3 min

Security Predictions for 2019: Challenges for Cybersecurity, By David Grout, FireEye

Cyber risks - Amélie RIVES - December 28, 2018

2018 was a challenge year and we don’t expect it to get any easier in 2019. These days, having the right intelligence and knowing how best to use it can mean the difference between a minor incident and a full-blown breach. Understanding adversaries and their tactics, techniques and procedures is one of the best ways to stay ahead of them. In 2019, two main challenges for citizens, states and companies will be that to improve the security and in particular to learn to react faster and faster in order to limit the damages of unavoidable cyber attacks.


Use of Emerging Technologies to Evade Detection

FireEye experts have seen a steady increase in cyber criminals adopting cloud-based infrastructure to carry out sophisticated attacks. That was true throughout 2018, and in 2019 and beyond, we expect to see the use of emerging technologies such as blockchain and AI to obfuscate attacks. Also, with the increase in the number of AI-based cyber security products deployed in organizations, and security vendors innovating to bring new AI-based security products to the market, attackers will begin adapting their behavior accordingly. Next year we are expecting to see use of new techniques to evade AI-based solutions, including threats that blend in with normal traffic and threats that provide misleading data to challenge and disrupt machine learning models.

The Dark Side of Social Media

In the last half of 2018, FireEye announced an extensive network of information operations – presumed to be driven by the political interest of Iran – that involved social media. With the upcoming elections across EMEA in 2019, the organization predicts that social media will continue to be the leading platform to produce information operations driven by foreign countries with a strategic interest in a particular state or a region. The mission could either be to promote a particular political party that might be friendlier towards specific foreign policies, or to drive a political narrative, causing conflict within the country.

In recent years, hundreds of vendors have rushed into this market, each going its own “cure”. To fight cybercriminals effectively, the best tactic is to rely on appropriate and complementary technologies, as well as competent and motivated employees.

However, today the community agrees that no system is impenetrable if the attack is motivated. The latest regulations confirm this, beyond the implementation of prevention and protection solutions, there is today an obligation to provide itself with the means to improve the reaction time when an attack occurs. You have to be able to react, investigate, and understand the reality and the perimeter of it. And like the great sportsmen, to be good, you have to train yourselves regularly.

Cyber Attack Simulation: evaluate to solve cyber risks

The simulation exercise evaluates your organization’s cyber crisis processes, tools and proficiency in responding to cyber attacks from both an executive strategic and technical incident response perspective.

FireEye has a deep understanding of both existing and emerging threat actors, as well as their rapidly changing tactics, techniques and procedures. The simulation exercise draws on this expertise to deliver custom scenario injects rooted in real-world experience and designed to address your key business and technical areas of risk.

FireEye is ready for FIC 2019

FireEye has some exciting and engaging activities throughout the show. Visit the booth B15 to catch in-booth presentations from FireEye’s experts, meet with specialists to discuss your security concerns, and explore the live Cyber Attack Simulation sessions to find out how to manage events inside and outside of your company when a cyber attack occurs.

As an attendee of the Cyber Attack Simulation, you will gain useful insights into the challenges surrounding a cyber incident and the wide-ranging skills and teamwork required to manage the incident well.

The Cyber Attack Simulation will offer you the opportunity to:

  • Understand, in a practical and engaging way, threats, risks and responses.
  • Build confidence in taking the right actions that will protect your company in the event of the event of an attack.
  • Gain a deep understanding of the consequences of specific actions.

David Grout, CTO EMEA,FireEye, will participate in the workshop “An overview of current and future cyber-threats” planned at FIC on Wednesday, January 23rd at 11:30.


Send this to a friend