More SCADA system exploits are likely to be reported. DDoS attacks and ransomware will continue to trouble organisations. Privacy issues will gain prominence, nationally and internationally, keeping policy makers busy.
Nandkumar Saravade, Data Security Council of India
Cloud-based cyber security technology will continue to erode traditional, appliance-based solutions. The realization of lowering OPEX and CAPEX costs, along with increased capacity, computation power, and effectiveness will become dominant.
Paul Kraus, Eastwind Networks
We expect public cloud adoption to continue to grow. This will force companies to rethink the way they secure their resources, and will encourage service providers to develop new security and networking tools that are native to cloud platforms.
Sanjay Ramnath, Barracuda Networks
One word: litigation. And lots of it. 2016 will be the year that cybersecurity and data breach lawsuits reach new records. Unprepared businesses may take big losses or be driven into oblivion.
James Goodnow, LegalCommentator.com
It’s the year of encryption. Encryption will be deployed by everyone, allowing personal and business data to be protected in transit and at rest, preventing data breaches in the cloud.
Ebba Blitz, Alertsec
Analytics has become a powerful tool in the detection of cyber threats, but 2016 will focus on operationalizing these capabilities so detection can be tied to “next steps” in remediation.
Usman Choudhary, ThreatTrack Security
I see autonomic data governance gaining momentum as a means for augmenting traditional information protection protocols. Best thing about it.. eliminates passwords and at the same time ENFORCES company governance policies at the data layer with little or no loss of performance.
Dan Fischer, SertintyONE
Cybersecurity is the #1 concern in today’s environment. Enhanced Malware, Ransomware and Cyber Reconnaissance will become deeply enhanced moving forward. Adding Cyber Insurance will become mainstream.
Jim Angleton, AEGIS FinServ Corp
As data breaches from third party suppliers increase, cybersecurity tech will extend beyond internal security perimeters to encompass security awareness and monitoring of outside vendors and partners.
Yelena Osin, SecurityScorecard
There is a false perspective that sophisticated attacks are too difficult to prevent. But detection is NOT the new prevention. The mission must be to STOP them, not just become proficient at detecting them.
Lior Kohavi, Cyren
CISOs should assume hackers will find a way into the network, and shift from breach prevention to breach detection, monitoring the network in real time for signs of nefarious activity.
Brandon Hoffman, Lumeta Corporation
Businesses struggling to get adequate cyber security insurance coverage will look to cyber security solutions like secure communications clients and stress testing in order to save money on insurance rates.
Matthew Taylor, XAHIVE
The immediate future in cybersecurity is a shift to implement endpoint visibility as an augment to network-based observations. Scaling this requires significant levels of technology and human expertise.
Phil Hagen, Red Canary
Increasingly companies will offer consumer products through mobile platforms with the easiest access possible. “Ease of access” always comes at the cost of security therefore we’ll see increased data thefts.
Jeffrey Bernstein, T&M Protection Resources
Attacks via Internet of Things devices are going to become more and more commonplace as IoT reaches mainstream adoption, both at home and in the workplace.
Cortney Thompson, Green House Data
A few years ago, security prophesiers were called paranoid. Now cybersecurity is business necessity. Security tech must shift from preventing vulnerabilities to making network intrusion significantly less fruitful for hackers.
Margaret Walker, Cohesive Networks
We will move away from hardware-based security gateways, VPNs etc. toward cloud-based end-user encryption. The easiest path you give users to data protection, the more secure a network will be.
Wael Aggan, CloudMask
The attacks will evolve using polymorphic behaviors. We should also expect a development of complex adware in the next future. Highly effective and targeted attacks will replace large scale operations.
Robert Knapp, CyberGhost VPN
In 2016 we’ll see a headline compromise of a business, whether at the enterprise or consumer level, through low standards of security for mobile apps. It’s a ticking time bomb…
Marcus de Wilde, Codified Security
Cyber security will move toward an adaptive model where organizations correlate multiple sources of threat intelligence so they can deploy the right solutions for visibility, prevention, detection and response.
Kane Lightowler, Bit9 + Carbon Black
Not only will this kind of attack continue, but a change in it – “I will infect someone’s device with ransomware for you for a reasonable price”—will likely expand.
Robert Siciliano, BestCompany
Preventive controls such as classic anti-virus will become more and more useless and organizations will focus on detective and corrective controls (e.g. monitoring and incident response).
Stefan Sulistyo, Alyne.com
I expect we’ll see Security and DevOps teams working together closely in a cohesive approach to achieve a continuous delivery framework that delivers faster, more secure applications.
Patrick O'Donnell, Actifio
Although an absolute pledge of protection against data loss is far-fetched, client-side encryption is quickly emerging as the most realistic alternative to end-to-end encryption.
Tunio Zafer, pCloud
The primary change in Cybersecurity will be a movement towards password replacement using several alternatives.
Tony Perez, NetLok
The challenge for Cybersecurity in 2016 is skills. Technology is moving faster than our skill set. Core education from school to university needs to adapt with the new World.
Alita Harvey-Rodriguez, Milk it Academy
More and more organizations will be shifting away from the antiquated detection-based approach used in products like anti-virus, to the next generation isolation-based approach.
Zuly Gonzalez, Light Point Security
Most I.T. professionals and their bosses will discover (the hard way) exactly how little they know about Cybersecurity, much less implementing meaningful protective measures and staying accountable to leadership.
J. Colin Petersen,J - I.T. Outsource
Expansion in new security solutions and services again, meaning overlap of great ideas (with some fakers). New technology and choices for organizations, but be wary…the market will inevitably contract.
Ron Schlecht Jr, BTB Security
Employees continue to bring their own devices (BYOD) into the workplace and efforts need to be made to secure these devices.
Bill Carey, RoboForm
Cybersecurity is still mainly focused on prevention. Today the challenge is the ability to detect an active network attacker that has circumvented preventative security. Attackers will get in; one needs to find them before they can steal or cause damage.
Peter Nguyen, LightCyber
Public key infrastructure and blockchain technology introduce a new method for creating secure organizational framework and ensuring data integrity across a network. PKI solutions for blockchains are one to watch for.
Micah Winkelspecht, Gem
Enterprises need to strike an equal balance between their protect and defend approaches. Tilt the balance, and the security strategy will not be as effective to combat today’s cyber crime.
Lim Chin Keng, F5 Networks
Understand adversaries WILL infiltrate organisations – focus on limiting the damage they can do once in. Micro-segmentation, dividing physical networks into hundreds of logical micro networks, or micro segments, is key.
Tom Patterson, Unisys
Markets all over the world will see a rise in ‘insider breaches,’ with more public examples of data breaches occurring from the inside the company. Organisations that only focus on their perimeter, need to understand that threats can come from anywhere.
Eddie Sheehy, Nuix
In 2016, we expect to see an increase in breaches of cloud services, and hackers will use credentials to cloud services as a major attack vector. Social engineering tactics will focus on mimicking cloud login screens to gain credentials.
Damien Manuel, Blue Coat
This post first appeared on Flarrio - Creating Competitive Edge Using Emerging, please read the originial post: here