From Top Cybersecurity Professionals

#CyberSecurity
Predictions for 2022

Check out predictions from Cybersecurity experts

Srinivas Mukkamala

Senior Vice President, Security Products at Ivanti

comma

In 2022, we will consistently see ransomware moving up the technology stack. In particular, APIs are the future of hyper data transfer between systems, and ransomware is after data. It is not long before ransomware groups target APIs via misconfigurations in code.

Read More

Shivanath Somanathan

Product and Cybersecurity Expert, Board and VC Advisor

comma

The future will see the inclusion of trusted cybersecurity advisors in organizations’ boards of directors, either as independent technical experts or through sub-committee provisions to improve oversight of the cybersecurity posture of digital ecosystems, which businesses will thrive on.

Read More

George Do

Chief Information Security Officer at Gojek

comma

I foresee in 2022 that China will increase the severity and frequency of cyber attacks against the US. I expect the delisting of Chinese companies in 2022 on NYSE/NASDAQ that will add to the global drama. The international relations between the superpowers has already deteriorated to a new low and will continue to fracture.

Read More

Steve Stobo

Director at Cyber Consultancy Services (CCS) Limited

comma

Standards such as ISO27001 (information and data security) will become more important to smaller businesses, as their larger customers start to demand proof that they can look after any data or information shared with them. If you can't prove how secure you are (and have it independently verified) then you’re not secure!

Read More

Wai Kit Cheah

Director, Security Practice at Lumen Technologies

comma

When companies struggle with managing their expenses, IT departments will often be neglected and likely targeted for cost reduction. Many executives could fail to realize that cybersecurity is not just about reinforcing the perimeter. There are zero-day exploits and critical vulnerabilities that could put our common enterprise applications, systems, and networks at risk.

Read More

Prof John Walker

OSINT, Investigations and Cybersecurity Specialist

comma

Successful Cyber Attacks will continue with more high-profile companies falling to compromise. Sadly, 2021 will not be the year we see real steps taken toward Cyber Resilience - but it will be the year in which we encounter a more serious mindset toward addressing the aspect of Cyber Security. We may have to wait for 2022 and beyond to see those thoughts formulate into tangible action.

Read More

Emilio Iasiello

Cyber Intelligence Consultant

comma

The more established ransomware operators and gangs will continue to shift tactics again to evade detection. Ransomware gangs will likely continue to shy away from critical infrastructure targets to avoid making themselves a target of nation-state military and intelligence units.

Read More

Sachit Singh

Director, Cyber Security

comma

We have seen that there is an increased adoption of SaaS and the pandemic has further propelled this adoption. Data protection, strong authentication and visibility into the SaaS configuration will be critical to the firms.Insider abuse to misconfiguration in SaaS can be equally disastrous. The enterprises will start building the controls from protection to visibility to remediation to have a more holistic approach when it comes to SaaS.

Read More

Chuck Brooks

Cyber Security Expert and Forbes Contributor

comma

Catalyzed by the Zero Trust strategy government mandate, Public Private Partnerships (PPP) will greatly expand throughout the cybersecurity ecosystem in 2022. Open collaboration, threat sharing, and cooperative research and development will help spur innovation and facilitate new cybersecurity solutions. PPP will be perceived good news for both industry and government by 2023.

Read More

Janani Senthilkumar

Security Analyst at CSW

comma

Continuous monitoring of updates and patches for third-party software integrations in the network is recommended. Security-related measures and comprehensive periodical analyses of an organization's network will be inevitable going forward, irrespective of how secure the organization's network infrastructure is built, as new threats and ransomware are evolving.

Read More

Prakash Ram Gopalakrishnan

Security Analyst at CSW

comma

With more people preferring to continue working from home, an attack on any device connected to the home network can infect all devices on the network, thereby posing a threat to the organization's privacy and security.

Read More

Vaishnavi Saravanan

Security Analyst at CSW

comma

It is an era where organizations are shifting from on-premises software to the cloud. Cloud services have been emerging with greater demand; it is recommended to enhance the security of cloud endpoints with advanced authentication and security information and event management (SIEM) deployments.

