“2019 saw the cybersecurity industry start to explore AI-based solutions. In the coming months, cybercriminals will start to do the same, integrating AI and machine learning into their malware programs to bypass and infiltrate targeted systems. Current cybersecurity measures rely on ‘detection and response,’ but as attackers begin to leverage AI to bypass existing solutions, companies will be left at a significant disadvantage against these seemingly undetectable campaigns. We could see AI-based malware become prominent in day-to-day attacks”—Guy Caspi, CEO, Deep Instinct
“In 2020, we’ll see an increasing number of cybercriminals use AI to scale their attacks. AI will open the door to mutating malware based on attackers using genetic algorithms that are capable of learning, increasing their chances of success. What’s particularly concerning is that these mutations often bypass traditional anti-virus solutions by altering their signature or structure along the way, meaning the malicious payload is free to wreak havoc on systems”—Maty Siman, Founder and CTO, Checkmarx
“In 2020, at least one company will come forward announcing a detection made by AI/ML, really championing the use of AI and ML for this purpose. As the use of AI/ML evolves, we will see these tools for what they are, new methods to complement industry cyber-defense, and not the magical silver bullets they are currently perceived as”—Stephen Jou, CTO, Interset, a Micro Focus Company
“In 2020, we will see the most significant implementation of AI to date, with this technology being used to not only proactively monitor and fight advanced threats, but also secure users in zero trust environments as they share critical information across countless endpoints in the IoT. It’s no longer about siloed threat prevention and endpoint management, but rather dynamic (frictionless) solutions that combine these offerings to remove human error from the equation, while simultaneously learning, adapting and empowering end users to be productive, safe and collaborative”—Charles Eagan, CTO, BlackBerry
“At least three US States will declare states of emergency due to waves of ransomware in 2020. Ransomware, which carried a price tag of over $10 billion this year in attacks, will continue to plague state and municipal agencies lacking appropriate skills, controls, and ransomware countermeasures. If that isn’t worrisome enough, we predicts there’s a 20 percent chance this could escalate to a national level”—Jon Oltsik, Senior Principal Analyst and Fellow, Enterprise Strategy Group (ESG)
“Ransomware will continue to both dominate headlines and cause havoc in 2020. The complexity of the attacks and the packaging of Ransomware-as-a-Service will continue to increase, while organizations grapple with both prevention and implementing practices to respond appropriately. Responses by organizations will be split between those who recover from backups, and those with more limited options who opt to pay the ransom”—Danny Allan, Vice President of Product Strategy, Veeam
“Over the coming years, the rate at which the cybersecurity industry experiments with and adopts new techniques from the scientific machine learning community will continue to increase, allowing systems to make semi- or even fully-autonomous decisions in defending information systems and their users. These new defense techniques will be crucial, as it’s likely that cybercriminals will begin executing ‘wetware’ attacks by combining automated content generation and manual human effort to personalize attacks against targets, and evade the current generation of defenses”—Joe Levy, CTO, Sophos
“While privacy rights related to personal data have been top of mind recently, there is one area where consumers are becoming more lenient with sharing their data—their safety. The physical and cyber security markets are seeing more and more use cases for AI-based threat intelligence and security solutions that become more intelligent with more access to data. Organizations must prioritize education around data sharing, and teach their employees how data can be used to enhance safety and optimize the balance between machine learning and humans in 2020”—Imad Mouline, CTO, Everbridge
“AI-driven decision making isn’t going anywhere. We observe the way it works, but we don’t fully understand why. This brings up a whole new form of vulnerability, because if it’s suddenly mis-trained, there is no way to test it. Cybercriminals can develop an information advantage because they don’t care or comply with privacy regulations. In 2020, the hardest to detect operations will be the ones that are doing the best job of learning from AI”—Michael Tiffany, Co-Founder and President, White Ops
