View
3
Download
0
Category
Preview:
Citation preview
Research Strategic Technology Report
© 2020 Trace3, Inc. All Rights Reserved
ThisTrace3StrategicTechnologyReportanalysestrendsinthecybersecurity,withaspecificfocuson:
§ EndpointSecurityRiskManagement§ SecureAccessServiceEdge(SASE)§ InternetofThingsintheEraof5G§ EnterpriseITGovernance,RiskandCompliance
Disclaimer–ThisdocumenthasbeenpreparedsolelyforTrace3'sinternalresearchpurposeswithoutanycommitmentorresponsibilityonourpart.Trace3acceptsnoliabilityforanydirectorconsequentiallossarisingfromthetransmissionofthisinformationtothirdparties.ThisreportiscurrentatthedateofwritingonlyandTrace3willnotberesponsibleforinformingofanyfuturechangesincircumstanceswhichmayaffecttheaccuracyoftheinformationcontainedinthisreport.Trace3doesnotofferorholditselfoutasofferinganyadvicerelatingtoinvestment,futureperformanceormarketacceptance.
Strategic Technology Report Managing Cyber Security Risk
April 3rd, 2020
John Filitz, Research Analyst, Trace3
Research Strategic Technology Report
© 2020 Trace3, Inc. All Rights Reserved
Contents Executive Summary ........................................................................................................................................... 3
Report Scope ...................................................................................................................................................... 3
Research Methods ............................................................................................................................................. 4
About Trace3 Research ..................................................................................................................................... 4
Did you Know? ................................................................................................................................................... 5
Global Risk Landscape ...................................................................................................................................... 6 Risk Escalation ............................................................................................................................................. 6 Cyber Threats ............................................................................................................................................... 6 Regulatory Complexity ................................................................................................................................. 6 Managed Services and Emerging Technology ............................................................................................. 6
Endpoint Security Risk Management ............................................................................................................... 7
Secure Access Service Edge (SASE) ............................................................................................................... 8
IoT in the Era of 5G ........................................................................................................................................... 10
Governance, Risk and Compliance ................................................................................................................ 12
What’s Next? ..................................................................................................................................................... 14
Baseline Forecast (2020 – 2023) ..................................................................................................................... 14 Summary Evidence for Baseline Forecast ................................................................................................. 14 Assumptions ............................................................................................................................................... 15 Market Activity ............................................................................................................................................ 15
Forces Impacting Cyber Security (2020-2023) ............................................................................................... 17 Social Forces .............................................................................................................................................. 17 Technological Forces ................................................................................................................................. 18 Economic Forces ........................................................................................................................................ 18 Political Forces ........................................................................................................................................... 19
Mitigating Information System Risk ............................................................................................................... 19 1. Risk Based Vulnerability Management ............................................................................................... 19 2. Attack Surface Risk ............................................................................................................................ 19 3. Breach and Attack Simulation ............................................................................................................. 20 4. Email Protection and Security Awareness Training ............................................................................ 20
Conclusions and Recommendations ............................................................................................................. 21
Appendix ........................................................................................................................................................... 22 Featured Use Cases ................................................................................................................................... 22 Relevant Links ............................................................................................................................................ 23 Sources ...................................................................................................................................................... 24
Strategic Technology Report Security
Page3of27
ExecutiveSummary Whoshouldreadthis?This report is targetedat strategic technology leaders seeking toaddress thegrowing cyber security challenges inanincreasinglycomplexoperatingenvironment.1
KeyTakeaways
Trace3Researchidentifiesthreekeytrendsinenterprisecybersecurityoverthenextonetothreeyears:
1. Endpointsecurityriskscontinuethetrajectoryofescalationinsophisticationandscope,withphishing,businessemailcompromiseandransomwaretheleadingthreatstotheenterprise.
o Theendpointsecuritymarketisundergoingnecessaryconsolidationduetopoorreturnoninvestment.o EndpointProtectionPlatforms(EPP)increasinglyaddressthechallengeofendpointsecurityvulnerability
andagentsprawl.
2. Thedemand for cloud-native security solutions that address thedissolving networkperimeter1 sees securitysolutionsmovetotheedge.
o SecureAccessServiceEdge(SASE)ismorethanmarketinghypeandgainstractionasthedemandforzerotrustnetworkinggrows.
o 5GrampsupdemandforInternetofThings(IoT)securitysolutions.
3. EnterpriseITGovernance,RiskandCompliance(GRC)willincreasinglymoveoutoftheITsecuritydepartment,requiringdedicatedGRCstrategiesandresources.
o ThekeytoresolvingITGRCchallengesresidesinmanagedservices.o IncumbentGRCsolutionswillfacedisruptionbynextgenerationdatagovernanceandGRCsolutions.
ReportScope ThisTrace3StrategicTechnologyReportoutlinesthefuturedirectionofenterprisecybersecurityintheageofincreasingrisksandregulatorycomplexity.Itshinesaspotlightonthreekeyconsiderationstokeepenterpriseinformationsafeandsecure:
1. Endpointsecurityiscentraltosecuringanincreasinglydistributedworkplace.2. Intheeraof5G,IoTdeviceswillbecomebusinesscriticalfortheenterprise–sotoowillbesecuringthesedevices.3. Escalatingregulatorycomplexitywillnecessitatemoresignificantresourcingtobolsterin-houseGRCcapability.
