Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST
Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet:  2024 Cybersecurity Predictions

Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet: 2024 Cybersecurity Predictions

By Chris Scheels, VP of Product Marketing at Gurucul

How will security analytics, machine learning/AI, and applied data science in the security space evolve in the coming year? Here are five cybersecurity predictions for 2024, developed by myself and my security executives and research colleagues.

Mature Zero Trust organizations shift focus to Automation and Orchestration, and Visibility and Analytics pillars.

Enterprises that were early adopters of Zero Trust frameworks are now a few years into their journeys and have made progress in the five pillars of Zero Trust: identity, devices, networks, applications and workloads, and data. In 2024, about 35% of these early adopter organizations will move into more advanced stages of Zero Trust and focus on the overlay pillars: Automation and Orchestration, and Visibility and Analytics.

These pillars permeate the entire organization and many different IT/IS departments. Building them out requires having visibility into everything happening in the Zero Trust environment, including all of the tools, applications and processes in place to protect the five core pillars. Maturing these two overlay pillars requires new capabilities and technologies like advanced analytics powered by machine learning and AI as well as identity-centric SIEM, UEBA and SOAR capabilities. The Automation and Orchestration pillar requires high-fidelity detections combined with rich contextual data, and the ability to dynamically prioritize events and alerts accurately in order to automate remediations without interrupting legitimate business processes in the crossfire.

AI can improve SOC team efficiency now – and will improve over time

While the adversaries are busy trying to weaponize AI to achieve their goals, the benefit of AI for defenders and the Security Operations Center (SOC) team will be more immediate and more significant. AI will empower SOC analysts with powerful insights into datasets across identity, security, network, enterprise and cloud platforms. Specifically, it will improve SOC team efficiency and help counter the ongoing challenges of limited resources and skill sets, overwhelming alert fatigue, false positives and mis- or unprioritized alerts in the following ways:

  • Provide proactive suggestions for detections and threat hunting queries.
  • Create new threat content based on recent trends, learnings across customers and industry verticals to dynamically improve or suggest new ML models, queries, reports and more.
  • Auto-triage alerts based on historical triage patterns, investigation notes, types of detection, relevance, and attack trends to automate and suggest key incident response activities with ease including creating custom reports, taking bulk actions, and multi-step workflows.

Cybercriminals are already using AI to make their attacks better – and improve the tactics, techniques, and procedures (TTPs) of attacks. But advanced machine learning models that are trained using adversarial AI will be able to combat these new attacks. Organizations should invest in quality, mature ML/AI powered technologies for threat detection and explore how AI can help their SOC teams spend less time investigating (or chasing false positives) and more time eradicating true threats.

Among companies without an insider threat program, 75% will start to plan, build and budget for a formal insider threat program, with a majority of that growth coming from the SME (Small and Medium Enterprise) market

Recent research shows that more than half of organizations have experienced an insider threat in the past year and 68% are “very concerned” about insider threats as they return to the office or move to hybrid work. 74% say insider attacks have become more frequent, and 74% say they are moderately vulnerable or worse to insider attacks. Overall, companies of all sizes are becoming increasingly aware of the risk of insider threats and addressing the problem. SMEs in particular are taking insider threats much more seriously than in recent years.

In response to these growing concerns, 75% of organizations that have protected data (PHI, PII, etc.), valuable IP, or compliance requirements, but don’t currently have an insider threat program, will start planning or building one in 2024. Along with that, the adoption of insider threat solutions will increase by at least 50% as these programs develop. Some tools enterprises should consider for starting their insider threat program are a next-gen SIEM, UEBA combined with identity and access analytics, and/or a DLP solution to limit data exfiltration.

MSSPs and MDRs serving SMBs will grow by 25% YoY as part of a customer-driven push for vendors to provide services rather than just selling products.

A strong demand from SMB customers for Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) providers will continue in 2024. This market growth is driven mainly by the lack of skilled personnel to manage and maintain the appropriate systems and processes to protect small and medium businesses from cyber attack and ransomware. This talent shortage shows every sign of getting worse in 2024.

In response to this demand, service providers will wrap many individual services together to offer packages to their customers to meet their current business needs and help match levels of protection to varying budgets. This means security vendors should create multi-tenant solutions that integrate easily with other security vendors’ products and cover both cloud and on-premise environments. They should also design their products and business practices to work well in a managed services model. This means flexible licensing and billing models and dedicated programs and resources that support this unique go-to-market motion through service providers to satisfy the growing market demand.

2024 will be the year of public-sector attacks and hacktivism.

The public sector domain, including the education system, the medical system and public infrastructure, will be a primary ransomware target in 2024. This is because these systems are widely seen as easy targets that offer attackers fame, information, and money. Public infrastructure like water and electrical systems around the world will be increasingly targeted by nation-state actors involved in geopolitical conflicts. These systems are not well-protected and offer a huge payoff in terms of the damage and chaos caused by disrupting them. We will also see an increase in hacktivism activities against government agencies and the supply chain that supports them, including DDOS attacks and APT’s.

About the Author

Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet:  2024 Cybersecurity PredictionsChris has been aligning people, processes and technology to drive companies forward for over 20 years. He has a decade of cybersecurity experience in product marketing and product management. His passion is helping businesses succeed through the strategic use of technology. Most recently he was helping customers accelerate their Zero Trust journey at Appgate, Inc. His background also includes experience in operations, sales, and new business development.

cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X