“Threat actors will increase the use of AI to analyze defense mechanisms and simulate behavioral patterns, bypassing security controls and leveraging analytics and machine learning to hack into organizations. Threat actors, many of which will be state-sponsored, will increase their use and sophistication of AI algorithms to analyze organizations’ defense mechanisms and tailor attacks to specific weak areas. We’ll also see bad actors accessing the data streams of organizations and using the data to further orchestrate more complex attacks”—Dr. Torsten George, Cybersecurity Evangelist, Centrify
“As we see more instances of AI in 2020 and a continued development of facial recognition technologies, we will begin to see government entities declaring privacy regulations on what data businesses can and cannot use. Next year, we will see which governments will allow this level of technology within municipalities and discuss the cyber vulnerabilities associated with this type of use case”—Chris Downie, CEO, Flexential
“Deepfakes will take center-stage in the 2020 election as real identity becomes harder to verify. This technology will be used to generate false videos of political candidates being made to say or do almost anything, and these videos can be produced in near real-time. That risk is further amplified by how quickly video content is spread on social media networks, and it typically takes some time for companies to remove deepfake content from their platforms. The methods and sophistication at which false information can be spread is continuing to grow, and voters will need to remain wary of where and how they get information”—Stephen Ritter, CTO, Mitek
“AI bots and deepfakes will challenge the very definition of fair and open elections, one of the pillars of any democracy. The technology is so widely available, difficult to detect and powerful, that its use by all parties with a vested interest in the outcome of the 2020 U.S. Presidential election is a given”—Chad Steelberg, CEO and Chairman, Veritone
“One huge concern regarding deepfakes in 2020 is their potential in blackmail, and especially sextortion, that are ‘leveled-up’ with AI deepfakes that make fake videos of anyone. If a sextortion campaign were to threaten to release a deepfake image or video of someone, it would likely be much more successful than the average campaign that doesn’t have doctored materials. In 2020, we’ll see regulatory bodies realize the need to update revenge porn laws to include deepfake images and videos”—Ashlee Benge, Threat Researcher, ZeroFOX
“In the last election, foreign actors did a pretty good job of interfering through low-key, under-the-radar social. To make the American populace lose confidence you don’t have to hack a hard target, but you could make it look like you did or you’re trying. You don’t have to take out voting booths to spread misinformation about taking out voting booths. Expect news stories, propaganda, and stunts specifically designed to shake the public’s confidence”—Joan Pepin, CSO, Auth0
“In 2020, cyber warfare will continue to be used as an instrument of foreign policy. Cyberweapons are increasingly being used in geopolitical conflicts, often in conjunction with traditional kinetic weapons. Since 85 percent of the US’s critical infrastructure is owned by the private sector—and the DoD and FBI have neither the resources nor the legal standing to defend civilian assets before they’re attacked—enterprises will need to significantly boost their cyber defenses and perhaps even their offensive capabilities to protect themselves from nation-state attacks”—Phil Neray, VP of Industrial Cybersecurity, CyberX
“The balkanization of the internet is going to drive big business model innovation in software. To avoid subjecting themselves to government subpoenas, companies will start making creative use of boundaries to split where they store their data and where they store their encryption keys. In 2020, companies will start using country borders as an unexpected regulatory safeguard to provide customers with better data security”—Max Wessel, Chief Innovation Officer, SAP
“Data is more valuable today than gold and it’s more than just CEOs and CMOs who are realizing this; malicious cybercriminals are too. As we start a new decade, organizations will need to put more focus on discovering where all of their data lives, determining whether it’s sensitive and how to best secure it. New compliance standards like the California Consumer Privacy Act (CCPA) are creating an opportunity for organizations to develop good data management policies that allow them to better protect themselves from data breaches”—Peter Duthie, Co-CEO & Chief Architect, Ground Labs
“A global standard for cybersecurity is expected to become a top priority across industries, as businesses make bigger strides toward securing their Operational Technology systems against increased cyber threats”—Mirel Sehic, Global Director of Cybersecurity, Honeywell Building Solutions