1Foracomprehensiveanalysisonaddressingsecurityrisksinthecloud,pleaseseeourCloudComputingHorizonreport.
Strategic Technology Report Security
Page4of27
ResearchMethods ThisreportwascompiledandwrittenbytheTrace3Researchteam.Thereport’sresearchareaoffocusisinformedbyavarietyoffactors,includingresearchrequestsfromTrace3customersandfieldteams,emergingtechnologyinvestmenttrends,andsocial/media/newsmomentum.Fromthesefactors,relevantareasofthetechnicallandscapewereanalyzedtodeterminedriversofchange,baselineforecasts,andlikelychallengesanduncertaintiestobeexperienced.Forecastsandrecommendationsweredevelopedreflectingtheconclusionsgeneratedbytheanalysis.Vendorsmentionedinthisreportaremeanttobeusedforrepresentativepurposesonlyanddonotrepresentanexhaustivelistforeachusecase.AboutTrace3Research To solve the IT problems of tomorrow, our research analysts leverage Trace3's unique access across the technologylandscapetoderiveimpartialinsights.Byidentifyingandanalyzingtechnologyandmarkettrends,weenablecustomerstoprepareforandmastertomorrow'schallengesbeforetheyarrive.Trace3Research leveragesourpartnershipswithnumerousestablishedandemerging technologycompanies,ourexperiencedengineers,a largeclientecosystem,anddeeprelationshipswithdozensofthetopSiliconValleyventurecapitalfirmstospottrendsaheadofmostindustrypundits,allowingyoutogainaninsideadvantageontomorrow'strendsandreduceyourtechnicalandbusinessrisk.
Strategic Technology Report Security
Page5of27
DidyouKnow?
• PriortotheCoronavirusDisease2019(COVID-19)pandemic,thecybersecuritymarketwasexpectedtogrowby8%2to12%3CompoundAnnualGrowthRate(CAGR)inthe2020to2023period.
• It is tooearly todetermine the full extentof thepandemic’s impacton thebroadereconomy,and the cybersecuritymarket.4
• In thewake of the COVID-19 crisis and the shift to a fully remoteworkforce, endpoint security vulnerabilitybecomesaleadingsecuritypriorityfortheenterprise.
• Cyber security threats continue the trend of escalation,with phishing, business email compromise (BEC) andransomwaretheleadingthreats.5
• Therewere461,361reportedcyberincidentsin2019, representing$3.5billioninlosses–upfrom$2.7billionin2018and351,937reportedincidents.6
• Theaveragecostofabreachis$3.9million.7• Theaveragecostofaransomwareincidentis$8.1millionandanaverageof280+daysofrecoverytime.8• InternetofThings(IoT)securityvulnerabilityisfastbecomingaleadingthreatvector,withIoTattacksincreasing
by215%in2018.9• Toaddresstherapidlyescalatingregulatorycomplexity,enterpriseITGovernanceRiskandCompliance(GRC)will
moveoutoftheITSecurityDepartment,requiringdedicatedresourcing.• Thirdpartymanagedsecurityserviceswillbecomeanincreasingfeatureoftheenterprisesecuritylandscape as
enterprisesgrapplewithincreasingsecurityriskandregulatorycomplexity.
Source:Statista(2019)
Strategic Technology Report Security
Page6of27
GlobalRiskLandscape Inarapidlyevolvingglobal risk landscape,enterprisesfaceanarduouschallengeofeffectivelymanagingcontinuouslyevolvingcybersecuritythreatswhileattemptingtomeetever-shiftingcompliancebenchmarks.RiskEscalation Resiliencetoriskhasaddedmeaningin2020:Risksarepresentinginamultitudeofarenas,fromthegeopoliticalandtheeconomic,tothebiologicalriskandfall-outassociatedwiththeCOVID-19pandemic.Operatinginanincreasinglyhigh-riskcontextunderscorestheimportanceofhavingaproactivestanceonenterprisecybersecurityandriskmanagement.CyberThreats Cybersecuritythreatsareundergoingasignificanttransformationinscopeandsophistication,withstatisticsofreportedcyber-crimesandtheirfinancialimpactincreasingyear-over-year:TheFBI’sInternetCrimeReport(2019),findsamorethanfour-foldincreaseinthecostofcyber-crimerelateddamages,withbusinessemailcompromiseandransomwaretheleadingthreatstobusinesses.In2019,reporteddamagesfromcyber-crimestoodat$3.5billion–4xthe2014figuresof$800million.Thenumberofreportedcyber-crimeincidentsalsoincreasedsignificantly,at461,361reportedincidentsfor2019comparedto351,937in2018.10TheOnlineTrustAlliance(2019)findsransomwareattacksroseby60percentin2018,representingafinancialimpactof$8billionindamages.Lossesattributedtobusinessemailcompromisedoubled,andcrypto-jackingincidentsmorethantripledyear-on-year.Inlinewiththekeythemeatthisyear’sRSAConference2020TheHumanElement,over95percentoftheseattackswereavoidable,withpoordecision-makingbyusersthesinglegreatestattributingcauseofcompromise.11RegulatoryComplexity Atthesametime,sweepingchangesdominatetheglobalcyberregulatorylandscapewithreferencetodataprivacyanddatasecurityregulations,bringingaboutincreasinglystringentregulatoryframeworks,acrosstheworld.TheEuropeanUnion’s(EU)GeneralDataProtectionRegulation(GDPR)(2018)andtherecentlyenforcedCaliforniaConsumerPrivacyAct(CCPA)(2020),inadditiontoaraftofotherUSstatelegislationcurrentlyunderreview,progressivelyplacemorecybersecurityanddataprivacyregulatoryburdenonbusinesses.ManagedServicesandEmergingTechnology Maintainingcybersecurityresiliencewhileadheringtoevolvingcompliancerequirementscanbechallengingforeventhemostwell-resourcedenterprisesecuritydepartment.Itisherethatthird-partymanagedservicesandemergingtechnologysolutionshavekeyrolestoplay.Notonlycanmanagedservicesaugmententerprisesecuritydepartmentsstrugglingtofindtheexpertiseinatightlabormarket,buttheycanalsoassistinbringingtried-and-testedsecuritystrategiestobare.Emerging technology solutions too have an important role to play. Many of today’s security challenges are poorlyaddressedbyincumbentvendorsolutions.Itiswhyitisessentialforenterprisestoexperimentandinnovateonprotractedsecurity challengeswithemerging technology solutions.Emerging tech solutionsareoftenwellplaced toaddress thesecuritychallengesoftoday,aswellasthoseoftomorrow.
