Digital transformation, new techniques and industry collaboration will all play a bigger role in making the cybersecurity landscape even harder to navigate now and in the future and there are three main concerns currently dominating discussions in the cybersecurity industry. What’s needed is a change in mindset, making sure that breach prevention and breach detection strategies are left in the past and that a focus is put on adopting a Zero Trust approach to cybersecurity.
Concern #1: The nature of cyber-attacks will not change, but their tactics will.
Organizations will continue to face ransomware, malware and DDoS threats from recent years as cyber criminals attempt to recreate successful exploits like Miraj, Heart Bleed and Poodle. However, threat actors will modify their tactics to hide their activities through new techniques, such as peer-to-peer networking or anonymous VPNs.
Concern #2: The continued move towards digital transformation will shape how enterprises secure their digital assets.
The ongoing digitization of everything, from customer preferences to cryptocurrency, will remain one of the biggest drivers for more effective business cybersecurity. This includes greater attention on the supply chain, third party technology providers and technology partners.
Concern #3: Both industry collaboration and Government legislation will play greater roles in working to protect the global digital world.
The security research community will make a greater effort to collaborate to detect – as well as prevent – the types of global cyber events we have seen in recent years. In addition, the implementation of General Data Protection Regulation (GDPR), and similar legislation, will drive more organizations to adopt improved security frameworks. If they don’t, the financial penalties are potentially huge.
A mindset change is needed.
The entire current cybersecurity model is flawed, not least because most organizations are still adhering to the ‘secure the border’ model. Breach prevention, even breach detection, are not adequate security postures. They assume a level of trust – that anyone or anything inside the border is trusted until proved otherwise. But this is wholly untrue, as the raft of cyber breaches – many of them undetected for months – reveal.
Organizations need to stop trying to build security into the infrastructure itself and adopt a Zero Trust mindset. This means decoupling security from the complexity of the IT infrastructure and addressing specific user/ IoT device vulnerability. Instead of firewalls, network protocols and IoT gateways, organizations should consider data assets and applications; and then determine which user roles require access to those assets.
Building on the existing policies for user access and identity management, organizations can very quickly use crypto-segmentation to ensure only privileged users have access to privileged applications or information. Each crypto domain has its own encryption key, making it impossible for a hacker to move from one compromised domain or segment into another, meaning any breach is contained immediately.
It is by creating a Zero Trust approach to data security first, and only then overlaying any specific compliance requirements, that organizations can lock down the business against the threat and meet the growing regulatory demands.