“Supply chain attacks will increase in 2020, making protecting and managing the supply chain essential to operational survival. More organizations are moving their supply chain to the cloud and bringing on smaller, niche organizations, to support specialized skills which will broaden the potential vulnerabilities and management challenges. Companies must have solutions in place that give them full visibility into their supply chain network, and tools that allow them to identify and respond to threats swiftly”—Munya Kanaventi, Senior Director of Information Security, Everbridge
“2020 will be the year we realize that current cyber security methodologies are no longer sufficient to protect data. Billions upon billions of sensitive records were stolen in 2019 and the public will penalize organizations that don’t take real steps to protect their data”—Brad Schoening, Principal Architect, Privitar
“We’ll see the number of 5G attacks grow in 2020 with the net augmentation of connected devices. The main threat here is in how the hackers can abuse a connected device and find a flaw to access a linked account or vice versa. To protect attacks through connected devices, an important step/action is to make sure each account linked to an object is ultra-secured”—Guillaume Bourcy, Sr. Director of Data Solutions, TeleSign
“With online shopping showing no signs of slowing down, fraudsters are moving away from in-store fraud and instead continuing to prioritize card-not-present (CNP) fraud—which is expected to balloon at a compound annual rate of 14% through 2023, costing retailers $130 billion. In 2020, we will also see increased attacks related to omnichannel shopping, as merchants now need to manage fraud across a growing number of devices, and it’s easier than ever for criminals to extend stolen credentials across channels”—KC Fox, SVP Technology Services, Radial
“Cybersecurity is eclipsing operational efficiency as the central concern for IT organizations in healthcare, due to complex and vulnerable ‘business associate’ relationships among industry entities, many of whom are struggling to manage their own polyglot technical infrastructures built around ancient legacy systems”—Frank Ingari, President, Tandigm Health
“There are two major trends emerging. The first is the concept of CASE (connected, autonomous, shared, electric). As technologies such as 5G lead to increased connectivity alongside advances in proprietary and open source software (e.g., Automotive Grade Linux), we’ll see targets move beyond the vehicle. Malicious actors will leverage new, evolving attack vectors in backend systems, mobile apps, infrastructure and services relating to automotive technologies”—Dennis Kengo Oka, Senior Solution Architect, Synopsys
“In addition to an increase in ransomware and business email compromise, in 2020 we will also begin to witness an increase in API extortion. Many businesses offering SaaS and IT solutions have multiple open APIs, which puts them at risk. We now need to profile and identify the baseline normalities to API gateways, so that we can work to detect abnormalities and potential pathways for attackers. As security professionals, we need to continue to lead our companies in increasing our security posture, actively working to become more resilient by putting concrete practices in place as we see APIs start to come under attack”—Sharon Reynolds, Chief Information Security Officer, Omnitracs
“In 2020, we will see a rise in attacks across productivity and mobility platforms, following a year in which businesses were laser focused on simplifying the end-user experience, creating rapid communication and automating mundane tasks. With this focus, they failed to acknowledge the security implications of these new tools and attackers have begun to leverage these same benefits to access and hide in plain sight. As such, we can expect to see malicious actors continue to do so in the new year”—Joshua Douglas, Vice President, Threat Intelligence, Mimecast
“With the continued move to deploy smart technology throughout our cities with lighting, traffic control, mobility solutions, fire and safety operations, smart cities will become an even bigger target in 2020. Expect to see more cyberattacks (think ransomware and malware) against them, which will greatly disrupt the smart technology and how these cities operate. This could potentially have serious impacts on day-to-day life and could even bring city life to a screeching halt”—Deral Heiland, IoT Research Lead, Rapid7
“Smart cities will look to embedded cybersecurity in the coming year. Malicious actors can disrupt and paralyze smart devices with Remote Code Execution, altering their well-planned, fine-tuned operations. Infrastructure disruptions, direct liability and ransomware are just a few of the potential outcomes of losing control over these software defined systems. Attacks can go far beyond ransomware attempts. They can disable utilities, schools, and shopping centers, and take down an entire power grid”—Assaf Harel, Co-founder and Chief Scientist, Karamba Security
