Four key trends to hit the Cybersecurity Industry

In News

Mimecast, today announced the availability of Commencing a New Decade: 2020 Predictions, the latest eBook from the Cyber Resilience Think Tank (CR Think Tank). This group of security leaders recently gathered to reflect on the past decade and forecast the major trends expected in 2020 and beyond.

To best prepare for a strong and strategic 2020, the CR Think Tank outlined four key trends that will impact how organizations approach cybersecurity.

1. DevOps and Security Efforts will Align to Mitigate Business Risk
New features, bug fixes, configuration changes, and much more are delivered and iterated upon quickly to provide the best possible end user and customer experience. However, because of the constant iterations and improvements, security can no longer be an afterthought. DevOps teams are dependent on cloud deployments, which means that security must be top of mind at every stage of the application development process.

According to Malcolm Harkins, chief trust and security officer at Cymatic, DevSecOps has lagged because security processes, tools, and procedures that slow down the development process, but automation could be the answer. When standards are automated into the task at hand, DevSecOps can suit the needs of development, security and operations.

2. Industry Consolidation will Increase the Possibility of a Breach
After a period of explosive innovation and growth in the security solutions space, 2019 saw a busy year of consolidation, with larger players snapping up smaller ones to expand their portfolios.

Shawn Valle, chief security officer at Rapid7, commented that there will be an onslaught of new players that acquired their way into key positions: “We could see new leaders in all things cloud security and all things security applications.”

Beyond the economic implications for the industry, consolidation in cybersecurity has another angle that all organizations need to consider. The complexity that comes with diverse security technologies and the ecosystems where they operate together injects risk around inadvertently acquiring your next breach. To mitigate this challenge, security leaders must be brought into mergers and acquisitions in the early stages of planning to have a greater understanding of the security posture and capabilities of the company being acquired.

Christina Van Houten, chief strategy officer at Mimecast, said “most companies use M&A to buy growth and revenue, but traditional financial due diligence is no longer enough to ensure success. Achieving a deep understanding of the technology and how it will function inside the broader ecosystem is critical.” She also noted that more emphasis should be put on building relationships at all levels within the organization well before the transaction takes place. “The ‘softer side’ of M&A is a hugely important part of the due diligence process in the days following the acquisition. This requires a great deal of thoughtfulness and programmatic cross-organizational collaboration, but when done right, the acquiring company and combined entity become stronger, delivering a better solution for customers.”

3. Attack Simulation will Grow as Pen Testing Becomes Table Stakes
When it comes to building defenses against attackers, what worked in years past will no longer be sufficient in 2020. Traditional pen testing has been considered a key pillar of good cybersecurity because it forces leaders and analysts to proactively push the bounds of what they’re doing, continuously validating the tools and alerting inside security environments. Beyond kicking the tires to ensure everything is functioning properly, programs have been used as valuable training approaches and to demonstrate system capabilities and processes to stakeholders.

Harkins noted that this brings the shortage of cybersecurity professionals to mind. While pen testing is expensive in resources and limited in scope, attack simulation technology looks much more appealing for high yields and low cost. Security leaders who can reduce manual labor costs and cover more ground using automation will free up time for more valuable development cycles.

4. Hyperconvergence of Technologies will Increase Risk of Microbreaches
Microbreaches are slight manipulations of data that can cascade throughout distributed IT environments. Given the market consolidation that’s underway in the security solution space, CR Think Tank members believe these kinds of attacks will emerge more pervasively in 2020. Beyond the ecosystem complexity and lack of integration, these attacks will be enabled by mobility and other emerging technologies that have created new points of entry.

Peter Tran, head of global cyber defense at Worldpay, believes microbreaches will be off the radar because the current tools and telemetry enterprises deploy are designed to monitor and alert on the environment, such as SIEMs, packet capture, netflows, etc. – and they won’t be enough to combat microbreaches in a distributed IT world.

Comments

You may also read!

Etisalat completes the acquisition of Help AG

Etisalat announced that it has completed the acquisition of Help AG, a privately held regional company specializing in the

Read More...

Kyriba launches Kyriba payments network

Kyriba has launched the Kyriba Payments Network to address the growing CFO mandate to combat payments fraud, centralize payments,

Read More...

Fortinet enriches FortiOS 6.4 with over 350 new features

Fortinet has announced the release of FortiOS 6.4, the latest version of its flagship operating system powering the Fortinet

Read More...

Join Our Newsletter!

Love SecurityMEA? We love to tell you about our new stuff. Subscribe to newsletter!

Mobile Sliding Menu