15
Top 12 Predictions from Leading Cybersecurity Experts

Analytics cybersecurity-predictions-2016

Embed Size (px)

Citation preview

Top 12 Predictions fromLeading Cybersecurity Experts

ibm.co/threatintelligence

What will 2016 hold for cybersecurity?Expect continued developments as both the public and private sectors implement

intelligence-led approaches to threats.

ibm.co/threatintelligence

12“New data sources arising from the

Internet of Things and biometrics will lead to a renewed government interest in using big data to prevent terrorism.” Andrew Borene, federal manager, i2 Safer Planet

ibm.co/threatintelligence

11“Private organizations will increase

their visibility into the dark web to become more proactive about cyberthreats than ever before.”Bob Stasio, senior product manager for

cyber threat analysis, i2 Safer Planet

ibm.co/threatintelligence

10“The international community will create safe zones in Syria to stem the mass migration to

Europe, and big data analytics will play an integral role in enforcing identity resolution and border security in those safe zones.”

Todd Rosenblum, senior executive forworldwide big data, i2 Safer Planet

ibm.co/threatintelligence

“Companies and government agencies will begin using block-chain encryption

to protect against cyberthreats.”

Bob Stasio9

ibm.co/threatintelligence

“Auditability and managed access of US citizens’ personal data will be an increasingly important requirementfor US national security agencies.”

Todd Rosenblum8

ibm.co/threatintelligence

7“Companies will begin properly

inventorying digital assets and data aspart of their risk management strategies,

heightening understanding of threat surfaces and ways of minimizing them.” Shahid Shah, CEO, Netspectives Communication

ibm.co/threatintelligence

“‘Big X’ consulting firms will offer their customers cyberintelligence-as-

a-service consulting options.”Bob Stasio6

ibm.co/threatintelligence

“Vulnerability curators will become increasingly prevalent as companies

learn to share breach data.”Shahid Shah5

ibm.co/threatintelligence

“Continued cybersecurity breaches and state-sponsored cyber espionage will lead

to spikes in cybersecurity spending on both workforce and software solutions.”

Andrew Borene4

ibm.co/threatintelligence

“Large financial organizations will continue divesting themselves

of managed security services to create their own fusion centers.”

Bob Stasio3

ibm.co/threatintelligence

“Third-party libraries and software components will increasingly gain

attention as CIOs and CISOs realize how many vulnerabilities they create.”

Shahid Shah2

ibm.co/threatintelligence

1“The market for behavioral

analytics and threat detection offerings will continue unabated.”

Bob Stasio