Daren Glenister

RSA Conference: FUD-free or filled?

IoT 15 Billion Units By 2021

At the annual RSA conference, there were plenty of discussions and presentations on the evolving cybersecurity threat landscape, including application security issues, the internet of things (IoT) and data analytics. While conversations circling the exhibition floor touched on all cybersecurity niches, there were a few themes that emerged as the most pressing for enterprises and their IT security teams in 2017.

The Internet of Things (IoT): Connected bliss or security downfall?

According to new research conducted by Juniper, the number of IoT devices available on the market will reach more than 15 billion units by 2021. Rapid adoption is being propelled by the numerous benefits IoT devices present to enterprises, including the optimization of processes and increased business agility. That said, it’s no surprise IoT security was a popular topic at this year’s RSA Conference.

Many experts presenting at the conference predicted that IoT will become a major threat to enterprises in the year to come. There is a valid concern about IoT devices increasing the attack surface for organizations. Many individuals are now calling for more stringent government regulations to enforce security, while others feel these ‘regulations’ should come from the industry itself. In fact, some experts think more members of the security community need to hack and test devices to help improve overall security posture.

As the debate between security and novelty rages on, it’s obvious IoT isn’t going away anytime soon, and neither will the ongoing attacks surrounding it. When looking ahead at future IoT discussions, it will be important to consider compliance and data sovereignty of the data being captured.

Ransom on the Rise

Blocking access to key systems or data until the victim pays a ransom is more prevalent than ever before, and as long as these attacks remain profitable, ransomware shows no sign of declining. With lower ROI on stolen patient records due to a surplus available on the black market, hackers are now seeking more profitable channels of attack. According to a recent report by the CyberEdge group, more than 60 percent of organizations suffered from some form of ransomware attack in 2016. So, what’s in store this year?

When it comes to this aggressive cyberattack, most experts agree that “you ain’t seen nothing yet.” As criminals continue to perfect this attack method and turn to ransomware to stay profitable, we can expect to see a significant increase in the number of attacks and an increase in the ransom demands— especially as cyber criminals begin to penetrate organizations at a deeper level. Overall, criminals are becoming smarter and faster than IT teams who are attempting to close the ransomware door.

Data Analytics: One Stop Security Shop?

There was a big push by many new vendors to position data analytics as the answer to all security problems and demonstrate ways analytics can prevent malware and security threats. Several startups showed how they analyze and report on threats, but many struggled to show how they make sense of the volume of security threats and alerts created every day.

There was also a surprising amount of vendors claiming they could completely fix all security issues, rather than demonstrating ways they are a part of the larger, overall solution. Because cybersecurity spans across so many areas, it’s hard to believe one vendor will provide all the services your enterprise needs to keep precious data safe, secure, and out of the hands of vicious hackers.

The Missing Pieces

While there were many productive, forward-thinking conversations on cybersecurity, the evolving threat-landscape, and emerging trends within the space, there were limited discussions on Big Data and artificial intelligence (AI). Given the massive amounts of data being collected through Big Data initiatives and IoT, the one thing panelists and experts alike failed to address was how AI can play a key role in securing the enterprise.

As far as data sovereignty issues the industry will face as we collect personally identifiable information (PII) and protected health information (PHI), there were hardly any sessions or conversations on best practices or ways to prepare. Upcoming regulations like the General Data Protection Regulation (GDPR) and the EU-U.S. Privacy Shield will have a major impact on U.S.-based companies doing business overseas, no matter their size or location.

From a legislative standpoint, knowing where your data resides will be critical as these new data privacy rules are implemented. The ability to control access to data and achieve regulatory compliance will heavily depend on the data’s location. This can be especially challenging for a number of organizations because most systems cannot comprehend the concept of data location being a business-related decision, especially cloud-based systems. Furthermore, the definition of ‘data location’ for regulatory compliance varies from region to region. So, companies will be need to be hyper-aware of where they’re collecting data, where their data resides and the regulations governing those geographies.

Wrapping up RSA: The Key Takeaways

Since there was little conversation on the regulations governing data itself, it’s important enterprises not only keep both their on-premise and cloud devices protected, but they must also recognize regulations governing the areas of the world in which their data flows. Security teams will surely have their hands full throughout 2017 as they try to keep up with the changing threat and regulatory landscapes.

Daren Glenister, Field CTO, Synchronoss

Daren Glenister

Daren is the Field Chief Technology Officer for Intralinks. Daren serves as a customer advocate, working with enterprise organizations to evangelize data collaboration solutions and translate customer business challenges into product requirements.

Glenister brings more than 20 years of industry experience and leadership in security, compliance, secure collaboration and enterprise software, having worked with many Fortune 1000 companies to turn business challenges into real-world solutions.

View Website
6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it ...
cloud collaboration

Cloud Collaboration: When Will Remote Work Meet Virtual Reality?

Cloud Collaboration The benefits of remote work and cloud collaboration make it hard for businesses and employees to pass up ...
How Will Artificial Intelligence Really Impact Jobs?

How Will Artificial Intelligence Really Impact Jobs?

Will Artificial Intelligence Impact Jobs? Hamilton is my favorite Broadway musical. The show follows the life of one of America’s ...
The Future of Big Data and DNS Analytics

The Future of Big Data and DNS Analytics

Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are ...
Data Privacy Day (Cue The Parade)!

Data Privacy Day (Cue The Parade)!

Data Privacy Day On Sunday, January 28, the United States, Canada, India and 47 European countries will celebrate Data Privacy ...
MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape Mapping the customer journey is one of the biggest strategic shifts currently underway in the marketing industry ...
open source cloud

Expect Open Source Security to Become a Major Focus in 2017

Open Source Security There is no doubt about it: We are living in the middle of the Digital Age. But ...
Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience - it's a lot like running a triathlon and ...
Tweaking with Application Assessment Tools

Tweaking with Application Assessment Tools

Application Assessment We have all seen the TV commercial where impossible situations are solved quickly by simply pressing a button ...