EDITOR’S QUESTION
Rafik Hajem
Vice President, EMEA,
Guidance Software
In 2017, cyber crime will continue to grow
in sophistication and frequency and be an
even greater challenge for organisations
across the globe. Despite huge (and
growing) investments in perimeter
security technologies like endpoint
protection, in 2017 we will see again that
no solution can stop 100% of attacks.
Breaches will still occur, and organizations
without the tools to find, analyse and
remediate threats within their networks
will suffer, potentially greatly.
Many vendors promise to eliminate
“99% of all threats.” Well, that 1%
that remained in 2016 represented
the successful breaches that cost
organizations an estimated $500B
during the year. In 2017, more
companies will invest in endpoint
detection and response (EDR) tools
to complement their perimeter
security investments. With a focus
on sophisticated techniques and
remediation technology, EDR solutions
are imperative to help security teams
identify unknown and zero-day attacks
that penetrate even the most advanced
perimeter security.
Next year, clients will look for complete
solutions that include a variety of tools
for detection, investigation, remediation,
and coordination. Tools like threat
intelligence, sandboxing, forensics,
analytics and artificial intelligence will
be required to detect advanced zeroday attacks. After detection, forensic
security and EDR tools will be needed
to determine how far an adversary
progressed and to remediate any
www.intelligentcio.com
issues. We’ll also see the rise of Security
Orchestration products, allowing InfoSec
to coordinate, automate and make
sense of their many tools.
Finally, 2017 will bring a shift to more
data-centric security. Meaning that in
2017, companies will finally demand
an answer to the question, “Where
does our sensitive data actually reside?”
For too many years the industry has
employed security professionals to
cutoff breaches before adversaries
reach privileged data. But this strategy,
only attacks the problem from one
angle. In practice, security teams rarely
know the location of the data they’re
trying to protect. Next year, companies
will focus more on understanding how
information is generated, where it is
stored, and how it can be proactively
protected to reduce their surface
area of digital risk and also to comply
with a growing number of regulatory
mandates around the world.
INTELLIGENTCIO
79