Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Cloud Security Risks Will Be a Top Concern for Organizations in 2020

Data Privacy Compliance, Business Continuity Management Also High Priorities

By Cory Cowgill
SEC0419-leadership-feat-slide1_900px
February 28, 2020

“The Cloud” enters its third decade in 2020 and is now almost universally adopted by most organizations. But boards and senior management are becoming increasingly concerned by the security risks that the cloud brings. Cloud security will be a top IT and organizational risk going into the new decade, alongside compliance with new data privacy regulations, company engagement of business continuity management and the ethics of advanced technologies.

Here are six predictions that I expect will concern most IT and senior management professionals in the coming year.

 

1. “The Cloud”

The question is not so much whether cybersecurity breaches will occur, but how organizations will step up their efforts to address and manage their cloud risks when they do. High-profile breaches (i.e. Equifax) over the past few years have clearly demonstrated that no organization is immune. In 2020, we will see a tighter focus on cybersecurity diligence around cloud servers. Increased pressure will be put on big cloud providers such as AWS, Google, and Microsoft Edge for tighter security and they will likely respond with increased security measures.

There will also be a heightened awareness of customer use of SaaS products, such as Salesforce, ServiceNow, and WorkDay. Boards and senior management are finally realizing that security is legally their responsibility, not that of the cloud service provider. So if a breach or attack does occur, it’s the company and its senior management that will take the hit. Because of that, it should be top of the agenda when talking with customers – cybersecurity must be treated as a board room issue.

 

2. Ransomware Attacks

Ransomware attackers have, unfortunately, had a lot of success to date. That’s particularly true in the healthcare industry, where network-connected technology powers a lot of critical equipment (i.e. x-rays, MRIs) as well as patient record systems and billing software. The threats are manifesting faster than the security updates and patches can keep up. Ransomware attackers know that hospitals will pay up because they can’t afford downtime – and recovery from an attack can cost more than paying the ransom. We’ve also seen that municipalities, particularly small to mid-sized cities, are vulnerable for many of the same reasons. So, expect that search for relief from ransomware attacks will gain traction in 2020.

 

3. Cybersecurity Fatigue

CISOs and IT execs are suffering from “cybersecurity fatigue.” More and more vendors have come to market with “new solutions” for everything cybersecurity-related and the market is growing by the day. CISO’s know that cyber threats are real and present tremendous organizational risks. But what is the best technology to thwart them? New products are generally incremental improvements. That’s what is causing the fatigue. Expect to see CISOs push back against cybersecurity vendors in 2020.

 

4. New Privacy Laws

We’re in a new era of trust – or rather and lack of trust. Big tech companies are increasingly being scrutinized for privacy blunders or deliberate violations. GDPR led the way last year and in January we will have CCPA in the U.S. There will be further discussions about enacting a privacy law at the federal level in the US. All eyes will be on the presidential and congressional elections to see if there is a repeat of the kinds of privacy issues that occurred in 2016. Expect to hear a lot about it on the campaign trail. China also has privacy laws which will impact many multi-national businesses.

 

5. Business Continuity Management

The integration of digital transformation and risk management will become even more important in 2020 as advancing technologies create even more risks and concerns for organizations. Stakeholder and boardrooms are placing increased emphasis on business continuity management (BCM) systems that can cope with disasters and other business disruptions. Many organizations have a long history of businesses using paper documents and spreadsheets – which hinders a resilient, fast-to-respond BCM program.

In addition, many companies manage risk by departments rather than as an organization-wide effort. Advanced new BCM software programs offer vast improvements in risk management. Senior management now realizes that BCM needs to be part of the DNA of any organization. Checking compliance boxes doesn’t do any good until everything is integrated in a holistic BCM system.

 

6. Ethics of Advanced Technologies

Advanced technologies (i.e. artificial intelligence, machine learning) are in many cases developing faster than society’s ability to deal with their ethics. For example – “deep fakes” are manipulated video or audio files produced by sophisticated artificial intelligence that yield fabricated images and sounds that appear to be real. Beyond disinformation, deep fakes have been used in criminal scams such as calling in to a bank impersonating a CEO to request a big wire transfer. We’ve only seen the tip of the iceberg. Expect to see more questions being raised in boardrooms about the legal and ethical risks of advanced technologies in the coming decade.

Business continuity today is heavily dependent on the prudent management of risks in cloud computing, cybersecurity, data privacy and advanced technologies. These technologies are here to stay because they present more benefits than risks. But managers realize the risks can blow up into full-scale disasters if not properly managed – and that they are responsible. So, expect to see them sharpen their focus on BCM and risk going forward.

KEYWORDS: cloud security cyber security cybersecurity information security ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cory cowgill

Cory Cowgill is CTO at Fusion Risk Management. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Here are the top political and security risks for 2021 that your organization needs to take prepare for

    Organizations must prepare for these 2021 security risks now, or may fail to make it in a post-COVID world

    See More
  • Question marks painted on trees

    86% of cyber professionals cite unknown cyber risks as a top concern

    See More
  • cloud-computing-freepik89765432.jpg

    Multi-cloud adoption will be strong in 2022 but key security gaps and challenges remain

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing