low cost. Security leaders who can reduce manual labor costs and cover more ground using automation will free up time for more valuable development cycles.

4.       Hyperconvergence of Technologies will Increase Risk of Microbreaches

Microbreaches are slight manipulations of data that can cascade throughout distributed IT environments. Given the market consolidation that’s underway in the security solution space, CR Think Tank members believe these kinds of attacks will emerge more pervasively in 2020. Beyond the ecosystem complexity and lack of integration, these attacks will be enabled by mobility and other emerging technologies that have created new points of entry.

Peter Tran, head of global cyber defense at Worldpay, believes microbreaches will be off the radar because the current tools and telemetry enterprises deploy are designed to monitor and alert on the environment, such as SIEMs, packet capture, netflows, etc. – and they won’t be enough to combat microbreaches in a distributed IT world.

Recommended AI News: The Future of Fintech at CES 2020 with AI, Crypto, Threat Intelligence and So Much More…

Comments are closed, but trackbacks and pingbacks are open.