Strategic Technology Report Security
Page7of27
Source:Statista(2019)
EndpointSecurityRiskManagement Ascomputingbecomesincreasingdistributed,thereiswidespreadconsensusendpointvulnerabilityistheleadingthreatvectorwithphishing,BECandransomwareresponsibleforatleasttwo-thirdsofcybersecurityincidents.In2019thecostsassociatedwith ransomware attacks in theUS have been estimated at $7.5billion, affecting 113 state andmunicipalgovernmentagencies,764healthcareproviders,89universitiesandover1,200schools.TheaveragecostofaransomwareincidentaccordingtoEmisoftis$8.1million,averaging287daysforrecovery.12Conventionalendpointsecuritysolutionshavesufferedfromalackofefficacyaswellasnegativelyimpactingtheoperatingsystemperformanceduetoendpoint“agentsprawl.”Onaverage,thereare10agentsinstalledonendpointsinenterpriseenvironmentswhich often conflict with each other, resulting in security lapses presenting.13 An additional weaknessconcernsthefactconventionalendpointsecuritysolutionsarenotdesignedtoaddressthegrowingprominenceofthedissolving network perimeter and edge computing, resulting in significant amounts of business critical data existingbeyondthenetworkperimeter,andoftenoutsidethereachofsecuritycontrols.Next-generation,cloud-nativeEndpointProtectionPlatforms(EPP)addresstheseshortcomingsbyincludingtraditionalportmonitoring,firewallandanti-malwarecapabilities,withadvancedthreatdetectionandresponsecapabilities.EPPsincreasinglyplayanessentialroleinkeepingtheenterprisesecure.14
Strategic Technology Report Security
Page8of27
SomeofthekeyplayersintheEndpointProtectionPlatformspaceinclude:
SecureAccessServiceEdge(SASE) Cloudsecurityisaconcernfor93percentoforganizationsaccordingtoISC2’s2019CloudSecurityReport,withdatalossanddataprivacyroundingupthekeyconcernsforenterprisesinthecloud.15SecureAccessServiceEdge(SASE)aimstoeasecloudnetworksecurityworriesbyenablingzerotrustnetworking.InaGartnerreporttitledTheFutureofNetworkSecurityisintheCloud,SASEisseenasagroundbreakingshifttoaddressingcloudsecurityconcernsbycombiningcloud-hostednetworksecurityandcloudnetworkmanagementtechnologiesinanintegratedsolutionoffering.16ThemovetoSASEisanattempttoaddressthedissolvingnetworkperimeterwithrespecttosecuringnetworktrafficfromtheedge.ThekeytechnologiesenablingSASEinclude:
Ø CloudAccessSecurityBrokers(CASB).Ø Firewallas-a-Service(FWaaS).Ø ZeroTrustNetworkAccess(ZTNA).Ø SoftwareDefined-WAN(SD-WAN).Ø CloudSecureWebGateways(SWG).
Strategic Technology Report Security
Page9of27
Although thematurity level of SASE solutions is still early stage, the incumbent security platforms such as Palo AltoNetworks,CheckPointSoftwareTechnologies,andForcepoint aremovingtowardsconsolidatingcloudhostednetworksecurityandcloudsecuritytechnologiesintointegratedplatformofferings.Similarly,networkserviceproviderssuchasJuniper Networks, Barracuda and Cisco are ramping up security capabilities and cloud integrations of their SoftwareDefined-WANandSecureWebGatewaysofferings.NetworktrafficreceivedfromtheedgepassesthroughaSASE“trafficprocessingengine,”whichinspectsandpassesonallsecuritypoliciestothattraffic,beforeforwardingitontothecloudordatacenter.17
Source:PaloAltoNetworks(2020)
ExpectcloudsecurityandnetworkingvendorstomoveinthedirectionofdevelopingSASEplatformofferingsi.e.PaloAltoNetworksPrismaCloud.SomeofthekeyemergingplayersintheSASEspaceinclude:
Strategic Technology Report Security
Page10of27
IoTintheEraof5GLessthanhalfofsecurityprofessionals(47%)areconfidenttheyhaveadequatelysecuredtheirIoTenvironments.18Intheabsenceof an IoT security strategy, expect IoT security challenges to becomemoreprotracted in theera of 5G. Thesubstantially larger 5G network channels will enable faster speeds of data transmission, while significantly reducingnetwork latency. Forecasts estimating a network connection density of 1million IoT sensors and devices per squarekilometer.19ThevolumeofdeployedIoTendpointsaccordingto451Researchisexpectedtodoubleby2024.
