CyberSecurity in 2020[Prediction]

avatar

When information technology touches every day of our daily activities, cybersecurity at the same time will become increasingly needed. CyberSecurity will certainly also play a role in protecting routines and preventing potential cyber incidents. Not just a matter of prevention, CyberSecurity can also help reduce the impact of cyber attacks on existing vulnerabilities. Recent technological developments such as Autonomous Vehicle, Artificial Intelligence (AI), 5G networks, cloud computing, and also the Internet of Things leave more space for CyberSecurity to meet the defense needs of this innovation.

hacking-3112539.png
Source
The National Association of State CIOs (NASCIO) say that in 2020 CyberSecurity remains a major concern for CIOs and CISOs, as was the case in the past decade. And in the 14th episode of Cyber Talk, we raised the 2020 CyberSecurity Prediction based on the results of research conducted by nine Cybersecurity vendors. At the end of this vendor's prediction description, I will give priority order based on the majority opinion of these nine vendors. A saying goes that we will not be able to create protection for cybersecurity until we know what really happened and become a threat. This is a glimpse of a picture that has the potential to occur as a result of analysis revealed from various points of view and analysis results.

Like TrendMicro predictions published on their site. TrendMicro provides CyberSecurity Predictions for 2020 more protection is needed on the applications and online services offered. This is in line with the increasing percentage of companies that have migrated to the cloud in recent years. Defense efforts in 2020 will be increasingly complex due to the increasing area of exposure and misconfigured events. For this reason, deeper attention is needed to the points you can read here.


Not only that, there are still several sites that predict about this (CyberSecurity) in 2020.
FireEye in its analysis emphasizes the CyberSecurity Prediction in 2020 that everyone now has the potential to become a target for attacks. Of course, with a variety of different attack mechanisms. Ransomware deployment techniques will also continue to improve. This makes the process of deploying malware on the company's internal network more difficult to guess. In general, FireEye in its report mentions these points:

  • Increased use of the Cloud will require changes to the cybersecurity architecture.
  • Skill gap for CyberSecurity talent will be even greater, so it requires not only new talent, but also upskill (increased skills) from internal employees.
  • Malware will increasingly threaten the company's supply chain process by continuing to monitor its process weaknesses.
  • The importance of companies and vendors to work together to formulate better cybersecurity.
  • Increased Cyber Criminal operational sophistication. Geopolitic conditions also increasingly affect the increasing intensity of this Cyber Criminal.

Through his analysis in a report entitled: "A Simplified Approach to staying secure in 2020", Watchguard explained several CyberSecurity Predictions in 2020 which generally focused on potential threats related to elections that occurred in several countries to increase the sophistication of the ransomware that is now increasingly targeting Cloud infrastructure.

In a review of an interesting report from Forcepoint entitled: 2020 Forcepoint Cybersecurity Predictions and Trends, mentioned the same thing related to attacks on the electoral voting process. However, Forcepoint gives a deeper discussion related to Deepfakes, even calling the term Deepfakes-as-a-Services will become an even bigger issue in 2020. The issue of Deepfakes first surfaced in 2017 through fake videos created with deep learning mechanisms which mimic celebrity or other individuals. As predicted by Trendmicro, Deepfakes will be a new innovation in Business Email Compromise attacks. This time, in addition to spoofing via email, video and audio can be a new tool to further convince victims of the authenticity of the order. In addition, Forcepoint raised several points in its report on predictions for 2020 here.




0
0
0.000
24 comments
avatar

Congratulations @teach-me! You have completed the following achievement on the Steem blockchain and have been rewarded with new badge(s) :

You made your First Comment

You can view your badges on your Steem Board and compare to others on the Steem Ranking
If you no longer want to receive notifications, reply to this comment with the word STOP

Do not miss the last post from @steemitboard:

Downvote challenge - Add up to 3 funny badges to your board
Use your witness votes and get the Community Badge
Vote for @Steemitboard as a witness to get one more award and increased upvotes!
0
0
0.000
avatar

Hi @teach-me

Cybersecurity is an interesting subject because there is so much to it. We are only as secure as our weakest point. Just like a house where we put the best locks on our front door, backed-up by alarms and cameras etc. If we leave the back window open, that is where the thief will come in. As such, we need to critically examine all possible angles of attack and it is often the human element that surfaces as the weakest link.

I found your point on deep fakes very interesting. I think you are right that we will see more deep fake attacks using a degree of sophistication to con unexpecting users that what they are seeing is true. Interesting times!.

Thanks for sharing. Upvoted.

0
0
0.000
avatar

Actually, I really like lessons related to cyberspace, but no one taught me that. See also my posts at Build-It

0
0
0.000
avatar

Hello @teach-me,

nice article you wrote here!

Cybersecurity/InfoSec/OpSec is indeed a rapidly changing field of expertise... which is the reason I got into this over 20 years ago. I started out as an IT guy aka maid-for-all-work after my education back in 1985 and it was a wild ride up to here! Hahaha!

On the other hand, processes, frameworks and so on... it didn't change so much really in the last 10 years in that regard. Once you've integrated an working ITSM (IT service management) it's the good old cyclic "identify, protect, detect, respond, recover" - or some other variant depending on the framework you use - game.

