Page 130 - Cyber Defense eMagazine December 2022 Edition
P. 130

and more real-time responses. Account lockouts, password resets and network contained systems will
            likely be some of the methods used to reduce the impact of a data breach.

            Should responders continue to waste time, we will see a shift from default configurations to more auto-
            responses.  Our  end  customers  will  have  to  change  with  the  times and  understand  the  value  of  the
            disruption.



               2.  Zero trust models are going to have a massive impact on security.

            We’ve seen a shift in organizations migrating to the cloud and abandoning their internally hosted data
            centers. With the shift will come an increase in the reliance on zero trust models to improve security.

            This could change how we perform penetration testing, secure our networks and may even remove the
            need  for  significant  network  security  for  some  organizations.  The  perimeter  network  edge  is  all  but
            dissolved, zero trust may help to finish it off. We will still have a need for internal segmentation in many
            industries that rely on local computer resources.



               3.  Government regulations are going to balloon.

            We  can  predict  there  will  be  changes  to  the  current  international  privacy  requirements.  These  new
            security regulations will likely come from the SEC. On top of these changes, additional executive orders
            and Congressional committee meetings will be coming down the pipeline next year.

            I expect most of these regulations to lack real teeth. The fines and penalties likely won’t be sizable enough
            to implement real change. The FTC stands out with some regulations that have significant teeth to them.



               4.  Hacktivism is increasing.

            The ongoing conflict in Ukraine has been the first war to prompt large scale cyberattacks from nonmilitary
            citizens of other nations.

            The Ukrainian  army's  offensive  cyber-operations are  now attacking  Russian  infrastructure as both a
            hobby and a political statement. We can foresee these types of offensive operations across borders to
            become more conventional in the coming year.



               5.  Governments will be more direct on attribution.

            This past year we saw multiple public reports of US espionage efforts in China. This does not come as a
            shock given our government’s recent trend of outing its own cybersecurity enemies by name.







            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         130
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   125   126   127   128   129   130   131   132   133   134   135