BAE Systems Announces Top Five Predictions for Cyber Security in 2015

By CIOReview | Thursday, January 8, 2015

FREMONT, CA: BAE Systems Applied Intelligence announces its top five predictions for cyber security concerns for 2015 related to finance, IoT and more. Scott McVicar, Managing Director, Cyber Security, BAE Systems Applied Intelligence, shines light on the various aspects that should be taken into consideration to better protect the networks this year:

  1. Fragmentation of cyber criminal activities – a challenge: Better enforcement of laws to counter cyber attacks – such as malware authoring, counter-AV testing, exploit kits, spamming, hosting, money-muling, and card cloning – will drive fragmentation of bad actors into smaller units using newly developed and more resilient capabilities. This challenge for the security community beckon for even stronger law enforcement driven by automation in gathering intelligence and analysis work streams to thwart cyber attacks.
  1. The period of hyper regulation: BEA Systems believes there will be greater efforts to remove silos between Risk, Compliance, and Information Security departments. To check finance-related crimes across all financial institutions, a tightly held collaboration between GRC and data security departments will be encouraged to develop stronger detection capabilities. A single intelligence platform across the enterprise for investigation across the enterprise will also be encouraged.
  1. Securing connected world: Internet of Things (IoT) or the Internet of Everything (IoE) has arrived which promises disruption leading to the next industrial revolution in which automation and orchestration drive greater efficiency and massive productivity gains in manufacturing, retail, transport, and the home connectivity. In 2015, greater focus will be on building security solutions from the scratch: one that is tailored for the next industrial revolution. Security professionals will be handed the daunting task of securing critical systems and national scale infrastructure as cyber attackers look to break in to the networks. Techniques that implement segmentation of high value systems away from high risk activity while keeping connectivity and trusted data flows in place will be considered.
  1. The ability to deceive: Cyber attackers in 2015 may tend to boost their ability to deceive and improve their own operational security. As threat reports in the current times reveal the small details in the code and attack behavior that provides crucial breakthrough in tackling them, attackers who also get the access to the threat reports. This prompts the cyber attackers to be more technically advanced to boost their obscurity. 
  1. Big Data implementation from minimal to meaningful: Big Data investments in 2015 will make a move from the store and report model to a more robust and meaningful intelligence for better decision making for businesses.

“There will be a shift from technologies which enable storage and basic reporting to those which enable meaningful intelligence to be extracted. Use-cases such as network monitoring, fraud-detection, and security analytics will be popular – driven by the increasing overlap between cyber threats and other risks and more focused board-level attention on managing cyber security across the business,” said McVicar.