Read More

Ghouse Syed

Security Analyst at CSW

comma

Cyber threats related to Metaverse can increase as it gives cybercriminals a new environment to use their old scams.

Read More

Sanjay Rameshkumar

Security Analyst at CSW

comma

State-sponsored threat actors and crypto-savvy threat actors would be a new danger. The governmental and private sector organizations must adopt higher security standards to avoid this new dynamic.

Read More

Karthikeyan Ravishankar

Security Analyst at CSW

comma

Organizations transitioning to Windows 11/Server 2022 are goldmines for zero-day attacks. Especially, Windows 11's Android subsystem can act as the initial attack vector for threat actors. This, combined with the work-from-home situation, is a recipe for disaster.

Read More

Saravanan Ganesan

Security Analyst at CSW

comma

As deepfake technology becomes increasingly sophisticated, it is likely to be used on a much wider scale by cybercriminals and fraudsters. The potential to dupe victims by accurately impersonating individuals through video or audio is extremely worrying. Using artificial intelligence (AI), cybercriminals or fraudsters use the deepfake technology to either impersonate a person's face, voice, or both to carry out scams, fraud, and social engineering attacks.

Read More

Daniel Raj

Security Analyst at CSW

comma

Patching vulnerabilities on demand will gain traction as a trend and an important skill for organizations with digital/physical attack surfaces, as vulnerabilities are being weaponized and cybersecurity leaders spotlight and take vigilance to protect from evolving cyber threats and attackers.

Read More

Aviral Verma

Security Analyst at CSW

comma

Supply chain attacks will be the primary weapon of choice in the ransomware threat arsenal. The year 2021 witnessed several types of malware distributed in supply chain attacks reconfigured as ransomware loaders. SolarWinds could merely have been the infancy of this form of assault.

Read More

Steve Hunter

Senior Director, Systems Engineering - Asia Pacific & Japan - ForeScout Technologies Inc.

comma

Organizations will need to determine how they will adapt to this new world, now that it has become clear that working remotely is not only possible for many but, in some cases, preferred. This means that Zero Trust capabilities will be more important than ever as corporate laptops connect to home, coffee shop and hotel networks around the world, mingling corporate devices with riskier ones that are no longer controlled by enterprise cybersecurity teams.

Read More

Catherine Allen

Founder and Chairman, The Santa Fe Group

comma

In 2021 we will continue to see concerns about supply chain management and the management of risk when outsourcing. Location risk, geopolitical risks and reputational risk issues will be at the forefront along with cybersecurity risks, where adversaries will focus on the weakest link…the third and fourth party suppliers.

Read More

Vengatesh

Technical Project Manager - CSW

comma

Deep fakes will be the next threat on which cybersecurity has to act on.

Read More

Tapendra Dev

Founder & CEO Secure Blink

comma

CISO & CSO are transitioning towards a durable cybersecurity solution in compliance with the zero-trust strategy, and SASE occupies right into that space substantially.

Read More

Satish Bhagavatula

CTO | Engineering, Technology & DevOps Leader

comma

CISOs, IT and Product leadership of SaaS providers will explore Governance & Operational transformation while shifting-[Security]-left through automation, adopting SecDevOps methodologies, and imbibing a balanced Risk-Based Vulnerability Management philosophy to prepare themselves against increased product security incidents which are impacting millions of customers, not to mention corporate & government embarrassments and losses.

Read More

Arjun Basnet

Security Analyst - CSW

comma

Spear phishing, password spraying, and exploiting internet-facing assets, are the most popular infection vector when it comes to nation-states actors' activity and will continue to dominate in 2021.

Read More

Vandana Verma

Global Board of Directors at OWASP & InfosecGirls

comma

Prediction for next year is the companies are adopting and understanding the importance of security in the cloud, at the same time DevSecOps with chaos engineering is becoming an important thing with a pinch of automation and AI.

