Prepare for Disruption, Distortion, Deterioration

 
 
By Karen A. Frenkel  |  Posted 05-15-2017 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Prepare for Disruption, Distortion, Deterioration
    Next

    Prepare for Disruption, Distortion, Deterioration

    Traditional business models will be disrupted, data will be distorted and falsified, and privacy regulations will impede firms from monitoring insider threats.
  • Previous
    Premeditated Internet Outages Will Threaten Trade
    Next

    Premeditated Internet Outages Will Threaten Trade

    The core internet structure will be targeted as nations and terrorist groups try to inflict economic damage on adversaries. Recommendation: Engage with internal and external stakeholders about alternative communication methods.
  • Previous
    Ransomware Will Hijack the Internet of Things
    Next

    Ransomware Will Hijack the Internet of Things

    Ransomware will target smart physical devices, possibly endangering lives. Recommendation: Engage with lobbyists for regulations to ensure security standards for IoT devices.
  • Previous
    Insiders Will Be Coerced
    Next

    Insiders Will Be Coerced

    Old-fashioned criminal techniques of coercion will target humans. Recommendation: Identify your mission-critical information assets and the individuals who have access to them.
  • Previous
    Automated Misinformation Will Gain Credibility
    Next

    Automated Misinformation Will Gain Credibility

    Deliberately spreading misinformation, driven by advances in artificial intelligence (AI) personas, will target enterprise. Recommendation: Build such scenarios into your organization's incident management process.
  • Previous
    False Information Will Compromise Performance
    Next

    False Information Will Compromise Performance

    There will be more attacks that compromise an organizations' internal information. Recommendation: Monitor access and changes to sensitive information.
  • Previous
    Blockchains Will Be Subverted
    Next

    Blockchains Will Be Subverted

    Blockchains (digital ledgers of cryptocurrency transactions) will be subverted in order to commit fraud or launder money, destroying trust. Recommendation: Appoint a sponsor or steering committee to oversee the adoption and use of blockchain.
  • Previous
    Surveillance Laws Will Expose Corporate Secrets
    Next

    Surveillance Laws Will Expose Corporate Secrets

    Organizations will be unable to define the security management of data collected in bulk by communications providers, so attackers will exploit this. Recommendation: Collaborate and conduct risk assessment of the impact of lost metadata.
  • Previous
    Privacy Regulations Will Impede Monitoring
    Next

    Privacy Regulations Will Impede Monitoring

    Restrictions on individual profiling will force organizations to decide whether to defy regulations or to lose their ability to monitor insider threats. Recommendation: Seek legal advice regarding user profiling wherever your company has locations.
  • Previous
    Unexpected Outcomes in the Rush to AI
    Next

    Unexpected Outcomes in the Rush to AI

    AI will go beyond the understanding of business leaders, developers and system managers, and, as a result, it will create new vulnerabilities. Recommendation: Recruit and develop AI talent.
 

A recent report predicts that traditional business models will be disrupted over the next two years, and it advocates "unprecedented levels of collaboration" within enterprises and among external partners, manufacturers, vendors and regulators to safeguard security. Disruption results from an over-reliance on fragile connectivity, which includes two other themes—distortion and deterioration, the report says. Distortion occurs because of the loss of the information integrity, which will require monitoring access and changes to sensitive information. Deterioration happens when regulations and technology erode controls. The report, "Threat Horizon 2019," is the most recent in an annual series published by the Information Security Forum, an independent not-for-profit dedicated to information security. "With established controls rendered ineffective by the latest security threats, new and innovative ways must be found to protect an organization's most critical information assets," said Steve Durbin, ISF's managing director. Following are highlights of the report, including recommendations.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register