2017 Was the Year in Security of…

by Maria Battaglia

December 4, 2017

That was my final question during our 2016 year-in-review and predictions webinar, featuring our esteemed cyber security experts Bruce Schneier, Jon Oltsik, and Gant Redmon.

We are only a few days away from this year’s webinar, and we have an even more star-studded lineup, with the addition IBM Resilient co-founder Ted Julian. Be sure to register today and log the questions you want our panel to answer. It will be a must-see event, as usual – and we’ll be live streaming the discussion, as well.

As we prepare for this year’s webinar, we went back to see how the panel did predicting what the biggest security trends of 2017. The verdict: not bad at all.

One prediction was that 2017 would be the year of scale, with more devices on networks and analyst workloads than organizations can handle. That certainly proved true. The number of Internet of Things (IoT) devices – and IoT-related security concerns – continued to rapidly grow in 2017. The number of IoT devices grew 31 percent in 2017, reaching 8.4 billion connected things, according to Gartner.

And with organizations continuing to face the security skills shortage, workloads continued to mount for existing staffs. In fact, 63 percent of cyber security professionals said the skills gap has increased workloads for existing staff, according to new data from Enterprise Strategy Group and ISSA.

Our panel also thought that 2017 would be the year of GDPR – and it was, as organizations globally worked to prepare for the EU’s massive General Data Protection Regulation (GDPR), which goes into effect in May 2018. With many organizations still unprepared for GDPR’s sweeping changes, 2018 might also be the year of Europe.

What topics or questions do you want our panel to address in this year’s webinar? Submit your ideas and register for “Cyber Security in 2017 and the Year Ahead: The Fifth-Annual Year-in-Review and Predictions Webinar” today.

Comments (0)

Leave a Reply

Your email address will not be published. Required fields are marked *

three × four =

View Our Additional Resources

  1. Accelerating SOC Transformation with IBM Resilient and Carbon Black

     

    Accelerating SOC Transformation with IBM Resilient and Carbon Black

    Security Operation Centers (SOCs) today are complex environments. They often have too many separate tools, uncoordinated analysts in the response process, and confusion around alert prioritization. Because of this, SOCs consistently struggle responding to the most urgent incidents.

    Watch Now
  2. Six Steps for Building a Robust Incident Response Function

     

    Six Steps for Building a Robust Incident Response Function

    To overcome today’s top security challenges, organizations are increasingly seeking to orchestrate their incident response (IR). They aim to build agile, measurable IR workflows, increase communication and coordination, and arm their team with the right tools and intelligence.

    Download Now
  3. Intelligent Orchestration: Battling Complex Cyberattacks with the Next Generation of Incident Response and Security Operations

     

    Intelligent Orchestration: Battling Complex Cyberattacks with the Next Generation of Incident Response and Security Operations

    Intelligent Orchestration – the next generation of incident response (IR) – is a powerful security capability that uniquely blends human and machine intelligence with orchestration and automation, dramatically accelerating and sharpening organizations’ response to cyberattacks.

    Download Now
  4. What is Intelligent Orchestration: Ask Ted

     

    What is Intelligent Orchestration: Ask Ted

    Intelligent Orchestration – the next generation of incident response (IR) – is a powerful security capability that uniquely blends human and machine intelligence with orchestration and automation, dramatically accelerating and sharpening organizations’ response to cyberattacks.

    Watch Now