Page 34 - Cyber Warnings December 2015
P. 34







Cyber Predictions

Amir Orad


If there’s one thing that stays consistently top of mind for CIOs and business leaders, it’s security.
As enterprise technology evolves and new technologies, such as wearables, hit the market, there
are new security threats and vulnerabilities for cyber criminals to target – but also new ways that
organizations can protect against attacks.

Every organization needs to consider how they can leverage the latest technologies and security
analytics to protect their business. From retail and finance to healthcare and media – no industry is
safe from the potential risk of security breaches and data theft.

Cyber security risks will be a core focus for IT and business leaders in 2016. As a result, we’ll see
more organizations implementing technology and analytical solutions to monitor, identify and
mitigate these risks.


Managing security analytics is a challenge many IT organizations face, but in 2016, many
organizations will improve with technology tools to overcome these challenges and maintain secure,
compliant organizations.


More organizations will rely on data analytics to increase overall umbrella monitoring.

For companies that have large, complex data sets coming from many different security monitoring
sources, data analytics can be a useful tool to see the overall picture.

To gain a better understanding of what is happening across an entire network, in 2016 more
companies will implement tools that allow for easy data mash-up, supporting analysis across the
entire network and across all security related applications.


“False Positive” threats will distract from real ones.

Many existing security systems have binary outcomes, generating too many false positives that
either waste resources or cause the companies to ignore real threats because of the volume of
items flagged.

In 2016, companies will consider learning algorithms that look at multiple variables, like user role,
time of day, etc., to help differentiate between legitimate and suspicious behavior. These algorithms
will help weed out the false positive scenarios that overwhelm and distract from real threats.


More organizations will use pseudo environments to distract cyber criminals.

In 2016, more organizations will take advantage of creating pseudo environments to lure in hackers
and trap them in a fake network. By mimicking a real network, businesses can confuse the attacker
and spend time tracking culprits without threat of real loss.
34 Cyber Warnings E-Magazine – December 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   29   30   31   32   33   34   35   36   37   38   39