Read More

Hitoshi Kokumai

Founder & Managing Director Mnemonic Identity Solutions

comma

“I would predict that 2021 will be the year that the global population will start to discover the real value of 'hard-to-forget', 'hard-to-break' and 'panic-proof' secret credentials for secure and sustainable digital identity."

Read More

Diana Kelley

CTO & Founding Partner SecurityCurve

comma

Passwords are a challenge, no one likes having to remember a lot of different ones and stolen passwords lead to account compromise. This is why I expect 2021 to see consumers adopting password wallets/managers that generate unique passwords for each account and then store them safely. Enterprises will continue to move towards “passwordless” strategies and both consumers and enterprises will implement MFA (multi-factor authentication) such as one-time use codes via text and biometrics to improve password-only security.

Read More

Jacqueline Jayne

Security Awareness Advocate, KnowBe4

comma

“There is a continuing and growing conversation about cybersecurity culture. Last year's prediction on this focus area was premature. We haven’t seen the uptake for company-wide KPIs related to cybersecurity expectations for training, behavior and reporting. However, after the release of The Australian Cybersecurity Strategy 2020, I am more confident that the conversation is becoming louder and the need for security awareness training is front of mind.”

Read More

Jelle Wieringa

Security Advocate, Public Speaker, Advisor, KnowBe4u

comma

Consumers will see an increase in Whatsapp and SMS fraud. Not only will the number of scams increase, but cybercriminals will become bolder by asking for higher amounts of money and using more forceful and devious techniques to manipulate people into paying.

Read More

Adv Rajas Pingle

International Cyber Law Expert | Cyber Crime Lawyer | Advocate | Professor | Privacy & Data Protection

comma

Year 2020 has seen a considerable increase in data breaches and further upsurge is expected with the rise of unemployment across the globe due to the pandemic. In this context, the Indian Personal Data Protection Act which is to be enacted by 2021, will increase personal data consciousness among the masses, compel the corporates to take adequate measures to safeguard user data and increase cybersecurity to avoid hefty penalties. The silver lining in this is that the PDPA might act as a stimulus in reducing overall cyber security incidents in India.

Read More

Nitin S

DevSecOps Enthusiast | CyberSecurity | CloudSecurity

comma

Indian startups will start to look into the security maturity and data privacy concerns to avoid future data breaches.

Read More

Donald Firesmith

System/Software Engineer and Author

comma

As recognition of the importance of resilience engineering increases, cybersecurity's contribution to resilience will become increasingly recognized. However, while cybersecurity is an essential part of resilience, it will become increasingly recognized that the adversities that can disrupt critical capabilities extend well beyond cybersecurity threats and attacks. Resilience also involves adversities associated with capacity, interoperability, longevity, robustness, safety, and survivability.

Read More

Marcin Szczepanik

CISO, Essar Oil (UK)

comma

More Companies will be impacted by cyber threats, and many of them will start investing in Cyber Security. It will take another year though to improve their posture.

Read More

Shamane Tan

Chief Growth Officer, Privasec

comma

With our world shifting into the virtual landscape, this can only mean that more information will be made even more available to the public, and it will be unsurprising for cybercrime to evolve and manifest in different creative forms.

Read More

Macy Dennis

CSO - Evotek

comma

I think the threat landscape will be similar to 2020 with a likelihood of an uptick in supply chain attacks, as well as in 3rd and 4th party risks. Additionally, I expect the trend in nation-state activity to increase dramatically in 2021.

Read More

Satish

Team Lead, CSW

comma

Corporate networks or devices which can be connected by employees from outside, for example, the company's intranet or security infrastructure from coffee shops, restaurants, railway stations, hotels, and other public wifi access will be more open and prone to cyber-attacks.

