2017 Was the Year in Security of…

by Maria Battaglia

December 4, 2017

That was my final question during our 2016 year-in-review and predictions webinar, featuring our esteemed cyber security experts Bruce Schneier, Jon Oltsik, and Gant Redmon.

We are only a few days away from this year’s webinar, and we have an even more star-studded lineup, with the addition IBM Resilient co-founder Ted Julian. Be sure to register today and log the questions you want our panel to answer. It will be a must-see event, as usual – and we’ll be live streaming the discussion, as well.

As we prepare for this year’s webinar, we went back to see how the panel did predicting what the biggest security trends of 2017. The verdict: not bad at all.

One prediction was that 2017 would be the year of scale, with more devices on networks and analyst workloads than organizations can handle. That certainly proved true. The number of Internet of Things (IoT) devices – and IoT-related security concerns – continued to rapidly grow in 2017. The number of IoT devices grew 31 percent in 2017, reaching 8.4 billion connected things, according to Gartner.

And with organizations continuing to face the security skills shortage, workloads continued to mount for existing staffs. In fact, 63 percent of cyber security professionals said the skills gap has increased workloads for existing staff, according to new data from Enterprise Strategy Group and ISSA.

Our panel also thought that 2017 would be the year of GDPR – and it was, as organizations globally worked to prepare for the EU’s massive General Data Protection Regulation (GDPR), which goes into effect in May 2018. With many organizations still unprepared for GDPR’s sweeping changes, 2018 might also be the year of Europe.

What topics or questions do you want our panel to address in this year’s webinar? Submit your ideas and register for “Cyber Security in 2017 and the Year Ahead: The Fifth-Annual Year-in-Review and Predictions Webinar” today.

Comments (0)

Leave a Reply

Your email address will not be published. Required fields are marked *

14 + twenty =

View Our Additional Resources

  1. Cyber Security in 2017 and the Year Ahead: The Fifth-Annual Year-in-Review and Predictions Webinar

     

    Cyber Security in 2017 and the Year Ahead: The Fifth-Annual Year-in-Review and Predictions Webinar

    In IBM Resilient’s fifth-annual year-in-review and predictions webinar, our panel of cyber experts will discuss and debate the trends and stories that defined cyber security in 2017, and offer their predictions for what to expect in 2018. This year, we are also live streaming the event on Twitter for more engagement.

    Watch Now
  2. Six Steps for Building a Robust Incident Response Function

     

    Six Steps for Building a Robust Incident Response Function

    To overcome today’s top security challenges, organizations are increasingly seeking to orchestrate their incident response (IR). They aim to build agile, measurable IR workflows, increase communication and coordination, and arm their team with the right tools and intelligence.

    Download Now
  3. Top Global Research Laboratory

     

    Top Global Research Laboratory

    Learn how a top global research laboratory replaced its ticketing system with a purpose-built Incident Response Platform (IRP) -- and enabled its team to increase the effectiveness and efficiency of its security operations team.

    Download Now
  4. Improving Response with Orchestration and Automation: Ask Bruce

     

    Improving Response with Orchestration and Automation: Ask Bruce

    To effectively respond to today's complex cyberattacks, security teams need to coordinate their people and technology throughout the entire incident response (IR) process. When IR orchestration is supported by automation, organizations can accelerate their response and make their IR team more intelligent. In this video, IBM Resilient CTO Bruc...

    Watch Now