What do IT leaders believe the future of the profession will be, and what kind of threats will be most pervasive down the line? Dallas, TX-based cloud security firm Trend Micro recently carried out new research which reveals that over two-fifths (41%) of IT leaders believe that AI will replace their role by 2030. Its predictions report, Turning the Tide, forecasts that remote and cloud-based systems will be ruthlessly targeted in 2021. The research was compiled from interviews with 500 IT directors and managers, CIOs and CTOs and does not look good for their career prospects. Only 9% of respondents were confident that AI would definitely not replace their job within the next decade.
This year saw automation become a mainstream tech trend, with the COVID pandemic causing nation-wide shutdowns. As employees were isolated in their houses, IT companies switched to the work from home model. However, the same could not be replicated in the manufacturing and other secondary industries. This is why, business leaders had to adopt automation practices to sustain their businesses and enable smoother operation of organizational practices (including IT). This trend will not end here.
The growth of myriad cyber-threats continues to accelerate, yet the stream of new and effective cyber-defense technologies has grown much more slowly. The gap between threat and defense has widened, as our adversaries deploy increasingly sophisticated attack technology and engage in cyber-crime with unprecedented power, resources, and global reach. We are in an escalating asymmetric cyber environment that calls for immediate action. The extension of cyber-attacks into the socio-techno realm and the use of cyber as an information influence and disinformation vector will continue to undermine our confidence in systems. The unknown is a growing threat in our cyber information systems.
As IT environments become more dynamic, hybrid, and complex, it's becoming increasingly difficult for security operations center (SOC) teams to quickly detect and address critical threats with traditional tools. SOC staff must process and analyze a massive--and growing--amount of data, as they face ever more sophisticated cyber attacks. To respond effectively, SOC leaders can't keep adding rules-based tools to their already large and often unwieldy security stack. Instead, they need AI technology that analyzes data at scale and in real time and that uses machine learning to spots any anomalies that could signal a breach. That way, SOC teams detect unknown, fast-evolving threats missed by rules-based products configured to spot known attacks.
Gartner's latest Information Security and Risk Management forecast predicts the market will achieve ... [ ] an 8.3% Compound Annual Growth Rate (CAGR) growth rate from 2019 through 2024, reaching $211.4 billion. Bottom Line: In 2021, cybersecurity vendors will accelerate AI and machine learning app development to combine human and machine insights so they can out-innovate attackers intent on escalating an AI-based arms race. Attackers and cybercriminals capitalized on the chaotic year by attempting to breach a record number of enterprise systems in e-commerce, financial services, healthcare and many other industries. AI and machine learning-based cybersecurity apps and platforms combined with human expertise and insights make it more challenging for attackers to succeed in their efforts. Accustomed to endpoint security systems that rely on passwords alone, admin accounts that don't have fundamental security in place, including Multi-Factor Authentication (MFA) and more and attackers created a digital pandemic this year. Interested in what the leading cybersecurity experts are thinking will happen in 2021, I contacted twenty of them who are actively researching how AI can improve cybersecurity next year. Leading experts in the field include including Nicko van Someren, Ph.D. and Chief Technology Officer at Absolute Software, BJ Jenkins, President and CEO of Barracuda Networks, Ali Siddiqui, Chief Product Officer and Ram Chakravarti, Chief Technology Officer, both from BMC, Dr. Torsten George, Cybersecurity Evangelist at Centrify, Tej Redkar, Chief Product Officer at LogicMonitor, Bill Harrod, Vice President of Public Sector at Ivanti, Dr. Mike Lloyd, CTO at RedSeal and many others.
The cybersecurity industry is trending upwards. More people are sharing sensitive data online, which entices criminals to find new ways to attack internet users. Every industry faces change, but the change the cybersecurity industry is facing may threaten job security. What Change is Threatening Job Security? A couple of trends are doing this.
It needs no telling how damaging insider threats can be. Amongst its numerous impacts, the most significant involve the loss of critical data and operational disruption, according to statistics from the Bitglass 2020 Insider Threat Report. Insider threats can also damage a company's reputation and make it lose its competitive edge. Insider threat mitigation is difficult because the actors are trusted agents, who often have legitimate access to company data. As most legacy tools have failed us, many cybersecurity experts agree that it is time to move on.
Let us consider a scenario: one night, an executive responsible for operations for a remote downstream oil and gas refinery gets a call from one of their subordinates saying things started acting up ever since they plugged in a USB they brought from home. Multiple processes have become unstable and commands sent to equipment are not executed as requested. Panicking, they say there has been a cyber attack on the supervisory control and data acquisition (SCADA) system. Valves, pumps, and compressors connected to the system are going haywire, and the organisation's legacy systems were not equipped to prevent whatever new malware snuck into the system. Production comes to a halt for two days.
The mind of an experienced and dedicated cyber-criminal works like that of an entrepreneur: the relentless pursuit of profit guides every move they make. At each step of an attack, the same questions are asked: how can I minimise my time and resources? How can I mitigate against risk? What measures can I take which will return the best results? This way of thinking uncovers why attackers are turning to new technology in an attempt to maximise efficiency, and why a report from Forrester earlier this year revealed that 88 per cent of security leaders now consider the malicious use of AI in cyber-activity to be inevitable.