Intelligent CIO Middle East Issue 13 | Page 79

EDITOR’S QUESTION Rafik Hajem Vice President, EMEA, Guidance Software In 2017, cyber crime will continue to grow in sophistication and frequency and be an even greater challenge for organisations across the globe. Despite huge (and growing) investments in perimeter security technologies like endpoint protection, in 2017 we will see again that no solution can stop 100% of attacks. Breaches will still occur, and organizations without the tools to find, analyse and remediate threats within their networks will suffer, potentially greatly. Many vendors promise to eliminate “99% of all threats.” Well, that 1% that remained in 2016 represented the successful breaches that cost organizations an estimated $500B during the year. In 2017, more companies will invest in endpoint detection and response (EDR) tools to complement their perimeter security investments. With a focus on sophisticated techniques and remediation technology, EDR solutions are imperative to help security teams identify unknown and zero-day attacks that penetrate even the most advanced perimeter security. Next year, clients will look for complete solutions that include a variety of tools for detection, investigation, remediation, and coordination. Tools like threat intelligence, sandboxing, forensics, analytics and artificial intelligence will be required to detect advanced zeroday attacks. After detection, forensic security and EDR tools will be needed to determine how far an adversary progressed and to remediate any www.intelligentcio.com issues. We’ll also see the rise of Security Orchestration products, allowing InfoSec to coordinate, automate and make sense of their many tools. Finally, 2017 will bring a shift to more data-centric security. Meaning that in 2017, companies will finally demand an answer to the question, “Where does our sensitive data actually reside?” For too many years the industry has employed security professionals to cutoff breaches before adversaries reach privileged data. But this strategy, only attacks the problem from one angle. In practice, security teams rarely know the location of the data they’re trying to protect. Next year, companies will focus more on understanding how information is generated, where it is stored, and how it can be proactively protected to reduce their surface area of digital risk and also to comply with a growing number of regulatory mandates around the world. INTELLIGENTCIO 79