Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

The Changing Cybersecurity Landscape in 2016

By Christopher Camejo
cyber_enews
February 9, 2016

In the past few years a number of high-profile data breaches have garnered widespread media attention resulting in greater general scrutiny and awareness of the need for network security. Legislators, in particular, have taken notice, evidenced by a number of efforts aimed at addressing these crimes, including the Cybersecurity Information Sharing Act that was controversially passed into law in December 2015. The truth is that these types of efforts will likely have a tremendous impact on how information security is handled over the coming years – possibly more than anything that hackers and identity thieves themselves will do – and the combination of these and other factors will significantly affect how CSOs address cybersecurity in 2016 and beyond. Fortunately, CSOs can educate themselves about a number of factors and issues to be better prepared to combat the myriad threats they face.

Global Legislation

To begin with, CSOs must think carefully about where data will be stored and sent, which solutions they will employ to do so, and how multi-nationals will operate as a result of rapidly shifting politics around privacy, encryption, espionage, jurisdiction, and more. For example, Edward Snowden’s revelations about NSA spying has led to  demand for more and better encryption on consumer and commercial products while also contributing to the end of the Safe Harbor Privacy Principles that enabled U.S. companies to self-certify compliance with European Union Data Protection Directive and Swiss requirements for privacy; the policy was declared invalid by the European Court of Justice in October due to concerns that the U.S. government was collecting information in violation of the privacy directives regardless of the statements made by the U.S.-based companies handling the data.

Meanwhile state and federal privacy laws require the use of encryption to protect personally identifiable information from identity thieves while the U.S. Department of Justice is advocating for backdoors to be inserted into encryption products so that the government can eavesdrop on communications in order to detect and prevent crimes and terrorist acts. In spite of this, the U.S. State Department contributes to the TOR encrypted anonymous relay service that is used by dissidents under oppressive regimes and online criminals alike.

These are truly confused times where various branches and levels of government are pulling in opposite directions on the topics of security, encryption, privacy and responsibility.

Government-Supported Efforts

It is well-understood that some governments are involved in hacking – whether to conduct espionage or sabotage – but the U.S. and UK governments in particular are actively attempting to work around the challenges posed by the Internet’s security infrastructure in their efforts to eavesdrop on encrypted terrorist, criminal, foreign intelligence, and other messages. Thus far they seem to have taken a “collect everything” approach regardless of the consequences. The potential impact of these efforts on business puts CSOs between the proverbial “rock and a hard place.”

On one hand, organizations have legal and/or contractual privacy obligations to their customers and business partners to protect sensitive data. At the same time they face the threat of being prosecuted by their own government for violating some nebulous, unwritten set of national security directives by not turning over information or the being hacked by their own government if their systems could provide a convenient conduit to another target. Companies that provide networking, telecommunications, and security infrastructure or services in particular must be wary as state-sponsored attackers, including the U.S.’s NSA and UK’s GCHQ, have been known to exploit otherwise innocent companies in order to leverage them for attacks on other targets, networks and systems.

This is further complicated for multi-national companies when privacy and national security laws may end up in opposition, as was the case with the use of National Security Letters to quietly collect otherwise private data from U.S. companies and Europe’s Safe Harbor principles to protect the privacy of information being handled by U.S. companies. If a number of countries were to pass laws requiring organizations to, for example, provide a backdoor to their encryption (as China did in December 2015 and various departments within the U.S. government have proposed following the Paris and San Bernardino attacks), this would open yet another potential infiltration point (or multiple points) for hackers to breach and access sensitive operations and security data. This would also likely conflict with privacy laws in other jurisdictions exposing companies to liability for failing to secure the data. This is something CSOs, particularly within multinational companies, must be aware of as the debates about privacy vs. backdoors unfolds and legislation is developed.

ICS and IoT Security

Among the methods hackers employ is exploiting a variety of networked devices besides traditional servers and workstations to either gain access to a network or cause damage. Among the devices hackers have had a degree of success with are Industrial Control Systems, i.e. the hardware and software packages that control and monitor physical infrastructure like power plants, factories, and city infrastructure, and IP connected embedded devices now commonly referred to as the Internet of Things, e.g. IP cameras, medical devices, and automobiles.

These types of devices are vulnerable often simply because installers or end users failed to change default factory security settings or passwords, which can easily be found online, or because devices are running outdated software that is riddled with vulnerabilities and can be exploited to gain access. Many of these types of devices are inexplicably exposed directly to the Internet where they can easily be found and exploited by an attacker.

The danger here is not only that the device can serve as a gateway to accessing the overall network, but that it also poses a risk of massive physical damage. Once a device has been hacked, individuals may be able to control or disable it to cripple real-world infrastructure.

CSOs must pay close attention to these types of systems, that are often overlooked by IT personnel because they don’t fall into the traditional server/workstation model, and make sure that all possible security measures are applied to networked devices and that they are shielded from potential attackers.

Outsourcing

Many organizations outsource data processing and storage, often ostensibly transferring security responsibilities to these third parties as well, but that on its own is not a viable solution because it doesn’t insulate a company from negative publicity resulting from a breach of its data, even if that data resides with a third-party. We saw this last year with the Experian/T-Mobile breach. While it was Experian’s systems that were breached, it was T-Mobile’s customers who had their data stolen, therefore, it was T-Mobile who ended up in the headlines, weakening trust among its customers and the public in general.

The lesson here is that CSOs must more thoroughly vet the organizations and vendors with whom they share sensitive data. You can’t pass the buck or blindly trust that a third-party will apply appropriate security measures to shared data. This certainly applies to companies that rely on the cloud as well because in reality, “the cloud” is just the fancy term for storing data offsite on someone else’s server and often relying on the provider for security among other services.

Network Monitoring

Moving forward, organizations must pay more attention to monitoring networks and generating alerts when signs of breaches are detected. While preventative measures are paramount, it’s impossible to keep every attacker out every time. A determined attacker can usually breach a network’s perimeter, so detection and immediate action is essential.

Only an ongoing monitoring program covering system activity and network communications can detect anomalous activities that can indicate an ongoing breach and allow an organization to stop attackers once they get into the network, hopefully before they can do any real damage. Security technology solutions can help streamline this process by aggregating log data and alerts, but many organizations are lured in by the promises of security device vendors without budgeting for the care and feeding that these devices will require. Having a human team that can tune these products while investigating and responding to alerts is absolutely necessary in order for them to be effective. This is a time-consuming activity that requires trained personnel on call 24/7. This is a commitment that all but the largest enterprises may not be ready for, in which case managed security services should be considered.

Network segmentation, separating critical systems from others within the same network with strong security measures, is key because it provides more locations where the network can be monitored and establishes chokepoints that can slow an attacker down as he attempts to move from an initial entry-point to other systems containing sensitive data.

The effectiveness of monitoring depends on system logs and alerts complemented with ongoing network behavioral analysis that can detect anomalous activity. For example, if systems that have never communicated suddenly start exchanging large amounts of data, that is a likely indicator of a breach. Similarly, if network activity that typically only occurs during business hours appears during off-hours it should be considered a red flag. Many organizations don’t have this level of visibility into their network today.

Assessments

Rather than waiting for hackers to expose security vulnerabilities or the ineffectiveness of their ability to monitor the network, CSOs can turn to third-party consultants who will conduct penetration testing to detect and analyze vulnerabilities the same way a real attacker would, allowing organizations to proactively find and address these areas of weakness. True penetration tests should go beyond the basic vulnerability scans than many organizations are currently conducting by actually attempting to exploit vulnerabilities that are detected within the network in order to capture sensitive data. Tests can and should also include other tactics commonly used by real attackers like phishing, physical infiltration of facilities, and searches of the Internet for leaked passwords or other sensitive data. Custom applications are an area of particular concern as they often contain vulnerabilities that are hard for scanners to detect automatically but that attackers can easily find and exploit.

These types of technical assessments only skim the surface. In order to make better informed decisions about how the security budget should be allocated, the CSO should be aware of overall risks to the organization. This data is gathered in the form of a risk assessment that weighs the potential cost of a particular type of incident with the expected frequency with which that incident can be expected to occur. Some organizations take a highly subjective shortcut approach to risks assessments but thorough methodologies like NIST SP800-30 and ISO 27005 exist to help an organization make an objective assessment.

Without question, recent data breaches, including the resulting media coverage and legislation efforts, have placed greater scrutiny on how networks are protected. Just as hackers are relentless in their ongoing attempts to attack organizations’ networks, CSOs must be equally vigilant in ensuring a strong security foundation that will enable more effective detection, mitigation and recovery from potential breaches. Awareness of current and future legislation, careful consideration of vendors with whom data is shared, network monitoring and recognition of the wider-ranging impacts data breaches can have on multiple systems are just a few of the ways CSOs can gain insight into the security of their networks and systems. Then, they can take the appropriate steps to protect their organizations from the very real threats they face on a daily basis.

KEYWORDS: cyber legislation cybersecurity compliance data security security education

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Christopher Camejo is Director of Threat and Vulnerability Analysis for NTTSecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0619-Cyber-Feat-slide1_900px

    The changing threat landscape in today’s cybersecurity

    See More
  • cyber 2 feat

    The Changing Cybersecurity Landscape

    See More
  • vertical colorful wires

    The new information landscape is changing how security leaders work

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!