Read More

Matt Stamper

CISO, Executive Advisor - EVOTEK

comma

2021 will be the year of SOAR and investments in enhanced detection technologies including deception. I am cautiously optimistic that the improvements in security automation, the outstanding work in discovering zero-day vulnerabilities, and other software flaws will improve such that we'll see real reductions in dwell time. I also predict that cybersecurity as a topic for the board of directors will continue to be front-and-center - notably for public companies who are required by the SEC to provide accurate and complete disclosures related to their cyber risks. This focus will drive enhancements as to how organizations address patching and vulnerability management for their technology stacks. Sadly, we will also see the loss of life where OT or healthcare-related technologies are compromised, exposing new levels of liability for organizations in critical sectors.

Read More

Do you have a cybersecurity prediction for 2022?

comma

Passwords will remain as the default factor for authentication in cyberspace. Only the password security technology will be reinvented with hybrid text and non-text graphical passwords.

Debesh Choudhury, Infosecurity Specialistlinkedin

comma

My prediction is that things will get worse before getting better. When the realization will be that the legacy computing system was never intended to be used the way it is today - by novice users to communicate over the internet - a new computer will be developed by system experts (software experts that have trouble in understanding the value of the hardware in the wide perspective of system design). In the future, the focus will be to protect the user and the computer. Content will be separated from form. Out of band secure channels will continuously operate parallel to the insecure internet communications. Users will not need to worry about malware infecting their systems.

Moti Barkan, Founder at HackNotlinkedin

comma

Cyber security law is going to be the new jewel in the crown in 2021 with the legal policy, regulatory aspects surrouding cyber security assuming a lot of significance. I believe that roles, responsibilities and legal compliance relating to cyber security at global and national levels and standards and common denominators will have to be defined

Adv Sai Sushanthlinkedin

comma

I predict that usable security will become a goal, users will no longer be forced to have long complex passwords when they will see that they have better options for small creative passwords. Companies will see reduced cyber risks with innovative login and smart mfa solutions. Data privacy friendly solutions will be in demand.

Nehal Mehta, President at Rainbow Securelinkedin

comma

Organizations will see more and more third party security services and platforms fall victim to the very attacks they are trying to protect their customers from. Current trends in outsourcing services, including security services, will make residual risk and Third party risk management a hot topic of debate moving forward.

Thomas Uehera, Cyber security evangelistlinkedin

comma

More Advanced Persistent Threats (APT) attacks will be commonly obtainable and can be weaponized from criminal networks. The darknet will let cybercriminals buy access to more sensitive information about the corporate networks.

Vijaykumar, Senior Security Analyst at CSWlinkedin

comma

Threat actors will progressively be targeting the most critical publicly available assets held by organizations through massive phishing campaigns, Advance OSINT techniques, post-intrusion, deep enumeration of networks. Precious information involved Industries will experience active cyber attacks. As we started seeing both Iran and China targeting not only research companies, also other sectors of government, healthcare, pharmaceutical, and non-governmental organizations. Organizations that fail to provide continuous awareness on IOCs and IOAs to the employees will face huge impacts while cyberattacks

Vijaykumar, Senior Security Analyst at CSWlinkedin

comma

The war - Ransomware VS Security Community. 2021 will have a Rapid growth in Ransomware attacks with highly customized Ransomware with advanced TTPs, evolving varieties, increased frequency of attacks which is gonna be a trendsetter ransomware-as-a-service.

Vijaykumar, Senior Security Analyst at CSWlinkedin

comma

Rush to push everything to the cloud approach will results in many security holes, challenges, cloud misconfigurations, and outages that can be leveraged by attackers to get into foothold company networks

Vijaykumar, Senior Security Analyst at CSWlinkedin

comma

Organizations Will Recognize the Need to Look Deeper Into Their Third-party Vendors.

Sandeep, Security Analyst at CSWlinkedin

comma

The number of cyberattacks by nation states/APT groups will continue to grow.

Sandeep, Security Analyst at CSWlinkedin

comma

Exposed APIs will be the next favored attack vector for enterprise breaches.

Sandeep, Security Analyst at CSWlinkedin

csw

Secure your environment from cyberattacks!

Schedule a consultation

incognito