analytics cybersecurity-predictions-2016
TRANSCRIPT
![Page 1: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/1.jpg)
Top 12 Predictions fromLeading Cybersecurity Experts
![Page 2: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/2.jpg)
ibm.co/threatintelligence
What will 2016 hold for cybersecurity?Expect continued developments as both the public and private sectors implement
intelligence-led approaches to threats.
![Page 3: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/3.jpg)
ibm.co/threatintelligence
12“New data sources arising from the
Internet of Things and biometrics will lead to a renewed government interest in using big data to prevent terrorism.” Andrew Borene, federal manager, i2 Safer Planet
![Page 4: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/4.jpg)
ibm.co/threatintelligence
11“Private organizations will increase
their visibility into the dark web to become more proactive about cyberthreats than ever before.”Bob Stasio, senior product manager for
cyber threat analysis, i2 Safer Planet
![Page 5: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/5.jpg)
ibm.co/threatintelligence
10“The international community will create safe zones in Syria to stem the mass migration to
Europe, and big data analytics will play an integral role in enforcing identity resolution and border security in those safe zones.”
Todd Rosenblum, senior executive forworldwide big data, i2 Safer Planet
![Page 6: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/6.jpg)
ibm.co/threatintelligence
“Companies and government agencies will begin using block-chain encryption
to protect against cyberthreats.”
Bob Stasio9
![Page 7: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/7.jpg)
ibm.co/threatintelligence
“Auditability and managed access of US citizens’ personal data will be an increasingly important requirementfor US national security agencies.”
Todd Rosenblum8
![Page 8: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/8.jpg)
ibm.co/threatintelligence
7“Companies will begin properly
inventorying digital assets and data aspart of their risk management strategies,
heightening understanding of threat surfaces and ways of minimizing them.” Shahid Shah, CEO, Netspectives Communication
![Page 9: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/9.jpg)
ibm.co/threatintelligence
“‘Big X’ consulting firms will offer their customers cyberintelligence-as-
a-service consulting options.”Bob Stasio6
![Page 10: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/10.jpg)
ibm.co/threatintelligence
“Vulnerability curators will become increasingly prevalent as companies
learn to share breach data.”Shahid Shah5
![Page 11: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/11.jpg)
ibm.co/threatintelligence
“Continued cybersecurity breaches and state-sponsored cyber espionage will lead
to spikes in cybersecurity spending on both workforce and software solutions.”
Andrew Borene4
![Page 12: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/12.jpg)
ibm.co/threatintelligence
“Large financial organizations will continue divesting themselves
of managed security services to create their own fusion centers.”
Bob Stasio3
![Page 13: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/13.jpg)
ibm.co/threatintelligence
“Third-party libraries and software components will increasingly gain
attention as CIOs and CISOs realize how many vulnerabilities they create.”
Shahid Shah2
![Page 14: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/14.jpg)
ibm.co/threatintelligence
1“The market for behavioral
analytics and threat detection offerings will continue unabated.”
Bob Stasio
![Page 15: Analytics cybersecurity-predictions-2016](https://reader031.vdocuments.us/reader031/viewer/2022030316/58744be21a28abd53e8b4deb/html5/thumbnails/15.jpg)
Prepare yourself for future trendsin cybersecurity and threat analysis.
ibm.co/threatintelligence