There are indeed a lot of new InfoSec challenges we'll have to face coming out of the AI/ML field and as you correctly mentioned the deep fake threats are a relatively new threat that has to be dealt with too.

A good thing is that the awareness for InfoSec needs has dramatically risen in the last few year which makes my job a lot easier than it used to be.

Now you can expect that at an board meeting the board members will have a basic InfoSec understanding for the most part for instance. This applies to my job in house as the information security officer as well as for my work as an freelancing IT security consultant.

Cheers!
Lucky
InfoSec threats increasingly make it into mainstream media even nowadays.

0
0
0.000
avatar

Very happy, you responded well about this. Will you have the time to teach me about IT (including knowing hackers' traces).

0
0
0.000
avatar

Hahaha!

That's a wide field my friend!

In my job as a consultant it always begins with an assessment of the existing environment.

Maybe some basics like prevention & detection methods could be a starting point in some cases others require more groundwork like setting up a well functioning backup & recovery system others might lack in processes & methods and there is work required to setup things like an change management process, ticket system, service catalog or an cmdb (configuration management database).

You see all this highly depends on the so called maturity of an environment. More mature environments might be looking for the right control framework to do their due diligence or comply with regulatory requirements. Others might be looking towards an ISO 27001 certification or they need to up their availability standards and you end up tailoring their business continuity plan.

More or less this is the same with the skillset/learning goals you might be looking for.

Inb4 I already was thinking about a little series of posts addressing the basics needed in IT operations to establish an ITSM (IT service management "system") which IT security aspects actually are a part of in most organizations.

Cheers!
Lucky

0
0
0.000
avatar

I wonder if current upcoming global recession will slow down technological advancements. It most likely will.

Any thoughts on that @doifeellucky

0
0
0.000
avatar

Hello Piotr,

oh surely the mechanics "of grace under pressure" ;-) apply here.

Kidding aside, I'm pretty sure that IT organizations always look for ways to work more cost effective and they continuously have to be on their toes because the moment your due diligence shows you are underperforming there are always others that'll love to do "your" work, just a little more cost effective.

What I mean sometimes such pressure leads to even faster technological advancements.

I've lived through a couple of such phases. In the 90ties for instance, were outsourcing and rightsizing were the buzzwords for big old fintech IT shops with big old mainframe infrastructure.

This pressure lead to the evolving client - server environments that are pretty normal nowadays just with added virtualization in different layers.

If you still run a own owned IT environment you cannot close the books on technological advancement either. The "standard" investment horizon for IT infrastructure is 3/5 or even 7 years (for networking infrastructure for instance).

I many cases the bigger = the more cost effective factors push you towards outsourcing partners and they cannot afford to drop the ball on technological advancements either or they'll be gone in the blink of an eye.

So will a global recession slow down or speed up technological advancement? Maybe a little of both! ;-) But IT wise things really never slowed down in my personal experience!

Cheers!
Lucky

0
0
0.000
avatar

Thank you @teach-me for choosing to post within project.hope hive.

I've noticed that you've read about our project economy and you decided to particpate (by setting up 20% beneficiary to ph-fund). Lovely.

Resteemed already. Solid upvote on the way (once our voting power will fully recharge).

ps.
Our discord sever: https://discord.gg/xGADdt

Yours,
@project.hope team,

0
0
0.000
avatar

You're welcome @project.hope, I first read about, or vision and mission @project.hope before I already post here. With pleasure anyone who visits this post.

0
0
0.000
avatar

hi @teach-me

Join our discord. It seem that invitation link has changed: https://discord.gg/yZxwzR

I would like to talk to you and hopefulyl we can end up collaborating. Project.hope has only 10upvotes daily and we're focusing on supporting users who participate in growth of our community.

Chers
Piotr

0
0
0.000
avatar

Cyber security should not be taken with levity as so many fraudulent activities spring up daily on the internet.

0
0
0.000
avatar

One way to survive in cyberspace (the internet), is friendly with hackers who are middle to upper level.

0
0
0.000
avatar

I wonder if current upcoming global recession will slow down technological advancements. It most likely will.

Any thoughts on that @teach-me?

0
0
0.000
avatar

Hello @teach-me

Cyber security is always a very important issue to consider. But I see that it is managed by those who have the power to influence purchases or decisions, to create an opinion matrix, in that sense I think we should have a department of cyber security, something like the guardians of the guardians.

0
0
0.000
avatar

Hi @teach-me

Good theme and good comments.

This can definitely make a difference in this new technological world, each person is responsible for their own security and when it is no longer safe it is because the user no longer cares about their keys.

It is very good that they constantly remind themselves that we are the only ones who can cause a security breach


The topic you're touching is from someone who knows about it.
I wonder how you can be so new to the platform.
You've never heard of steemit???

0
0
0.000
avatar

Hi @lanjoseg.
I answer your question below the line of your comments (on this topic).


I have long known this blog (steemit / busy.org) but only the last 2 days I joined (being a steemit user).
" Previous I was not interested in this blog (steemit) on the grounds that no one gave support for the articles we made, because we were new. Unlike today there are communities and members who provide support for useful articles."
I prefer to make work (scripts for online game mobile, as cheat game PUBG and the like).

0
0
0.000
avatar

I'm glad you're now united ..

Welcome to our community

0
0
0.000