Security Trends For 2022 - The Need For Talent & Cloud Migration

It’s been another challenging 12 months in cyber security with several major breaches during an already turbulent year. 
 
We saw the damaging ransomware attack on Colonial Pipeline, one of most high profile security stories of the year. The attack shut down a 5,500-mile-long pipeline on the east coast of the US, fueling fears over risks to critical infrastructure and global supply chains. 

 
In May, we saw President Biden sign an executive order designed to tackle the nation’s cybersecurity issues head-on, including supply chain security, and, perhaps the most important order of business, a call for government agencies to adopt a zero trust approach.
 
It’s also been the year of crypto currencies, deepfake technology and growth in fraud and scams associated with the pandemic.
 
As we look ahead to another 12 months in the industry, we focus on two trends for 2022.

1. Impact Of The Talent Shortage 

Microsoft  announced a partnership recently with community colleges around the US to provide free resources in an attempt to help end the shortage in cybersecurity professionals by 2025. The question is whether this shortage of readily available talent will impact the security industry over the next year or so and how technology can help to mitigate this. 
 
In the immediate future, the talent shortage will remain a problem. We have found this ourselves. It is getting better, but more investment is needed. People are recognising that security is an interesting and lucrative career, but there aren’t enough people and I think there will always be a struggle to keep up with growing demand. 
 
Look at it from a technology perspective, and it stands to reason that if there are less security incidents to manage, there is less need to recruit new talent into the industry and the impact of the talent shortage will be greatly reduced. 
 
We need to give them the tools that they were hiring services to do in the first place. The shortage is not going away any time soon so solutions need to be built around it. Better solutions will mean fewer incidents.
 
We need automation of solutions and automatic remediation. These tools will need to adapt to changing environments and to be built with a more holistic approach in mind, off-premises, on-premises, in the cloud and in a hybrid environment as work models evolve. 
 
All of this falls under the umbrella of zero trust, and this is the blueprint that businesses should be using as the building blocks to robust security. 
 
2. A Move To The Cloud Will Finally Happen 

While other industries moved operations to the cloud some time ago, there has been some hesitation to shift away from on-premises operations for security leaders. 
 
With the increase in sophisticated threats coming through as many employees work remotely, security leaders can no longer depend on legacy systems for protection, but instead need to shift to cloud native solutions. Factors, such as the increase in ransomware attacks, may influence more security leaders to finally move to cloud based solutions. 
 
But what will drive people and businesses to move to the cloud is the need to do security better. It stands to reason that if they need to improve their approach with security then the cloud is almost certainly going to be the way to go.
 
We are also seeing the pendulum beginning to swing in the favour of the user experience. The emphasis is on how you can carry out your job without negatively impacting the workflow processes and the device choice for the end user. Users must be able to work as and when they expect to and as fast as usual, but security is still implemented. 
 
This points all to the cloud because you need that scalability, you need that global view, device coverage, and you need to be in between the end user and the cloud services that they are accessing. 

Mark Guntrip is Senior Director, Cybersecurity Strategy at Menlo Security

You Might Also Read:

Cyber Security In 2022:

 

« Are Remote Contractors A Cyber Security Risk?
Education Should Focus On Cyber Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

IT Security Association Germany (TeleTrusT)

IT Security Association Germany (TeleTrusT)

TeleTrusT is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Guardsquare

Guardsquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Twilio

Twilio

Twilio are the customer layer for the internet, powering the most engaging interactions companies build for their customers. We provide simple tools that solve hard problems.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.

Eye World

Eye World

Eye World, founded in 2015, is one of Northern Europe’s leading and fastest-growing providers of SaaS solutions in Cyber Security.