2018 Cybersecurity Predictions

 

2018 Predictions:
Trends in Cybersecurity

The 2018 Cybersecurity Predictions by Aon's Cyber Solutions show the top trends that will impact business in the next 12 months.

Since issuing our 2017 predictions, we’ve seen a dramatic rise in the sophistication, scale, and impact of cyber attacks.

As companies strive to enrich their customer experiences through a spectrum of endpoints, ranging from mobile devices to automobiles, the attack surface has increased dramatically. With this ever-growing threat landscape comes a proportionate increase in the impact that cyber attacks have on enterprises, and the customers they serve.

This report draws on our experience working with boards and C-suites, as well as security and risk professionals to plan for, mitigate, and manage the expanding impact of cyber risk across the enterprise.

2018 Predictions

  • Criminals harness IoT devices as botnets to attack infrastructure.
    Businesses adopt standalone cyber insurance policies as boards and executives wake up to cyber liability.
    1
    1
  • 2
    2
    Industry first-movers embrace pre-M&A cybersecurity due diligence.
    As the physical and cyber worlds collide, chief risk officers take center stage to manage cyber as an enterprise risk.
  • Data integrity attacks rise.
    Regulatory spotlight widens and becomes more complex, provoking calls for harmonization. The EU holds global company to account over GDPR violation; big data aggregators come under scrutiny in the US.
    3
    3
  • Nation state cyber espionage and information war influences global politics and policy.
    Criminals look to attack businesses embracing the IoT, in particular targeting a small to mid-sized company providing services to a global organization.
    4
    4
  • Spear-phishing and social engineering tactics become more crafty, more targeted and more advanced.
    As passwords continue to be hacked, and attackers circumvent physical biometrics, multi-factor authentication becomes more important than ever before.
    5
    5
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    Criminals will target transactions that use points as currency, spurring mainstream adoption of bug bounty programs.
    6
    6
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    Ransomware attackers get targeted; Cryptocurrencies help ransomware industry flourish.
    7
    7
  • 8
    8
    Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    Insider risks plague organizations as they underestimate their critical vulnerability and liability, and major attacks continue to fly under the radar.

2018 Cybersecurity Predictions

  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    1
    Businesses adopt standalone cyber insurance policies as boards and executives wake up to cyber liability.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    2
    As the physical and cyber worlds collide, chief risk officers take center stage to manage cyber as an enterprise risk.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    3
    Regulatory spotlight widens and becomes more complex, provoking calls for harmonization. The EU holds global company to account over GDPR violation; big data aggregators come under scrutiny in the US.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    4
    Criminals look to attack businesses embracing the IoT, in particular targeting a small to mid-sized company providing services to a global organization.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    5
    As passwords continue to be hacked, and attackers circumvent physical biometrics, multi-factor authentication becomes more important than ever before.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    6
    Criminals will target transactions that use points as currency, spurring mainstream adoption of bug bounty programs.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    7
    Ransomware attackers get targeted; Cryptocurrencies help ransomware industry flourish.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    8
    Insider risks plague organizations as they underestimate their critical vulnerability and liability, and major attacks continue to fly under the radar.

Download the report