Source:451Research(2019)
IoTsecurityattacksareexpected tocontinue the trendofescalation: In2019,oneKasperskyhoneypotattracted105millionattacksinthefirstsixmonthsof2019,receivedfrom276,000uniqueIPaddresses.Thisiscomparedto12millionattacksreceivedbythehoneypotforsameperiodin2018.20SonicWallrecordeda215percentincreaseinIoTattacksin2018,anda50percentincreaseon2018figuresforthefirsthalfof2019.21
Strategic Technology Report Security
Page11of27
Source:SonicWall(2019)
Given the lightweight nature of IoT sensors and devices, firmware is often years out-of-date, and inmany cases thefirmware cannot be updated or patched. In addition to the exponential growth of IoT sensors and devices currentlyunderway,remoteaccessofphysicalsitesandgeographicsprawlarejustsomeofthefurtherchallengesthataddtoIoTsecuritycomplexity.SecuringIoTdevicesrequiresadefense-in-depthapproachtoimprovingthesecurityposturefortheinformationsystemandtheextendedIoTecosystem.KeysecuritycontrolsnecessarytosecuretheIoTenvironmentinclude:
Ø Establishingnetworkvisibility.Ø Implementingnetworksecuritycontrolsandpolicyenforcement.Ø Maintainingaregularcadenceofvulnerabilitymanagementandpatching(wherepossible).Ø Authorizedandunauthorizeduseranddeviceinventorying,auditingandmanagement.Ø Encryptingdataintransitandatrest.Ø EnsuringeffectiveAPIsecurityisinplace.
Additionalcontrolsincludetheabilitytodetectandrespondinthelikelyeventofanincident,aswellasthecapabilitytorestoretheinformationsystemandrecoverthedataafteranincidentoccurred.
Strategic Technology Report Security
Page12of27
By leveraging an IoT security platform, either with a lightweight agent or with agentlessmonitoring capabilities cansignificantlyimprovethesecuritypostureforanIoTecosystem.BelowaresomeofthekeyplayersthatsecuretheIoTecosystem:
Governance,RiskandCompliance MoreonerousGovernance,RiskandCompliance(GRC)reportingrequirementsdrivedemandforGRCservicesandrelatedofferings.ItisexpectedthattherolloutoftheCaliforniaConsumerPrivacyAct(CCPA)inJanuary2020andaslewofsimilardataprivacylegislationtocomewillramp-updemandforGRCskillsandservices.Resourceandskillsconstraintsattheenterprise-levelwill requiremanagedservicestomake-upfortheshortfall intheshort-to-mediumterm(onetothreeyears).GRCcapacitywithinenterpriseswillslowlybeaugmented,becomingastandalonefunctioninmatureenterprises.Thedemandforbusinesscontinuityanddisasterriskstrategiesisexpectedtogainsignificanttractionduringthisperiod.22Fromatechnologystandpoint,thepast12to18monthshasseensignificantconsolidationinGRCSoftware-as-a-Serviceofferings(SaaS)–indicativeofamaturingmarket.SomeofthenotablemergersandacquisitionsincludetheSAIGlobalacquisitionofBWiseandtheACLGRCandRsammergerandrebrandingunderGalvanize.Althoughtheincumbentshavea strong grip on the market, the growing operational complexity of multi-jurisdictional hybrid and multi-cloudenvironments,combinedwithfastmovingregulatorylandscape,presentsopportunitiesforinnovativesolutionstodisruptthemarketplace,particularlyevidencedinthedatagovernancespace.
Strategic Technology Report Security
Page13of27
BelowaresomeofthekeyincumbentandemergingplayersintheGRCspace: Belowaresomeofthekeyincumbentandemergingplayersinthedatagovernancespace:
Research Strategic Technology Report
© 2020 Trace3, Inc. All Rights Reserved
What’sNext? BaselineForecast(2020–2023) Prior to theCOVID-19 crisis, the cyber securitymarket capwasexpected to increase from$167.14billion in 2019 to$248.26billionby2023–representingaCompoundAnnualGrowthRate(CAGR)of8.2percentduringthisperiod.23Otherforecastshadgrowthpeggedat12percentCAGRforthe2020-2025period.24GiventhefluidityoftheCOVID-19crisisandhowunprecedenteditis,itistooprematuretomakeinferencesonprojectedgrowthfor2020andbeyond.However,duetothe currenthigh-riskenvironmentandbusiness-criticalnatureofcybersecurityespeciallyduringtheCOVID-19crisis,thedemandforcybersecurityprofessionalservicesisexpectedtoremainresilient.25
Source:Statista2020Inthecontextoftheshifttoafullyremoteworkforce,keysub-sectorsofthecybersecuritymarketincludingendpointsecurity,IoTandcloudsecurityareexpectedtoseesustaineddemand.26SummaryEvidenceforBaselineForecastThekeyassumptionsdrivingthegrowthofthecybersecuritymarketare:
Ø Escalatingcyberthreatsandhighprobabilityofadatabreach.Ø Increasingshifttodistributedcomputingenvironments.Ø IncreaseddemandinIoTsecurity.
167.
14
184.
19 202.
97 223.
68 248.
262 0 1 9 2 0 2 0 2 0 2 1 2 0 2 2 2 0 2 3
PRE-COVID-19,CYBERSECURITYMARKETWORLDWIDE$BILLIONS
CAGR: 8.2%
Strategic Technology Report Security
Page15of27
Ø Moreonerousdatasecurityanddataprivacysecurityandreportingrequirements. Assumptions
1. Theriskprobabilityofacybersecuritybreachhistoricallyincreasesyear-on-year.2. Managedsecurityservicesbecomeanintegralcomponenttosecuringtheenterprisein2020andbeyond:
§ CrisissituationssuchasCOVID-19andtheshifttofullyremoteoperationspresentsarapidescalationofcybersecurityriskastheattacksurfaceareaexpands.
§ EarlyanalysispointstoadramaticescalationincybersecurityincidentsinthewakeofCOVID-19.273. The move to hybrid-cloud and edge computing environments will drive cloud-native cyber security solution
developmentandadoption.4. Therolloutof5GnetworkingwillseeadramaticincreaseinthenumberofIoTsensorsanddevices,increasingthe
demandforIoTsecuritysolutions.5. ThedemandformanagedGRCservicesisexpectedtogrowasmulti-jurisdictionalGRCreportingrequirements
increaseinscopeandcomplexity.
TOPFACTORSLEADINGTOITBUDGETINCREASES2020
Source:Spiceworks(2020)
MarketActivity Cybersecuritymarketdealactivity isexpectedtocontinuethetrendof increasingconsolidation.Venturecapitalseedfundingisexpectedtocooloffsignificantlyin2020.
N = 1005
Strategic Technology Report Security
Page16of27
USCYBERSECURITYMARKETDEALSJANUARY2009TOMARCH2020
Source:CBInsights(March23rd,2020)
Strategic Technology Report Security
Page17of27
ForcesImpactingCyberSecurity(2020-2023) Thesectionbelowconsiders someof themost significant social, technological,economicandpolitical forces thatwillimpactcybersecuritysolutiondevelopmentandadoptionoverthenextonetothreeyears.
SocialForces Thisreportseesunmitigatedriskasadefiningsocialforceshapingtheenterpriselandscapeoverthenextonetothreeyears.Risk isbeingmanifest inamultitudeofways, the first concerns thehighprobabilityofacyberbreachand thechallenges associatedwithmitigating this risk. Several definitive sources point to an alarming escalation in both thevolume of data compromised and the financial costs associated with data exposure.28 It here enterprises willing toinnovatewithemergingtechnologysecuritysolutionsarebetterplacedtomitigateriskmoreeffectively.29The second area of risk concerns having the necessary security controls in place to comply with emerging, multi-jurisdictionaldataprivacyregulatoryframeworks.SeveralUSstates,includingNewYork,MaineandNevadaarefollowingCalifornia’sConsumerPrivacyActinlegislatingdataprivacyregulations.Theneedforeffectiveenforcementandcontroloverdatasecurityandprivacyisadrivingforceshapingcybersecuritysolutiondevelopmentandadoption.Inthisregard,expectmorecomprehensivesolutiondevelopmentandinvestmentingranular-levelDataSubjectRightsprivacysolutions.In addition, as shockwaves from the Coronavirus Disease 2019 (COVID-19) are felt, expect the demand for BusinessContinuityandDisasterRiskservices,anoften-neglectedareaoftheenterpriseriskmanagement,toescalate.
SocialForces- MitigatingRisk- DataPrivacy
TechnologicalForces- Cloud-NativePlatform
- 5G
EconomicForces- Recession- COVID-19
PoliticalForces- Nationalism
- NationStateAPTs
STEPAnalysis
Strategic Technology Report Security
Page18of27
Source:Statista(2020) TechnologicalForces Thetrendofincreasingmarketconsolidationtowardsaplatformbased,singlepaneofglassconsolewillcontinue,withlessandlessappetiteintheenterpriseformultiplesecuritysolutions,offeringnarrowuse-casefunctionality.Thebulkofnew investment in cyber securitydevelopmentwillbecloud-native,whilealso takinghybrid cloudenvironments intoaccount.Therewillbeanincreasingdividebetweenincumbentandcloud-nativesecuritysolutions,particularlyevidencedby the on-premise and hybrid infrastructure incumbents and the cloud-native disruptors. This “forking” among thesolutionswilltakeonanaddedimpetuswiththeroll-outofcloud-enabled5Gedgedatacenterinfrastructure.EconomicForces ConsideringtheimmediatenegativeimpactofCOVID-19onglobaltradewiththeleadingindicesexperiencingtheirmostsignificant declines since the 2008 recession, the likelihood of an economic slowdown and possible global recessionpresentsamedium-to-stronglikelihoodwithinthenext6to12months.30Thefullextentofthedisruptiontotheglobaleconomywillonlybeevidentoncethespreadofthevirusiscurtailedandthreateffectivelymanaged.Supplychainshocks,particularlyrelatedtothesemiconductor industry,areexpectedtodisrupttheglobal ITproductmarket,amongotheradjacentmarkets.31EconomictradetensionsbetweenChinaandtheUSareexpectedtoremainhigh,addingtoglobalmarketuncertainty.Havingbusinesscontinuity,disasterriskandpandemicplans inplacewithanemphasisonsupplychainsecurityandservicescontinuity,willbecomemorebusinesscriticalinthewakeofCOVID-19.
