Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

5 Cybersecurity Trends for 2017

Blog >5 Cybersecurity Trends for 2017
5 Cybersecurity Trends for 2017

It’s December, the holidays are upon us, and it’s that time of the year for the proverbial “2017 predictions” blog. Not to be left out of all the fun, we went around to a few of our resident industry experts here at Stealthbits to get their opinions of what trends will emerge in the New Year within the world of cybersecurity. Check out what they had to say:

Trend #1 – Create a Cybersecurity Talent Brand

“Let’s face it – right now in 2016, there’s a shortage of good cybersecurity talent. And unfortunately, it might not get much better in 2017. Organizations need to and will start creating new ‘corporate brands’ to help attract top talent. This means giving high-level security folks the opportunities they want, such as:

  • Challenging, varied assignments
  • Collaboration with skilled peers
  • Employer-funded training and certifications (e.g. CISSP)
  • Flexible work hours and competitive compensation
  • Promotions that don’t require moving into management

By providing a work environment that is challenging and rewarding, companies will have a much easier time winning and retaining top security talent.”


Trend #2 – Get Back to the Security Basics

“I’m always surprised to see how often organizations allow their unstructured data to be unprotected when it accounts for about 80% of their total data. This leaves them exposed to tremendous risk. In 2017, companies can close this gap by returning to the basics of security.

The first step is gaining visibility into their unstructured data. This includes who has access to it and what they are doing with that access. Armed with this information, they can establish a Data Access Governance program to limit the amount of unstructured data, as well as access to it.

Step two is obtaining visibility into Active Directory and Windows Operating Systems. This is to ensure that all passwords, configurations, and settings align with security best practices. That can mean removing inappropriate access rights in Active Directory and fixing improperly configured systems so attackers can’t obtain the privileges needed to seriously compromise credentials, data, and resources.”

  • Adam Rosen, VP, Data Access Governance Solutions


Trend #3 – Detect and Prevent Breaches with User and Entity Behavior Analytics (UEBA)

“It’s estimated that 82% of attackers compromise victims within minutes. It just takes one compromised account for an attacker to get into the network, move from system to systems to steal credentials, and obtain Domain Admin privileges that allow them to easily steal data. Companies are starting to realize they can’t afford to wait days, weeks, or even months to uncover these attacks.

In 2017, utilization of UEBA solutions will become much more widespread. By leveraging UEBA, organizations can quickly detect these abnormal activities that indicate compromise, often in real-time. This will lead to quick remediation and greater overall security posture.”

Trend #4 – Maximize IT Investments for a Complete Security Program

“Thinking about IAM, DLP, PIM, and SIEM, it seems like security has recently become a dizzying alphabet soup of acronyms. The fact is, most organizations employ one of more of these solutions and they represent significant IT investments. The problem though is they aren’t integrating their capabilities to create an end-to-end security program.

To accomplish this in 2017, companies need to fully leverage their technology investments. This means reducing access to sensitive data, monitoring and enforcing appropriate use of privileged accounts, and detecting abnormal behavior or other signs of a breach.

However, this can’t be done alone. These solutions need help. This will come in the form of tools designed to greatly enhance their capabilities. For example, taking IAM and extending it into unstructured data, while being able to monitor security groups providing access to sensitive data for membership changes sourced from a DLP solution, all the while monitoring privileged accounts for unauthorized authentications sourced from a PIM system. And to tie a ribbon around it all, feeding only the most relevant data into SIEM to reduce noise generated by native logs.”


Trend #5 – Make Security Part of Doing Business

“Next year organizations will not only put a lot of resources into beefing up their security infrastructure but also into educating employees on best practices. How often have you seen someone leave with their computer unlocked when they go to lunch or use an embarrassingly weak default password? Don’t even get me started on employees that copy sensitive information onto easily lost USB flash drives.

To educate them, companies must create their own internal security programs. They can incorporate concepts as simple as:

  • Adopting a least privilege security model
  • Training on how to spot a phishing email or scam website
  • Locking up vulnerable devices
  • Ensuring IT staff comply with best practices
  • Enforcing policies around abolishing the use of personal email in the work environment

Once these basics are established, you can then move on to more sophisticated measures, like multi-factor identification or using a Privileged Identity Management vault to access passwords used for critical systems.”

Don’t miss a post! Subscribe to The Insider Threat Security Blog here:


Featured Asset

Leave a Reply

Your email address will not be published. Required fields are marked *




© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.