This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

New year, new challenges: some cyber security industry predictions

04 January 2016

Law enforcement is catching up with hackers and, in response, they are employing smarter methods of attack, says David Ferbrache.

David Ferbrache OBE

The recent field trial by the Office of National Statistics suggested that there could have been over 7.5 million cyber offences against individuals last year. 2016 will see cybercrime finally find its place in our official statistics. I doubt that even the headline grabbing statistics which follow will capture the true scale of cybercrime – with many crimes against organisations remaining unreported.

Extortion attacks have been making a comeback with criminals demanding significant sums for suspending denial of service attacks against targets; not going public with stolen data; and of course providing a ‘service’ which grants access to a ‘client’s data which they had previously hacked and encrypted. Although security firms and law enforcement have become savvier in disrupting the infrastructure being used by organised crime groups, cyber criminals continue to search for new ways to turn other people’s information into money.

While phishing attacks, banking Trojans and large scale low value cash outs have characterised the last 10 years of cybercrime, new techniques are becoming part of the criminal arsenal while firms invest more and more in cyber threat intelligence in the hope of keeping up. In 2016 we predict that organised crime groups will become increasingly selective in targeting high net worth individuals, corporate treasuries and commercial bank accounts; as well as looking for new ways to profit.

The recent US indictments of alleged market hackers show just how sophisticated manipulation of markets has become – whether through front running stocks using stolen market sensitive information, or pump and dump schemes using personal data acquired in bulk from unsuspecting banks, insurers and even governments.

The much lobbied EU General Data Protection Regulation and the EU Network and Information Security Directives are likely to be finally agreed in 2016, firing the starting pistol for governments and firms to implement within two years. Together these EU interventions set the scene for greater transparency around data breaches, a more robust data protection stance and a Europe wide nudge towards greater cyber security regulation.

While large international firms are no strangers to an increasingly complex and uncoordinated global tapestry of national cyber security initiatives; smaller firms are likely to come under increasing pressure in 2016 as their larger cousins embed cyber security requirements into their contracting and procurement processes – fuelling both a supply chain security industry and the growth of third party cyber insurance.

The expected launch of a new National Cyber Security Strategy in 2016 has the potential to signal a new relationship between UK governance and industry, with the new National Cyber Centre at its heart. 

In 2016 we can only hope for a nuanced approach to regulation which works with the risk mechanisms in the markets to drive the right behaviours and address the current market failure around cyber security.

Terrorist organisations are becoming more and more tech savvy exploiting the internet for propaganda, radicalisation and communications. Often seen as dog which hasn’t yet barked, it seems inevitable that such terrorist groups will explore and exploit cyber attacks. While these attacks are likely to lack the visceral impact of the tragic bombings and shootings which have become all too common, they are likely to become more frequent in our increasingly interconnected and interdependent world.

2016 is likely to be the year that cyber resilience starts to matter more than just cyber protection, as governments worry about systemic risks from cyber attacks and critical infrastructure firms start to pay more attention to just how resilient their business models really are to these new threats. The NIST cyber security framework will succeed in becoming the de-facto yardstick for cyber security amongst such firms.

This year cyber security has been grabbing the headlines following many high profile data breaches – expect that to continue into 2016. Firms are finally beginning to recognise that a determined and well-resourced adversary will find a way to breach their cyber protection regardless of the robustness of their defences. This is leading to firms focusing more on the data and systems that are most critical to their operations and how to reduce the risk to those assets.

Many business now accept the likelihood of a data breach and are turning their attention to what a cyber incident might actually mean for their business, and just how they can restore and maintain client and customer confidence if and when they are hit – an issue for the whole C suite, not just the CIO.

Finally, passwords have become one of the weakest links in our security chain. People are being forced to adopt more and more convoluted passwords, while simultaneously trying to avoid the temptation to reuse those super strong passwords.

It is high time we moved to more sophisticated approach to authenticating people which blends biometrics, behavioural analysis and contextual information rather than relying on knowledge of a single increasingly user unfriendly password.

David Ferbrache OBE is KPMG's recently appointed Technical Director at the firm’s cyber security practice. His former role was Head of Cyber & Space at the Ministry of Defence.


Contact Details and Archive...

Print this page | E-mail this page