Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions

Cybersecurity, or rather the lack thereof, dominated headlines throughout 2017. This isn’t likely to change in 2018, with GDPR just around the corner.

Charl van der Walt, Chief Security Strategy Officer at the UK’s largest independent cyber security company SecureData, shares his thoughts on the key trends that will impact cybersecurity next year.

Businesses are living on borrowed cyber time

The 2007 financial crisis brought to light just how interconnected today’s economy really is. All areas of business were affected, with exposure to debt being shared. The cybersecurity industry is no different. Security ‘debt’ is a liability or obligation to pay or render something. Technical Debt is already a well understood concept in software development, the cost of additional rework caused by choosing an easy solution now instead of using a better approach that would take longer or cost more. 

This translates well into security; not as the potential downside resulting from a decision to compromise, but as the direct, concrete, real-time and quantifiable cost of a trade-off between the best possible approach to securing something and the more attractive, practical, convenient or affordable approach. 

Security debt, can be compared to, monetary debt. If debt is not repaid, it can accumulate ‘interest’ and grows over time until it is repaid. It sits on a business’ balance sheet in big red letters for all the world to see, speaking to the very heart of the business, its value. If business have more liabilities in the form of security and other debt than it has assets, then you’re bankrupt and eventually you must fail.

In 2018 we may see the damaging effects of Security Debt that has been stacking up in the form of legacy code, 3rd party libraries and dependencies, and even architectures used by companies. This has been building up for the past 30 years, and may be catastrophic if the right set of circumstances come to pass. Companies have been living on borrowed security for too long, and 2018 may the year when those debts get collected.

Offense is the best defence

Governments globally have been reading up on von Clausewitz, Thucydides and Patton, before settling on Sun Tzu’s teachings to inform next-generation cyber capabilities and techniques that support national and international interests. 
As a result, we’ll see a rise in offensive cyber security with ability and budget beyond civilian imagination. Eventually, these techniques will find their way into the civilian internet, where they will wreak havoc, think Stuxnet and WannaCry, but on steroids. As the threat level escalates behind the weight of massive government investment, an industry-led clarion will herald a call for governments to protect a civilian Internet that cannot be expected to defend itself against military-grade threats. 
Throughout 2018 and beyond, business will accept and expect that their governments will take responsibility for national infrastructure defence, and policing in the cyber realm will become an extension of your Bobbies on the beat.

Cyber insurance becomes big business

GDPR fines come into play next year, and business is still running around in a mad panic. Nobody wants to be fined an inordinate amount of money for a data breach. This has led to a business area blossoming out of recognition that Government can only do so much when it comes to protecting business. Cyber insurance policies will come to the fore, and businesses will lap them up in an effort to plug the residual risk. The approach promises to remove uncertainty and angst from the issue of information security. 

Unfortunately, this will mean that businesses of all sizes will seek out the minimum cyber security investment laid out by insurers, government, and regulators, rather than going above and beyond to protect their own, and their customers’ data.

Cryptocurrency will get regulated

With new technologies there is often a fear of what is not understood. As cybercrime evolves, and hackers find new ways of monetising pre-existing attack methods, suddenly we see cryptocurrency and ransomware uttered in the same breath. In 2018, we might see governments the world over adopting cryptocurrency, and therefore regulating it in order to stem the flow of cryptocurrency-driven cybercrime. This will undoubtedly be a regulatory challenge, but to ensure a safer online ecosystem for business and consumers alike, it will be one that needs to be addressed.

It’s the beginnings of a cyber bloc party

As governments battle it out in cyberspace, the question of cyber balkanisation rears its head. In 2018, we will see an escalation of the drama around Kaspersky and the US government. 

The long-term implication of this could be game-changing. As governments globally take America’s lead and start rejecting security software, and then sensitive apps and entire operating systems on the grounds of National Security, we will inevitably see cyber balkanisation levels not seen since the Cold War. 

Smaller countries that don’t have their own security vendors, or can’t afford to build their own OS stacks will be forced to align with one major power or another, creating new blocs that will spell out the state of play sooner than we realise. How this will impact enterprise security is unknown, but we won’t be able to rule it out as an area for concern.

Information Security Buzz

You Might Also Read:

Cyber Security Insurance:

Bitcoin: UK And EU Will Crackdown On Crime & Tax Evasion:

Three Cybersecurity Trends Business Should Address:

Ransomware Analysis Suggests A  Bleak Future:
 

« UK Cybersecurity Firm Sophos Is Trouncing Silicon Valley
Iran Turns Off The Internet »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity. The leading Risk Assessment Platform for Critical Infrastructure.

Argentra

Argentra

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Nudge Security

Nudge Security

Nudge Security offer the world's first-ever SaaS security solution to discover shadow IT and curb SaaS sprawl across any device or location and nudges employees towards optimal security behavior.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.