Skip to main content
Articles

Top 10 Security Challenges for 2017

By August 25, 2017#!28Thu, 28 Feb 2019 10:45:42 -0300p4228#28Thu, 28 Feb 2019 10:45:42 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:45:42 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:45:42 -03004510452amThursday=904#!28Thu, 28 Feb 2019 10:45:42 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:45:42 -0300p4228#/28Thu, 28 Feb 2019 10:45:42 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:45:42 -0300pAmerica/Sao_Paulo2#No Comments

by Doug Olenick & #8211; SC Magazine

The first half of 2017 has not exactly been a ride in the park for cybersecurity professionals.

Some of the highlight events so far this year have been the Shadow Brokers regularly dumping NSA hacking tools for public consumption, cybercriminals then using these shiny new toys to run amok producing WannaCry and NotPetya and most recently HBO being threatened with having its hottest show unveiled early unless a $6 million ransom is paid.

So will the last few months of 2017 see a continued level of activity or will things calm down as the bad guys take off for the holidays? SC Media asked some of the top executives in the field for what they see as the biggest threats and problems that will be faced in the next few months. This will be a living list with more threats being added as they appear.

1. Malware with worm capabilities

Jerome Segura & #8211; Lead malware intelligence analyst at Malwarebytes

Wannacry shocked the world by its rapid spread and this would not have been possible without its worm component. It reminded us of how quickly malware can propagate with devastating effects. Sadly, other malware authors have realized it too and are starting to add worm capabilities to their malware, such as recently with the Trickbot banking trojan.

2. Release of more Shadow Brokers tools

Jeff Schilling & #8211; Chief Security Officer at Armor

EternalBlue and DoublePulsar, the critical component of the WannaCry worm are potentially just the tip of the iceberg of what may be coming from the Shadow Brokers. These sophisticated tools, in the hands of less than a sophisticated adversary, had massive global impact. Expect more to come.

3. Getting back to basics (patching, endpoint, hygiene)

Matt Pascucci & #8211; Cybersecurity Practice Manager at CCSI 

This is the biggest issue of the year and the malware has shown just how easy it is to comprise systems.

4. The vulnerability of mobile carriers

 Elad Yoran & #8211; Executive Chairman of KoolSpan

“Undoubtedly one of the most important security challenges facing us today is the growing realization that the carrier networks that transport the world & #8217; s voice and data communications are systemically vulnerable to interception and monitoring. Hackers, terrorist organizations, foreign governments and others take advantage of these internetworking protocols and exploit them on a regular basis from anywhere around the world.

5. Stop overwhelming clients with alerts!

Ben Herzberg, Head of Application Security Research at Imperva

Security controls generate a lot of alerts that can easily overwhelm an organization. In large organizations such as banks, it is common to have over 100,000 security alerts per day. As you can imagine, this requires a battalion of security engineers and analysts to sort through.

6. Adapting the firewall to face new threats

Jody Brazil, co-founder and chief product strategist, FireMon

“The evolution of the firewall is not complete. Networking technology is changing rapidly and the firewall will have to adapt. Cloud, SDN and containers threaten the traditional role of the firewall. The traditional network segmentation is being replaced with very flat networks & #8211; which removes a lot of network complexity, but introduces a significant challenge to the firewall.

7. Monitoring Cloud Configuration and Security

Tim Erlin, Vice President, Product Management and Strategy at Tripwire

Organizations continue to adopt cloud technologies at a rapid rate, but information security is not keeping up. There have been discovered misconfigurations leading to data leaks, but for every one of these found, there are likely many more that are not published. With a rapid rate of technological change, huge variation of skills, and fast paced adoption, it & #8217; s clear that monitoring cloud assets and infrastructure will continue to be a challenge. 

8. High Impact Attacks

Limk Kessem & #8211; executive security advisor at IBM Security

Thinking about the biggest challenges for the remainder of the year, the one that stands out for the most to me is “impact.” No one can deny the destructive effect of attacks we found this year so far, from Shamoon v2, to WannaCry, and NotPetya, the world witnessed the power of malicious code at its highest impact to date. For the rest of the year, organizations cannot ignore the overall increasing risk of highly advanced leaked code which has been widely used against organizations of all types and sizes and spreads quickly without discrimination. These attacks have shown us that it's just simply an organizations customer data, trade secrets, or finances that are at stake - entire operations have been shut down with devastating effects on business, employees and end users.

9. The Insider Threat

Itsik Mantin & #8211; head of data security research at Imperva

Similar to previous years, many of the breaches seen in the last year were not the result of hackers penetrating the organization and stealing data from it, but employees and third parties who have access to sensitive data for the sake of their work, that in some cases steal the data, where in other cases leak it by sending it accidentally to unauthorized recipients. The challenge with data breaches involving insiders and third parties is double. Not only do the attackers have much more inside info than an external attacker, but since no malware is involved and no penetration happens through the perimeter organization, many of the common security mechanisms, like firewalls and anti-viruses, become blind to these attacks happening .

10. Operationalizing GDPR

Chris Olson & #8211; CEO of The Media Trust  

The EU & #8217; s pending data protection regulation ushers in a world of change for enterprise security teams. Beyond identifying and documenting data elements and data collection activity, IT and security professionals will join forces with privacy, risk and compliance officers to operationalize data governance policies. Implementation of compliance mechanisms to ensure data protection policies including including data unknowingly collected by third parties from everyday website operations 1 are actively monitored and enforced will be a key focus leading up to May 2018. 

Leave a Reply