envisioning security's future: 2020 and beyond · envisioning security's future: 2020 and...

4
1 Envisioning Security's Future: 2020 and Beyond . . . TOP TEN TRENDS FOR SECURITY’s FUTURE by 2020 (pt 1)

Upload: others

Post on 27-Mar-2020

18 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Envisioning Security's Future: 2020 and Beyond · Envisioning Security's Future: 2020 and Beyond... TOP TEN TRENDS FOR SECURITY’s FUTURE by 2020 (pt 1) 2... TOP TEN TRENDS FOR SECURITY’s

1

Envisioning Security's Future:

2020 and Beyond

..

.

TOP TEN TRENDS FOR SECURITY’s FUTURE by 2020 (pt 1)

Page 2: Envisioning Security's Future: 2020 and Beyond · Envisioning Security's Future: 2020 and Beyond... TOP TEN TRENDS FOR SECURITY’s FUTURE by 2020 (pt 1) 2... TOP TEN TRENDS FOR SECURITY’s

2

..

.

TOP TEN TRENDS FOR SECURITY’s FUTURE by 2020 (pt 2)

BY 2020, THE CSO WILL NEED TO HIRE, TRAIN or OUTSOURCE THIS CANDIDATE FOR CYBER ANALYTICS INVESTIGATIONS

25%25%

25%

25%

PROACTIVE THREAT HUNTING

• Advanced skill set

• Establish a cybersecurity center of

excellence

• Establish right knowledge base for

continuous security monitoring

• Avoid relying on detection of suspicious

activities AFTER a system has already

been compromised.

FORENSIC PROCESSES

INVESTIGATIONS

ANALYTICS

• Forensic weaknesses will make it difficult to discover

the nuances of network penetration or system

compromises

• If you are unaware of these specific details, there’s

no way you can protect your organization against

similar attacks

SECURITY INCIDENT

LIFECYCLE

• IT trouble ticketing systems often lack the

functionality necessary for tracking malware or

performing forensic investigations

• When security incidents are discovered, security

teams can’t always track the remediation progress of

IT ops

• Security and IT operations teams need incident

lifecycle tracking to monitor, measure and adjust

physical and cybersecurity performance.

ASSESSING AND

PRIORITIZING

SECURITY ALERTS

• Volume of security alerts

• Identifying and prioritizing alerts is a

mission-critical process

• Don’t overlook many threats and suffer

the consequences

Page 3: Envisioning Security's Future: 2020 and Beyond · Envisioning Security's Future: 2020 and Beyond... TOP TEN TRENDS FOR SECURITY’s FUTURE by 2020 (pt 1) 2... TOP TEN TRENDS FOR SECURITY’s

3

PEN

TESTING

AI PLAYBOOK

PROGRAMMING

EMBEDDED

ARCHITECTURE

Risk Management

DATA

SCIENTIST

The CSO in 2020 will have to deal with skills gaps

Page 4: Envisioning Security's Future: 2020 and Beyond · Envisioning Security's Future: 2020 and Beyond... TOP TEN TRENDS FOR SECURITY’s FUTURE by 2020 (pt 1) 2... TOP TEN TRENDS FOR SECURITY’s

4

FURTHER READING – not just for the CSO!

> Infonomics: “How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage”

> The discipline of infonomics takes you beyond thinking and talking about information as an asset to actually valuing and treating it as one. Infonomics provides the foundation and methods for quantifying information asset value and tactics for using information as your competitive edge to drive growth.

> Less than 0.5 per cent of all data is currently analysedand used.

> However, business leaders and managers cannot afford to be unconcerned or skeptical about data.

> Data is revolutionizing the way we work and it is the companies that view data as a strategic asset that will survive and thrive.

> Create a Robust Data Strategy

– identify your strategic data needs

– what methods to use to collect the data

– how to translate your data into organizational insights for improved business decision-making and performance