Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Mobile

    ISF Says Prepare Now for Security Threats Coming in 2016

    By
    Michelle Maisto
    -
    April 11, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1ISF Says Prepare Now for Security Threats Coming in 2016

      1 - ISF Says Prepare Now for Security Threats Coming in 2016

      by Michelle Maisto

      2The Threat Horizon, 2014-2016

      2 - The Threat Horizon, 2014-2016

      Over the next two years, the ISF expects businesses to move from a time of growing cyber criminality (2014) to crime as a service (CaaS) upgrading to version 2.0 (2015) and eventually encryption measures failing (2016). While in 2015 a challenge will be many CEOs still “not getting it,” by 2016 they will have figured it out, and chief information security officers (CISOs) had better have the skills and tools to deliver, the study said.

      3Nation-State Backed Espionage Goes Mainstream

      3 - Nation-State Backed Espionage Goes Mainstream

      If before government espionage activities were behind the scenes, by 2016 they’ll be out in the open and the result will be an “even more unruly cyberspace trading environment.” The ISF advises building relationships within and across industry sectors. “The government was never really in our corner anyway,” Durbin said. “For me, real trust is about how you build trust with the partners you build business with.”

      4A Balkanized Internet Complicates Business

      4 - A Balkanized Internet Complicates Business

      “Nation-states will take a local approach to Internet governance, attempting to draw geopolitical borders on the Internet,” the ISF said in the report. Prepare now by creating partnerships for information sharing and engaging in “multi-stakeholder governances processes to share intelligence.”

      5Unintended Consequences of State Intervention

      5 - Unintended Consequences of State Intervention

      Even organizations not implicated in wrongdoing will suffer collateral damage as authorities “police ‘their corner of the Internet,'” according to the report. Durbin said the ISF recently changed its nondisclosure agreements for U.S. members, to take into account that they may have to disclose information to the government, if required. “It’s about organizations understanding what governments are able to ask for and being open about that with partners. In the past, we didn’t have this kind of openness.”

      6Service Providers Become a Key Vulnerability

      6 - Service Providers Become a Key Vulnerability

      The ISF advises fostering strong working relationships with service providers “with the aim of becoming partners.” Durbin said, “The smaller guys are a weak link, because they often don’t have the security in place. If you’re an acquiring organization, why not share information? Or be clear about what [security practices] you require from suppliers.”

      7Big Data Equals Big Problems

      7 - Big Data Equals Big Problems

      Organizations that put blind faith in big data will make strategic decisions based on faulty or incomplete data sets. Avoid this by outlining a process for applying big-data analytics to information security problems, the ISF advised. “Security still hasn’t made use of all the tools that business makes available—like big data,” Durbin said. “But increasingly, it’s front and center.”

      8Mobile Apps Become Main Route for Compromise

      8 - Mobile Apps Become Main Route for Compromise

      Try to find innovative ways to keep workers alert to the risks of “bring your own anything” (BYOx), the report said. One way people are doing this, Durbin said, is “5 to 9 initiatives,” that talk about what people do at home and how they can do those things more safely. They then naturally bring those best practices into the workplace, eliminating the need for a shift in behavior.

      9Encryption Fails

      9 - Encryption Fails

      “People felt that encryption was the security [measure]. That assumption has proven to be not the case,” Durbin said. Businesses should prepare themselves by identifying their most sensitive assets and preparing appropriate solutions for protecting them. All data is not created equal, and so neither should their protections be the same.

      10The CEO Gets It, Now You Have to Deliver

      10 - The CEO Gets It, Now You Have to Deliver

      The CISO will need to demonstrate value. Prepare for this by aligning the “security function with the organization’s approach to risk management,” the report said. Durbin added that security should be treated like any other business risk; CISOs don’t want to be put in a position of justifying the cost of security when there isn’t a breach. “Make security a business cost,” says Durbin.

      11Skills Gap Becomes a Chasm

      11 - Skills Gap Becomes a Chasm

      The skills gap is widening; prepare by developing talent and creating incentives to retain it. Durbin said businesses need to be more aggressive about getting the skill sets that they need. “Government is looking for the same skills as the private sector … which raises another challenge around trust,” he adds.

      12Information Security Fails to Work With New Generations

      12 - Information Security Fails to Work With New Generations

      “Those who grew up with security [and] privacy questions have a different perspective than those of us coming to it later. Security [means] different things to different people, and that creates a challenge,” Durbin said. Prepare by adapting policies and procedures to engage generations Y and Z. Their approaches to “work, socializing and privacy are vastly different … and they won’t fit with the traditional security models,” the report said.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×