Over the last few weeks, a number of NTT Security experts have shared their trends, predictions and forecasts (however you call them) for 2018. All make interesting reading, so be sure to check them out.
A recurring theme, for example, is the role that cybersecurity will play in digital transformation projects and, of course, how the General Data Protection Regulation (GDPR) will force organizations to assess their wider data security practices. I have a few predictions to add to the list. They are:
Log collection and analysis
Organizations will increase the amount of log data they collect and need to analyze. They will look to high speed platforms to help with searching and analyze the large amount of information they will collect. This will help with detection and threat hunting activities. Part of that analysis may include machine learning and assistance with pattern recognition and behavior anomalies. While mature organizations will be more selective of the data they collect based on their detection requirements, overall the volume of data will continue to increase. Along with this increase in overall volume, there is a need to search and analyze this data as quickly as possible.
Organizations will continue to leverage cloud services. While some organizations are just moving to cloud computing (IaaS), other are fully adopting the cloud and using Software as a Service (SaaS). While a certain level of security comes along with some of these cloud vendors, clients will ultimately still be responsible for the protection of their data, no matter what environment that data exists in. Cloud Access Service Brokers (CASB) and other cloud auditing capabilities will become more predominant in the marketspace and a necessity for organizations.
Especially at home, the number of IoT devices will continue to increase. On the commercial side, Operational Technologies (OT) will gain more traction in automated factories and critical infrastructure. The protection of these is important from many different avenues including protection of human life and usage in large scale cyber attacks. As more of these devices are deployed and used, the security with them continues to be highly immature and organizations do not properly deploy and protect these technologies.