• Register
Return to: Home > Comments > Comment: Cybersecurity, top trends in 2016

Comment: Cybersecurity, top trends in 2016

Ken Allan, global cybersecurity leader at EY, outlines for The Accountant's readers a watch list of trends that businesses should be aware of in year ahead


Cyber threats from the interconnected world
The sophistication of cyber-attacks is increasing, especially regarding attack routes, which are growing exponentially due to the rise of the Internet-of-Things (IoT). Long gone are the days of the client-server architecture and limited Internet access gateways, which was relatively easy to protect, with mobile, social media, customer and supplier ecosystems. Now, with the IoT, everything is connected with everything else. Previously disconnected systems - things are now becoming Internet-enabled, and "channel hopping" from one system to the next is a real threat to organizations. Approaches to cybersecurity will need to encompass the IoT. For example, the Security Operation Centre (SOC) will need to extend its coverage to include the IoT, and it should be subject to security reviews and penetration testing.

Growth in digital identities
The dramatic growth in the IoT means that organizations must rethink how they recognize and treat identities. Up to relatively recently, identities have all been associated with real people. To manage these traditional identities, organizations maintained directories - simple lists of staff, used to decide who should have access to what. The same approach has been used with customers, suppliers and third parties. When "things" are in the mix, and they may be owned and governed by different entities, the "directory lookup" function no longer applies. Instead, new collaborative trust models will need to be developed to enable trust to be shared from one IoT device, which has a high degree of trust, to another. This approach will require organizations to establish robust data ownership and date protection policies.

Hyper-regulation leading to a more complicated landscape
Hyper-regulation for all sorts of issues related to cybersecurity will make the compliance landscape even more complicated. This will not necessarily lead to better cybersecurity for many organisations, given the differences in regulation across jurisdictions.
For example, with the demise of the (Safe Harbour) agreement between the EU and the United States, it is likely that EU nations will develop separate regulation on data privacy over the next year, which will result in additional challenges for organisations covering many jurisdictions.
In addition, regulations around breach reporting, checks on cybersecurity maturity, and expectations of cyber exercises/incident response planning are proliferating, with little consistency across jurisdictions. The danger is that organisations will become so focused on complying with different requirements across jurisdictions that their ability to develop an overall strategic and balanced approach to cybersecurity improvements across their business will be jeopardized.

Criminal marketplace will become increasingly professional
The traditional classification of types of cyber attackers, their motivation, and skill levels is quickly evolving. Skilled individuals are able to advertise and sell their services to any interested group. As a result, these attacks become easier to launch, as long as there is money to pay for expertise. For example, it is easier to:
a. Buy sophisticated malware from credentialed vendors;
b. Deploy this malware, either through buying help or buying instructions along with the malware; and
c. Advertise for buying or selling criminal services.
Due to these changes, it is more important than ever for organizations to conduct a tailored threat assessment aligned to protect their most valuable data, and establish mitigation measures around vulnerabilities for access to it. In fact, all attackers - whether a 16 year old working alone, or an organised criminal network, or an insider - are getting more access to ways to compromise their chosen targets.

Traditional models for defense are no longer adequate
Our increasingly connected world continuously pushes the defensive capabilities of even the most mature organization. This is compounded by the diverse set of cyber attackers, their wide array of motivations and their continuously evolving tactics and techniques. The regular reporting of successful attacks indicates that traditional models for defense are no longer adequate. Leading organizations are looking for ways to more proactively engage their highest risk adversaries and protect their most critical data assets.

Advanced "active defense" to detect and respond to advanced cyber attacks
Advanced capabilities, such as "active defense," are being enabled through the use of security analytics. For example, security analytics can be used to detect deviations that are consistent with cyber attackers. Another example, behavioral analytics, has a significant advantage in "active defense," because it can be self-learning; it does not require evidence of past malicious behavior. Our perspective is that a mature and integrated set of security operations capabilities - powered by data science and an analytics platform - enables the visibility, context and insight needed to detect and respond to advanced cyber attackers. Moreover, by applying "active defense" techniques and leveraging security analytics, organizations will be able to shift the paradigm from reactive to proactive.

Top Content

    Accountancy Europe: the winner takes it all

    Jonathan Minter spoke to Olivier Boutellis-Taft, chief executive officer at Accountancy Europe, about how technology could change the industry, and how training needs to keep up to enable the profession to develop

    read more

    Embracing global technology trends

    Accountancy Europe’s Digital Day 2018 found the European accounting profession looking to tackle the challenges presented by new technologies head on. Jonathan Minter reports from the day

    read more

    IMA Conference: automation of the audit

    At the annual conference of the Institute of Management Accountants (IMA) in Indianapolis, Deloitte partner Alex Smith gave a presentation on digital transformation in the profession. Joe Pickard spoke to Smith following the presentation to find out more about his views on the future of audit

    read more

    IMA Conference: technology and the human effect

    The annual conference of the Institute of Management Accountants (IMA) took place in Indianapolis this year. Members of the profession gathered to hear the latest from the institute and other market players, covering some of the challenges and opportunities the profession faces.

    read more

    The Caribbean: a digital paradise

    The ICAC hosted its 36th annual conference in June this year – very much looking to the future following a tough 2017 for the Caribbean. Jonathan Minter spoke with chief executive officer Misha Lobban Clarke

    read more
Privacy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.