Strategic Technology Report Security
Page19of27
PoliticalForces Thepoliticalfall-outfromCOVID-19isyettobedetermined.However,COVID-19-inducedxenophobiaisalreadystartingtorearitsheadwithinandacrossaffectedcountries.PoliticaltensionbetweentheUnitedStatesandChinaisexpectedtoremainhighastradetalkscontinue.TheupcomingUSnationalelectioninNovember2020isanadditionalfactorexpectedtoweighontheUSdomesticmarket.TheUSalsofacesincreasedcompetitionfromChinainICTtechnologydevelopment,thebedrockoftheUSdominatedInterneteconomy.ThisgrowingdiscordisbestcapturedinthedebateoverHuawei’sdominancein5Gtechnologyadoptioninwesterncountries.TheUSbannedHuaweifromparticipatingin5Ginfrastructuredevelopment.TraditionalUStradealliesinEuropehaveamoreambivalentstancewithreferencetoHuawei,clearlyinabidtonotcreatefall-outwithChina,whichistheEU’ssecondlargesttradingpartner.Nation-stateadvancedpersistentthreat (APTs) attacks and campaigns are expected to continue playing a leading role in propagating cyber espionage(China), critical infrastructure attack campaigns (Iran), cybercrime (North Korea), as well as political misinformationcampaigns (Russia).32 Safeguarding proprietary data and intellectual property at the enterprise should be keyconsiderationsforsecurityinvestment.
MitigatingInformationSystemRisk This section considers additional threat vectors from an information system risk and vulnerability managementperspectiveaswellastheleadingSaaSsolutionsthataddresstheserisks.
1. RiskBasedVulnerabilityManagementIt is essential the enterprise information system be equippedwith an autonomous vulnerability and risk assessmentsolutionthatmonitorstheinformationsystemriskandthreatsinreal-time.Itisequallyimportantthesolutioncandetectandremediateriskastheyarise,forinstancebyisolatingnon-criticalsystemsfromcriticalsystemsuponriskescalation.33Belowaresolutionseffectiveatrisk-basedvulnerabilitymanagement:
2. AttackSurfaceRiskReducingtheattacksurfaceresultsinasignificantdeclineinrisk.Thefirststeptoreducingtheattacksurfaceriskrequiresvisibilityacross theenvironment.Solutions that canautomaticallydetectandclassifyknownandunknownassets isacritical firststeptoattacksurfaceriskreduction.Belowaresolutionsthatplayakeyrole in identifyingandclassifyingassetsintheinformationsystem:
Strategic Technology Report Security
Page20of27
3. BreachandAttackSimulationPenetration testing is oneof the tried-and-testedmethods to improving security controls andmaintaining a resilientinformationsystem.The realityhowever isenterprisescanatbestundertakemanualpenetration testsonce to twiceyearly given the resources andeffort required toperform such tests. It is oneof the reasonswhybreach andattacksolutionshaveanessentialroletoplayinhardeningtheinformationsystem.Augmentingmanualpenetrationtestingwithanattackandbreachplatformcanenableenterprisesecuritydepartmentstocontinuouslyfine-tunesecuritycontrolsaswellastesttherobustnessofcyberdefenses.Real-timeinformationontheresilienceoftheinformationsystemagainstcontinuously evolving threats plays a significant role in information system risk reduction. These solutions are at theforefrontofbreachandattacksimulation:
4. EmailProtectionandSecurityAwarenessTraining Businessemailcompromise(BEC)remainsonethe leadingthreatvectorsforattack.Mimecastreported90percentofhealthcareorganizationsexperiencedan“email-borneattack”in2019.34Inmostcasesofanemail-relatedbreach,itisthehumanelementresponsibleforactivatingamaliciouspayloadbyopeningfilesandclickingonlinksembeddedinemails.Keytoaddressingthechallengeofemail-borneattacksisanemailprotectionsolutionthatproactivelyfiltersoutphishingattempts,maliciouspayloadsandmalware.These solutions createanadditional layerofdefenseagainstemail-borneattacks: Settingaregularcadencewithsecurityawarenesstrainingisconsideredessentialtoimprovingthecybersecuritypostureoforganizations.Makinguseofthird-partysecurityawarenesstrainingresourcescanmakeasometimes-dulltopicmoreengagingforstaff.Thesesolutionsplayakeyroleinfacilitatingandimprovingsecurityawarenesstraining:
Strategic Technology Report Security
Page21of27
ConclusionsandRecommendationsManyenterprisesfindthetaskofaddressingcybersecuritychallengesanoverwhelmingone.Addressingcybersecurityvulnerabilitiescanoftenseeminsurmountableduetotheever-evolvingthreatlandscape.Theaimofthisreportwastoprovidesome insight intofourbusinesscriticalareasthatarecentral lynchpinstosecuringtheenterprise informationsystem,requiringdedicatedresourcingandinvestment.BelowareTrace3Research’stopcybersecuritycentricrecommendationsfortheenterprisein2020andbeyond:1. EndpointSecurityRiskManagement
o Endpointsecurityvulnerabilityisoneoftheleadingpointsoffailure.Addressingthisvulnerabilityisoneofthegreatest security ROI an enterprise can make in reducing risk. By investing in a best-in-class endpointprotectionplatform,whichincludesendpointdetectionandresponsecapabilities,canresultinsignificantlyimprovingtheinformationsystemssecurityposture.
