Predictions for 2022
on
#Cloud Security
50+ cybersecurity experts, thought leaders, and professionals have shared their predictions about what would trend in the coming year.
What does 2022 have in store for the Cybersecurity industry?
Share, tweet, like, comment about these forecasts and let us know what you like or disagree with.
Check out predictions from Cybersecurity experts
2022 Predictions
Prediction #1
It is an era where organizations are shifting from on-premises software to the cloud. Cloud services have been emerging with greater demand; it is recommended to enhance the security of cloud endpoints with advanced authentication and security information and event management (SIEM) deployments. by Vaishnavi Saravanan
Share via:
Prediction #2
Securing Cloud Adoption: As the saying goes, you are only as strong as your weakest link. Many businesses who jump onto the Cloud adoption bandwagon will fail to realize that it is essential to ensure that their configuration and controls of cloud services must be thoroughly considered and tested. The 3Ms (Misconfiguration, Mistakes, and Mismanagement) will continue to be a grave error of many and cause unauthorized data breaches. Businesses should consider benchmarking their Cloud configurations against practices such as CIS benchmarks. by Wai Kit Cheah
Share via:
Prediction #3
Secure Access Service Edge (SASE): As companies transform their businesses through this pandemic cycle to evolve into a more digitized business model, cloud adoption will increase. Many of them are concerned about their ability to secure their cloud consumption, which will drive a growing adoption of Secure Access Service Edge (SASE) to secure cloud access and virtual workloads. However, it will not be an easy adoption, as it needs pre-requisites to be successful, such as an acceptable use policy, a clearly defined cloud usage policy, and other regulations. Enterprises should first develop a strong foundation and set of administrative controls before implementing any technology. After all, technology is merely one tenet of cybersecurity control. by Wai Kit Cheah
Share via:
Prediction #4
Cloud services will be a primary target for the more sophisticated state and non-state actors seeking to maximize their exploitation efforts. Supply chain attacks will likely be the focal point of these attacks. They have historically demonstrated that such services offer potential entry into more organizations in different sectors and industries once compromised. Ransomware attacks are a natural fit to be included in cloud service attacks, requiring only initial access before being able to spread within the cloud community. by Emilio Iasiello
Share via:
Prediction #5
The cybersecurity insurance industry will see significant growth, but so will their premiums and deductibles. This will be driven by the increased frequency of industry data breaches and associated costs. Hopefully, that means organizations will realize the value of their brand and conversely try to minimize brand damage in the case of a possible breach. by George Do
Share via:
2021 Predictions
Prediction #1
Nation states will continue efforts to embed backdoors at the hardware layer. by George Do
Share via:
Prediction #2
The majority of successful hacks is achieved by the compromise of user accounts or credentials (vs. exploiting a vulnerability) by George Do
Share via:
Prediction #3
More Companies will be impacted by cyber threats, and many of them will start investing in Cyber Security. It will take another year though to improve their posture. by Marcin Szczepanik
Share via:
Prediction #4
2021 will see many moving more systems to the cloud and SaaS solutions by Macy Dennis
Share via:
Prediction #5
Organizations need to assess themselves with a risk-based focus – this will include building out a risk register and performing more threat modelling exercises to identify the organization's overall true risk posture by Macy Dennis
Share via:
Prediction #6
CISOs, IT and Product leadership of SaaS providers will explore Governance & Operational transformation while shifting-[Security]-left through automation, adopting SecDevOps methodologies, and imbibing a balanced Risk-Based Vulnerability Management philosophy to prepare themselves against increased product security incidents which are impacting millions of customers, not to mention corporate & government embarrassments and losses. by Satish Bhagavatula
Share via: