SlideShare a Scribd company logo
1 of 15
Download to read offline
Top 12 Predictions from Leading
Cybersecurity Experts
ibm.biz/TourCyberThreatAnalysis
What’s in store for cybersecurity in 2017?
With the increasing magnitude and frequency
of cyber attacks, how can we stay ahead of
possible threats to counter and mitigate?
ibm.biz/TourCyberThreatAnalysis
“2017 will be the year of ‘hunt’
analysis, where organizations will
proactively search through their
network for threats versus having
an alert to indicate a problem.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
The year of hunt analysis
ibm.biz/TourCyberThreatAnalysis
“We will see the proliferation of the
Internet of Things as a tool to cause
disruptions and attacks on critical
infrastructure. More cyber attacks
will become crimes that result in
physical harm.”
Michael Goedeker, CEO and Founder
HAKDEFNET and Security Researcher
IoT causes disruptions
ibm.biz/TourCyberThreatAnalysis
“Social media providers will
continue to seek the right balance
of cooperating with government and
protecting their business reputation.”
Todd M. Rosenblum, Senior Executive
for i2 Safer Planet
Cybersecurity and social media
ibm.biz/TourCyberThreatAnalysis
“Private sector companies will
increasingly participate in military style
‘wargames’ to test the readiness of
their cybersecurity organizations.”
Bob Stasio, CISSP Senior Product Manager
i2 Enterprise Insight Analysis
Cybersecurity wargames
ibm.biz/TourCyberThreatAnalysis
“Rise of machines—more AI and cognitive
technology will be implemented to make up
for the shortfall in trained and experienced
cybersecurity professionals.”
Morgan Wright, Cyber Terrorism
and Cyber Crime Analyst
Rise of cognitive in cybersecurity
“New cognitive behavior tracking capabilities
will help reduce elevated privilege abuse and
insider threat.”
Shahid Shah, CEO at Netspective Communications,
Cybersecurity and Risk Consultant
ibm.biz/TourCyberThreatAnalysis
“Zero-day exploit value on the dark
web will far exceed the amount that
companies are willing to pay for ‘bug
bounties’ due to the overall value of
data amassed.”
Scott N. Schober, CEO Berkeley Varitronics Systems, Inc.
and Author Hacked Again
Zero-day exploit
ibm.biz/TourCyberThreatAnalysis
“The security versus convenience
debate will enter the public eye as
high-profile companies suffer incidents
that could have been prevented with
two-factor or strong passwords.”
Tyler Carbone, COO at Terbium Labs
Security vs. convenience debate
ibm.biz/TourCyberThreatAnalysis
“Huge DDoS attacks coinciding with fake news
tweets about a major data breach and unreliable,
but viral, social media posts and sloppy tech
reporting by a few bloggers and media sites
will cause a significant, but temporary, drop in
select stocks. The hidden goal of the hackers:
manipulation of stock prices for financial gain.”
Dan Lohrmann, Chief Strategist and
Chief Security Officer at Security Mentor, Inc.
Hackers use fake news
ibm.biz/TourCyberThreatAnalysis
“Trust in systems will be broken as
bad guys move from just exfiltrating
data to changing it.”
Caleb Barlow, Vice President of IBM security
Trust will be broken
ibm.biz/TourCyberThreatAnalysis
“Companies will seek to quantify the
costs and benefits of new technologies
versus cost and likelihood of a breach,
as information security becomes
less an IT problem and more a risk
management problem.”
Tyler Carbone, COO at Terbium Labs
Rise of cyber risk management
ibm.biz/TourCyberThreatAnalysis
“Many custom services in healthcare, retail
and financial depend on knowing customers
and anticipating their future needs. But
personalization data can lead to loss of privacy
and increased security risks. The pressure to
balance these three sometimes conflicting
requirements will increase significantly in 2017.”
Diana Kelley, Global Executive
Security Advisor, IBM
Pressure to balance privacy,
personalization and security
ibm.biz/TourCyberThreatAnalysis
“Industries such as energy and
utilities, manufacturing and supply
chains have remained relatively
isolated from major cyber attacks.
This is about to change.”
Michael Kehoe, WW Program Director, IBM
Cyber attacks spread
Be acutely aware of the threatscape
and equip yourself to predict, mitigate
and counter cyber attacks:
ibm.biz/TourCyberThreatAnalysis

More Related Content

More from IBM Analytics

Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introductionIBM Analytics
 
10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen toIBM Analytics
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentIBM Analytics
 
Cognitive banking with expert insights
Cognitive banking with expert insightsCognitive banking with expert insights
Cognitive banking with expert insightsIBM Analytics
 
Sales performance management and C-level goals
Sales performance management and C-level goalsSales performance management and C-level goals
Sales performance management and C-level goalsIBM Analytics
 
The science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementThe science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementIBM Analytics
 
Expert opinion on managing data breaches
Expert opinion on managing data breachesExpert opinion on managing data breaches
Expert opinion on managing data breachesIBM Analytics
 
Top industry use cases for streaming analytics
Top industry use cases for streaming analyticsTop industry use cases for streaming analytics
Top industry use cases for streaming analyticsIBM Analytics
 
Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive eraIBM Analytics
 
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive eraIBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive eraIBM Analytics
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation managementIBM Analytics
 
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attendIBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attendIBM Analytics
 
Data science tips for data engineers
Data science tips for data engineersData science tips for data engineers
Data science tips for data engineersIBM Analytics
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats? IBM Analytics
 
10 benefits to thinking inside Box
10 benefits to thinking inside Box10 benefits to thinking inside Box
10 benefits to thinking inside BoxIBM Analytics
 
The digital transformation of the French Open
The digital transformation of the French OpenThe digital transformation of the French Open
The digital transformation of the French OpenIBM Analytics
 
Bridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architectureBridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architectureIBM Analytics
 
What does data tell you about the customer journey?
What does data tell you about the customer journey?What does data tell you about the customer journey?
What does data tell you about the customer journey?IBM Analytics
 
What CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on itWhat CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on itIBM Analytics
 
Banking in the age of the empowered consumer
Banking in the age of the empowered consumerBanking in the age of the empowered consumer
Banking in the age of the empowered consumerIBM Analytics
 

More from IBM Analytics (20)

Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introduction
 
10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 
Cognitive banking with expert insights
Cognitive banking with expert insightsCognitive banking with expert insights
Cognitive banking with expert insights
 
Sales performance management and C-level goals
Sales performance management and C-level goalsSales performance management and C-level goals
Sales performance management and C-level goals
 
The science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagementThe science of client insight: Increase revenue through improved engagement
The science of client insight: Increase revenue through improved engagement
 
Expert opinion on managing data breaches
Expert opinion on managing data breachesExpert opinion on managing data breaches
Expert opinion on managing data breaches
 
Top industry use cases for streaming analytics
Top industry use cases for streaming analyticsTop industry use cases for streaming analytics
Top industry use cases for streaming analytics
 
Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive era
 
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive eraIBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation management
 
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attendIBM Virtual Finance Forum 2016: Top 10 reasons to attend
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
 
Data science tips for data engineers
Data science tips for data engineersData science tips for data engineers
Data science tips for data engineers
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats?
 
10 benefits to thinking inside Box
10 benefits to thinking inside Box10 benefits to thinking inside Box
10 benefits to thinking inside Box
 
The digital transformation of the French Open
The digital transformation of the French OpenThe digital transformation of the French Open
The digital transformation of the French Open
 
Bridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architectureBridging to a hybrid cloud data services architecture
Bridging to a hybrid cloud data services architecture
 
What does data tell you about the customer journey?
What does data tell you about the customer journey?What does data tell you about the customer journey?
What does data tell you about the customer journey?
 
What CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on itWhat CEOs want from CDOs and how to deliver on it
What CEOs want from CDOs and how to deliver on it
 
Banking in the age of the empowered consumer
Banking in the age of the empowered consumerBanking in the age of the empowered consumer
Banking in the age of the empowered consumer
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Top 12 cyber security predictions for 2017

  • 1. Top 12 Predictions from Leading Cybersecurity Experts
  • 2. ibm.biz/TourCyberThreatAnalysis What’s in store for cybersecurity in 2017? With the increasing magnitude and frequency of cyber attacks, how can we stay ahead of possible threats to counter and mitigate?
  • 3. ibm.biz/TourCyberThreatAnalysis “2017 will be the year of ‘hunt’ analysis, where organizations will proactively search through their network for threats versus having an alert to indicate a problem.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis The year of hunt analysis
  • 4. ibm.biz/TourCyberThreatAnalysis “We will see the proliferation of the Internet of Things as a tool to cause disruptions and attacks on critical infrastructure. More cyber attacks will become crimes that result in physical harm.” Michael Goedeker, CEO and Founder HAKDEFNET and Security Researcher IoT causes disruptions
  • 5. ibm.biz/TourCyberThreatAnalysis “Social media providers will continue to seek the right balance of cooperating with government and protecting their business reputation.” Todd M. Rosenblum, Senior Executive for i2 Safer Planet Cybersecurity and social media
  • 6. ibm.biz/TourCyberThreatAnalysis “Private sector companies will increasingly participate in military style ‘wargames’ to test the readiness of their cybersecurity organizations.” Bob Stasio, CISSP Senior Product Manager i2 Enterprise Insight Analysis Cybersecurity wargames
  • 7. ibm.biz/TourCyberThreatAnalysis “Rise of machines—more AI and cognitive technology will be implemented to make up for the shortfall in trained and experienced cybersecurity professionals.” Morgan Wright, Cyber Terrorism and Cyber Crime Analyst Rise of cognitive in cybersecurity “New cognitive behavior tracking capabilities will help reduce elevated privilege abuse and insider threat.” Shahid Shah, CEO at Netspective Communications, Cybersecurity and Risk Consultant
  • 8. ibm.biz/TourCyberThreatAnalysis “Zero-day exploit value on the dark web will far exceed the amount that companies are willing to pay for ‘bug bounties’ due to the overall value of data amassed.” Scott N. Schober, CEO Berkeley Varitronics Systems, Inc. and Author Hacked Again Zero-day exploit
  • 9. ibm.biz/TourCyberThreatAnalysis “The security versus convenience debate will enter the public eye as high-profile companies suffer incidents that could have been prevented with two-factor or strong passwords.” Tyler Carbone, COO at Terbium Labs Security vs. convenience debate
  • 10. ibm.biz/TourCyberThreatAnalysis “Huge DDoS attacks coinciding with fake news tweets about a major data breach and unreliable, but viral, social media posts and sloppy tech reporting by a few bloggers and media sites will cause a significant, but temporary, drop in select stocks. The hidden goal of the hackers: manipulation of stock prices for financial gain.” Dan Lohrmann, Chief Strategist and Chief Security Officer at Security Mentor, Inc. Hackers use fake news
  • 11. ibm.biz/TourCyberThreatAnalysis “Trust in systems will be broken as bad guys move from just exfiltrating data to changing it.” Caleb Barlow, Vice President of IBM security Trust will be broken
  • 12. ibm.biz/TourCyberThreatAnalysis “Companies will seek to quantify the costs and benefits of new technologies versus cost and likelihood of a breach, as information security becomes less an IT problem and more a risk management problem.” Tyler Carbone, COO at Terbium Labs Rise of cyber risk management
  • 13. ibm.biz/TourCyberThreatAnalysis “Many custom services in healthcare, retail and financial depend on knowing customers and anticipating their future needs. But personalization data can lead to loss of privacy and increased security risks. The pressure to balance these three sometimes conflicting requirements will increase significantly in 2017.” Diana Kelley, Global Executive Security Advisor, IBM Pressure to balance privacy, personalization and security
  • 14. ibm.biz/TourCyberThreatAnalysis “Industries such as energy and utilities, manufacturing and supply chains have remained relatively isolated from major cyber attacks. This is about to change.” Michael Kehoe, WW Program Director, IBM Cyber attacks spread
  • 15. Be acutely aware of the threatscape and equip yourself to predict, mitigate and counter cyber attacks: ibm.biz/TourCyberThreatAnalysis