2. SecureAccessServiceEdgeo ThedevelopmentofSecureAccessServiceEdge(SASE)isrepresentativeofamaturingcloud-nativesecurity
offering,combiningcloudnetworkingandcloudsecurityinanintegratedplatformoffering.Itisalsokeytoaddressingthedissolvingnetworkperimeterduetotheproliferationofdistributedcomputing.Althoughatan early stage, this cloud-native network security offering will be key to improving cloud enabled edgesecurity.
3. IoTSecurityVulnerability
o IoTsecuritywilltakeonaddedimpetuswiththeadoptionof5Gnetworkinfrastructure.KeytoaddressingIoTsecurityvulnerabilityistoestablishvisibilityandgovernancewithintheIoTecosystem.HavingdedicatedIoTsecuritysolutionsinplaceareessentialinthisregard.
4. ITGRCo The demand for GRC will increase significantly in the short-to-medium term (1-3 years), driven by the
continuouslyevolvingthreatandrisklandscape.Skillconstraintsintightcybersecuritylaborwillunderscoretheneedforthird-partyGRCmanagedserviceproviders.Fromatechnologystandpoint,theincumbentGRCmarketplace is ripe for disruption, expect emerging technology solutions specifically targeting datagovernancechallengestoofferfreshapproachestosolvingprotractedcompliancereportingchallenges.
Strategic Technology Report Security
Page22of27
Appendix
FeaturedUseCases
1. EdgeComputing–Edgecomputingisdistributedcomputingattheuser-levelofInternetconnecteddevices.
2. Endpoint Security RiskManagement–Managing endpoint security risk by using a next generation endpointprotectionplatformthatincludesportmonitoring,firewall,anti-malware,aswellasthreatdetectionandresponsecapabilities.
3. EnterpriseITGovernance,RiskandCompliance–Activelymanagingtheenterprisedatasecurityandgovernancerisk profile to ensure maintenance of acceptable risk posture as well as maintaining legal and regulatorycompliance.
4. Internet-of-ThingsSecurity–SecuringInternet-connectedsensors,devicesanddatatransmittedacrosstheIoTnetwork.
5. SecureAccessServiceEdge–Combiningtheutilityofcloudnetworkingwithcloud-nativenetworksecurityinasingleplatformsolution.
Strategic Technology Report Security
Page23of27
RelevantLinks Trace3EvolveConference–Atwo-dayleadershipandtechnologyconferencefocusingonforward-thinkingandcutting-edgeITsolutions. HighlightsfromEvolve2019–Atwo-dayleadershipandtechnologyconferencefocusingonforward-thinkingandcutting-edgeITsolutions. Trace3 Research – To solve the problems of tomorrow, our researchers leverage Trace3’s unique access across thetechnologylandscapetoderiveimpartialinsights. Trace3 Security – The Trace3 Security team designs and implements innovative security solutions to protect assets,improveoperationalefficiency,andenablefastergrowth.
Strategic Technology Report Security
Page24of27
Sources
Strategic Technology Report Security
Page25of27
1Fulp.E.W.(2014).PerimeterNetwork.ScienceDirect.https://www.sciencedirect.com/topics/computer-science/perimeter-network
Strategic Technology Report Security
Page26of27
2Statista(2020).CybersecurityMarketWorldwide.https://www.statista.com/statistics/595182/worldwide-security-as-a-service-market-size/3MarketWatch.(2020).ResearchonCyberSecurityasaServiceMarket:GlobalForecastAnalysis2025.https://www.marketwatch.com/press-release/global-cybersecurity-services-market-global-countries-data-analysis-2020-2025-covering-recent-trend-and-market-size-growth-feasibility-regional-outlook-and-future-forecast-2020-01-274ETR+(2020).Covid-19Impact.https://etr.plus/marketplace/covid-19-impact-tsis5ThreatPost.(2020).https://threatpost.com/cynet-the-coronavirus-is-already-taking-effect-on-cyber-security-this-is-how-cisos-should-prepare/153758/6FederalBureauofInvestigation(2020).2019InternetCrimeReport.https://www.fbi.gov/news/stories/2019-internet-crime-report-released-0211207IBMPonemonInstitute(2019).CostofaDataBeach.https://ibm.co/38YL7pa8Emisoft(2019).TheStateofRansomwareintheUS:ReportandStatistics2019.https://blog.emsisoft.com/en/34822/the-state-of-ransomware-in-the-us-report-and-statistics-2019/9SonicWall.(2019).SonicWall:EncryptedAttacks,IoTMalwareSurgeasGlobalMalwareVolumeDips.https://blog.sonicwall.com/en-us/2019/10/sonicwall-encrypted-attacks-iot-malware-surge-as-global-malware-volume-dips/10FederalBureauofInvestigation(2020).2019InternetCrimeReport.https://www.fbi.gov/news/stories/2019-internet-crime-report-released-02112011OnlineTrustAlliance.(2019).https://www.internetsociety.org/ota/12Emisoft(2019).TheStateofRansomwareintheUS:ReportandStatistics2019.https://blog.emsisoft.com/en/34822/the-state-of-ransomware-in-the-us-report-and-statistics-2019/13Duo.MoreSecurityEndpointTechIsn’tAlwaysBetter.https://duo.com/decipher/more-security-endpoint-tech-isn-t-always-better14Gartner2019MagicQuadrantforEndpointProtectionPlatforms.https://www.gartner.com/reviews/market/endpoint-protection-platforms/vendors15ISC2.(2019).CloudSecurityReport.https://www.isc2.org/resource-center/reports/cloud-security-report16Gartner(2019).TheFutureofNetworkSecurityIsintheCloud.Gartner.https://www.gartner.com/en/documents/3957375/invest-implications-the-future-of-network-security-is-in17CatoNetworks.(2019).TheSecureAccessServiceEdge (SASE):Here’sWhereYourDigitalBusinessNetworkStarts.https://www.catonetworks.com/blog/the-secure-access-service-edge-sase/18Peterson.C.(2019).SurveyFindsMerely47%CybersecurityProsArePreparedforCyberattacksonIoTDevices.https://semiconductorsindustry.com/2019/11/10/survey-finds-merely-47-cybersecurity-pros-are-prepared-for-cyberattacks-on-iot-devices/454/19Deloitte(2020).Private5Gnetworks:Enterpriseuntethered.https://www2.deloitte.com/us/en/insights/industry/technology/technology-media-and-telecom-predictions/2020/private-5g-networks.html20DarkReading(2019).IoTAttacksUpSignificantlyinFirstHalfof2019.https://www.darkreading.com/attacks-breaches/iot-attacks-up-significantly-in-first-half-of-2019/d/d-id/133609621SonicWall.(2019).SonicWall:EncryptedAttacks,IoTMalwareSurgeasGlobalMalwareVolumeDips.https://blog.sonicwall.com/en-us/2019/10/sonicwall-encrypted-attacks-iot-malware-surge-as-global-malware-volume-dips/22RSAWhitepaper.7StepstoBuildaGRCFramework.https://isacaboise.org/home/wp-content/uploads/2017/10/White-Paper-RSA-Archer-7-Steps-to-Build-a-GRC-Framework.pdf23Statista(2020).CybersecurityMarketWorldwide.https://www.statista.com/statistics/595182/worldwide-security-as-a-service-market-size/24MarketWatch.(2020).ResearchonCyberSecurityasaServiceMarket:GlobalForecastAnalysis2025.https://www.marketwatch.com/press-release/global-cybersecurity-services-market-global-countries-data-analysis-2020-2025-covering-recent-trend-and-market-size-growth-feasibility-regional-outlook-and-future-forecast-2020-01-2725Kolochenko,I.(2020).FivereasonswhyCOVID-19willbolsterthecyber-securityindustry.SCMedia.https://www.scmagazine.com/home/security-news/news-archive/coronavirus/five-reasons-why-covid-19-will-bolster-the-cyber-security-industry/26Kolochenko,I.(2020).FivereasonswhyCOVID-19willbolsterthecyber-securityindustry.SCMedia.https://www.scmagazine.com/home/security-news/news-archive/coronavirus/five-reasons-why-covid-19-will-bolster-the-cyber-security-industry/
Strategic Technology Report Security
Page27of27
27ThreatPost.(2020).https://threatpost.com/cynet-the-coronavirus-is-already-taking-effect-on-cyber-security-this-is-how-cisos-should-prepare/153758/28SeetheFBI’s(2019)InternetComplaintCrimeReportandthePonemonInstitute’s(2019)CostofaDataBeachreport29DepartmentofHomelandSecurity.EmergingTechnologyandHomelandSecurity.https://www.researchgate.net/publication/27296519_EMERGING_TECHNOLOGIES_FOR_HOMELAND_SECURITY30WorldEconomicForum.(2020).Thisishowlikelyacoronavirus-drivenrecessionis,accordingtoeconomists.https://www.weforum.org/agenda/2020/03/coronavirus-survey-of-economists-reveals-consensus-on-a-recession31IDC(2020).COVID-19ToHaveSignificantEffectonWorldwideSemiconductorMarketin2020,AccordingtoIDC.https://www.idc.com/getdoc.jsp?containerId=prUS4614492032Stavridis,J.(2020).RSAKeynote:GeopoliticalRisks,ElectionsandCybersecurity.https://www.rsaconference.com/usa/us-2020/agenda/geopolitical-risks-elections-and-cybersecurity33SANS.CriticalSecurityControls.https://www.sans.org/critical-security-controls/guidelines34Mimecast(2020).HowU.S.HospitalsandHealthSystemsApproachEmailSecurityHIMSS2020.https://www.mimecast.com/resources/white-papers/dates/2020/3/how-us-hospitals-and-healthcare-organizations-approach-email-security/
Recommended