Security Architecture, Cloud Security, Endpoint/Device Security, Endpoint/Device Security, Security Strategy, Plan, Budget, Vulnerability Management, Patch/Configuration Management, Threat Management, Malware, Ransomware, Threat Management, Governance, Risk and Compliance, Compliance Management, Privacy, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Top 10 Security Challenges for 2017

The first half of 2017 has not exactly been a ride in the park for cybersecurity professionals.

Some of the highlight events so far this year have been the Shadow Brokers regularly dumping NSA hacking tools for public consumption, cybercriminals then using these shiny new toys to run amok producing WannaCry and NotPetya and most recently HBO being threatened with having its hottest show unveiled early unless a $6 million ransom is paid.

So will the last few months of 2017 see a continued level of activity or will things calm down as the bad guys take off for the holidays? SC Media asked some of the top executives in the field for what they see as the biggest threats and problems that will be faced in the next few months. This will be a living list with more threats being added as they appear.

1. Malware with worm capabilities

Jerome Segura - Lead malware intelligence analyst at Malwarebytes

Wannacry shocked the world by its rapid spread and this wouldn't have been possible without its worm component. It reminded us of how quickly malware can propagate with devastating effects. Sadly, other malware authors have realized it also and are starting to add worm capabilities to their malware, such as recently with the Trickbot banking trojan.

2. Release of more Shadow Brokers tools

Jeff Schilling - Chief Security Officer at ‎Armor

EternalBlue and DoublePulsar, the critical component of the WannaCry worm are potentially just the tip of the iceberg of what may be coming from the Shadow Brokers.  These sophisticated tools, in the hands of a less than a sophisticated adversary, had massive global impact.  Expect more to come.

3. Getting back to basics (patching, endpoint, hygiene)

Matt Pascucci - Cybersecurity Practice Manager at CCSI 

This is the biggest issue of the year and the malware has shown just how easy it is to comprise systems.

4. The vulnerability of mobile carriers

 Elad Yoran - Executive Chairman of KoolSpan

“Undoubtedly one of the more important security challenges facing us today is the growing realization that the carrier networks that transport the world's voice and data communications are systemically vulnerable to interception and monitoring. Hackers, terrorist organizations, foreign governments and others take advantage of these internetworking protocols and exploit them on a regular basis from anywhere around the world.

5. Stop overwhelming clients with alerts!

Ben Herzberg, head of application security research at Imperva

Security controls generate a lot of alerts that can easily overwhelm an organization. In large organizations such as banks, it is common to have over 100,000 security alerts per day.  As you can imagine, this requires a battalion of security engineers and analysts to sort through.

6. Adapting the firewall to face new threats

Jody Brazil, co-founder and chief product strategist, FireMon

“The evolution of the firewall is not complete. Networking technology is changing rapidly and the firewall will have to adapt. Cloud, SDN and containers threaten the traditional role of the firewall. The traditional network segmentation is being replaced with very flat networks - which removes a lot of network complexity, but introduces a significant challenge to the firewall.

7. Monitoring Cloud Configuration and Security

Tim Erlin, Vice President, product management and strategy at Tripwire

Organizations continue to adopt cloud technologies at a rapid rate, but information security isn't keeping up. There have been discovered misconfigurations leading to data leaks, but for every one of these found, there are likely many more that aren't published. With a rapid rate of technological change, huge variation of skills, and fast paced adoption, it's clear that monitoring cloud assets and infrastructure will continue to be a challenge. 

8. High Impact Attacks

Limor Kessem - executive security advisor at IBM Security

Thinking about the biggest challenges for the remainder of the year, the one that stands out the most to me is “impact.” No one can deny the destructive effect of attacks we encountered this year so far, from Shamoon v2, to WannaCry, and NotPetya, the world witnessed the power of malicious code at its highest impact to date. For the rest of year, organizations cannot ignore the overall increasing risk of highly advanced leaked code which has been used widely against organizations of all types and sizes and spreads quickly without discrimination. These attacks have shown us that it's not just simply an organizations customer data, trade secrets, or finances that are at stake – entire operations have been shut down with devastating effects on business, employees and end users.

9. The Insider Threat

Itsik Mantin - head of data security research at Imperva

Similar to previous years, many of the breaches seen in the last year were not the result of hackers penetrating the organization and stealing data from it, but employees and third-parties that have access to sensitive data for the sake of their work, that in some cases steal the data, where in other cases leak it by sending it accidentally to unauthorized recipients. The challenge with data breaches involving insiders and third-parties is double. Not only do the attackers have much more inside info than an external attacker, but since no malware is involved and no penetration happens through the organization perimeter, many of the common security mechanisms, like firewalls and anti-viruses, become blind to these attacks happening.

10. Operationalizing GDPR

Chris Olson - CEO of The Media Trust  

The EU's pending data protection regulation ushers in a world of change for enterprise security teams. Beyond identifying and documenting data elements and data collection activity, IT and security professionals will join forces with privacy, risk and compliance officers to operationalize data governance policies. Implementation of compliance mechanisms to ensure data protection policies--including data unknowingly collected by third parties from everyday website operations--are actively monitored and enforced will be a key focus leading up to May 2018. 

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.