APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Security
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Security
    Editor's Pick (1 - 4 of 8)
    left
    The Organization's Responsibility for its Own Protection

    Michael Wallmannsberger, Chief Information Security Officer, Wynyard Group

    Don't Rush to Hire an Anti-DDoS Expert!

    Barry Greene, Co-founder and Chief, Technical Officer, GETIT

    Attaining the Needs of Infrastructure Investment

    Yong Chiang Neo, CIO

    Constructing a Marketing IT Collaboration

    Jenny Williams,

    The Organic Adaptability of IT

    Pedro Sttau,

    The Weakest Link Is Your Strongest Security Asset

    Christian Anschuetz, CIO & Security Practitioner, UL

    Achieving Greater Business Value with Innovation

    Denise A. Saiki, CIO& VP Enterprise Business Services, Lockheed Martin

    Using Data Analytics for Loss Prevention

    Jonathan Lowsley, CIO, ADrive

    right

    2016 - The Year Of the Cyber Exploit

    Craig Richardson, and Chief Executive Officer,

    Tweet
    content-image

    Craig Richardson,

    2015 has been the ‘year of the breach’ with almost weekly compromises becoming the norm. Cyber criminals seemed often to be one step ahead of the security industry, using an evolving arsenal of cyber attack techniques to successfully breach networks. It  is therefore critical to discuss the cyber trends we can expect to see in 2016 and how companies can best protect themselves against these emerging threats.

    New Vulnerabilities

    2016 will be considered the ‘year of the exploit’. For instance, we will see a shift to higher impact cyber crime. This higher consequence crime is currently on the rise with nation states and organized criminal networks continuing to steal IP and other valuable information to gain economic advantages or cause a negative economic impact in rival countries. Groups will become bolder in their hacking operations, not content with just stealing data, but also affecting the functionality of systems or even destroying the stolen data so a company can no longer access it.

    This year will also be characterised by a rise in stolen DNA and fingerprints to commit fraud and identity theft. We will see the stolen Personally Identifiable Information and Intellectual Property (IP) of organisations exploited to commit fraud, replicate identities and compromise consumers, commercial organisations and intelligence activities.  This will increase the hacking of organisations that hold DNA and other data like fingerprints as these unique signatures are increasingly used for authentication to devices and services. This growing area of criminal activity will require a holistic approach to monitoring threat levels across organisations through specialized cyber security and intelligence software.

    The final emerging vulnerability is the possibility of losing control of critical national infrastructure. Already, there is a real threat that the vulnerabilities of critical national infrastructures could fall into the wrong hands. Nuclear power plant ‘zero-day’ vulnerabilities for instance, can be purchased for only $US8, 000.

    As computer viruses continue to evolve, malware could be used to take control of the world’s large scale industrial control systems– eventually even extending to transport.

    The Evolving Cyber Landscape

    2016 will see a continuing skills shortage of people with the right cyber security skills. People who have direct first-hand experience in identifying cyber risks and improving defences are in high demand but low supply and this will worsen as the size of security teams increase.

    With such a big shortfall, companies are starting to adopt Security as a Service (SECaaS) as a stop-gap measure. This outsources their security to another company that has more expertise and can scale more cost-effective security to all of its customers. Companies need to understand that while they can outsource responsibility they cannot outsource accountability, so need to consider the benefits and risks involved.

    However, many organisations do not adequately assess the security practices of third-party partners and supply chains - despite findings that consistently point to breaches caused by third parties.

    While most organisations do include security provisions in contract negotiations with external vendors and suppliers, what needs to change is the level of focus and standard of security expected. Currently these standards are too low and organisations must hold themselves and others to higher levels of cybersecurity.

    Countering Cyber Threats

    Governments are finally wising up to the fact that cyber crime, cyber espionage and cyber attacks are a defense issue. The way to combat the threat is through intelligence, and as many governments do with other forms of security intelligence, cyber security threat information will increasingly be shared between governments and commercial organisations alike.

    We will continue to see these types of initiatives being adopted by governments, moving cyber security and breaches to a regulatory space. Commercial organisations and government departments need to be prepared for the impact, and this issue will once again become a board-level/ministerial conversation.

    As cyber legislation tightens and requires increased accountability, companies will need a better understanding of network compromise.  Many are turning to advanced analytics to identify threats and raise the alarm in order to discover the three stages of a hack – find what’s coming into the network, what it’s doing inside the network, where it’s leaving the network and what it’s leaving with.

    This will require a greater investment in cyber intelligence technologies that enable rapid detection and response. Companies now understand sophisticated cyber criminals have rendered traditional perimeter defences, like firewalls, VPNs, and antivirus and malware tools ineffective.  A priority for 2016 will be to detect threats inside the firewall as they develop to defend and ultimately prevent significant damage from occurring.

    Organisations therefore need to apply a layered approach to security, as there is no one miracle piece of software which can protect against all never-before-seen threats. The use of analytics can also uncover any anomalies hidden within the network and allows organisations to act early in the threat timeline, before extensive financial and reputational damage can be done.

    This, combined with a culture of cyber awareness from the board level down to all parts of the organisation, can provide a strong defence against the threat of high impact cyber attacks.

    tag

    cyber criminals

    Financial

    Firewall

    Cyber Threats

    cyber attack

    Weekly Brief

    loading
    25 Most Promising Enterprise Security Solutions Providers
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Driving It Transformation at Lactalis Australia

    Driving It Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    The Role Of Digitalization In Transforming Airport Customer Experiences

    The Role Of Digitalization In Transforming Airport Customer Experiences

    Kebebew Bulto, Director Addis Ababa Bole International Airport, Ethiopian Airlines
    From Chemical Solutions to Data Center Innovations

    From Chemical Solutions to Data Center Innovations

    Akmal Zharif Bin Abdullah, Datacenter Manager, Aeon Credit Service (M) Berhad [KLSE: AEONCR]
    Ethics & Compliance in a Digital World: Navigating HCP Engagement in APAC

    Ethics & Compliance in a Digital World: Navigating HCP Engagement in APAC

    Sherene Cham, Regional Director, Ethics & Compliance – APAC, Menarini Group
    How AI is Driving Innovation and Customer-Centricity in Insurance

    How AI is Driving Innovation and Customer-Centricity in Insurance

    Xinfa Cai, Chief Innovation Officer, AIA Group
    The Impact of Smart Infrastructure on Growing Cities

    The Impact of Smart Infrastructure on Growing Cities

    Scott Edward Sidhom, Manager Infrastructure Planning, Liverpool City Council
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://security.apacciooutlook.com/cxoinsights/2016-the-year-of-the-cyber-exploit-nwid-1158.html