“In 2020, healthcare organizations (HCOs) will take the following steps to mitigate rising security concerns: (1) gravitate towards more security standards, including HITRUST, and require additional levels of controls and certifications from all systems connected to their organizations; (2) more closely monitor user behavior and activity to maintain control; (3) slow some of the innovation and development they desire next year in order to adhere to a more conservative risk profile”—Robin Cavanaugh, CTO, GetWellNetwork
“There is an increasing demand by consumers to control their data, not only in terms of opting in to the use of their data but, more specifically, what their data can be used for by an organization. The ability to select which services or analytics are relevant and then specifying which data sets can be leveraged by the individual consumer will be a significant differentiator for organizations able to provide this level of choice”—Neil Correa, Cyber Strategist, Micro Focus
“We have already learned that using the same password for everything and ones containing extremely personal information is not a good idea. But what about the randomly generated ones that websites now provide for us? Just because the site is suggesting a ‘verified’ safe password with random symbols and letters combined doesn’t ensure complete protection from cyber hackers who in the near future could configure these algorithms and start the next wave of password hacks”—Rajesh Ganesan, VP, ManageEngine
“In 2020, the combination of the lack of security talent and the increasing level of sophistication in the techniques employed by hackers and cybercriminals will finally jumpstart a refresh cycle in the SIEM and SOC space. Next year, companies will double down on their use of security analytics and automation to help understaffed and alert-fatigued security teams protect mission critical systems and sensitive customer data. We will also see a wave of innovation that focuses entirely on moving SecOps teams from a reactive posture to a proactive posture when it comes to cybersecurity”—Greg Martin, VP and GM, Security Business Unit, Sumo Logic
“Breaches and hacks continued to dominate the headlines in 2019; however, following the theft of user data, 2020 will be the year of account takeover. With cyberattacks and data breaches now commonplace, account takeover attacks will be on the rise”—Geoff Huang, VP Product Marketing, Sift
“As automation increases across the IIoT network, the need to support legacy infrastructure will create more challenges in maintaining trusted environments. We’re likely to have more than 75 billion connected devices accessing the internet by 2025, creating insatiable power demands and security vulnerabilities. From an industry and provider perspective, the focus will be on preventing outages to ensure 99.9999% uptime while securing networks. It’s a growing challenge, and one that will continue to accelerate through 2020”—Michael Regelski, SVP and CTO, Electrical Sector, Eaton
“As organizations allocate more budget to data security, boards of directors will demand that those investments serve a double duty—improving the security of information assets and driving the business by enhancing user productivity or reducing spending on legal and compliance operations. They will require specific metrics and regular reporting to prove that these goals are being achieved”—Ilia Sotnikov, VP of Product Management, Netwrix
“We will see an increase in the number of M&A deals in 2020 and security needs to be a key component of any M&A strategy. Companies need to learn from the headaches faced by Marriott in 2018 when it acquired Starwood and inherited a breach of guest data. If companies lack solutions that provide adequate visibility into their own systems as well as those of the companies that they are acquiring, we will see similar breaches take place in 2020”—Anurag Kahol, Co-Founder and CTO, Bitglass
”As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, we will see a slew of data breaches caused by misconfigurations. Due to the pressure to go big and go fast, developers often bypass security in the name of innovation. All too often this leads to data exposure on a massive scale”—Chris DeRamus, Co-Founder and CTO, DivvyCloud
“5G, AI, LMR + LTE and UAS will be the biggest movers and shakers in public safety. In 2020, smart states will replace smart cities, and anything that can be connected will be connected. If there is no cellular/broadband connectivity, Private LTE networks will fill that coverage gap. Cloud and edge computing, along with 5G will enable AI technology and machine learning”—Estee Woods, Director, Public Sector and Public Safety Marketing, Cradlepoint
“GDPR and CCPA (California Consumer Privacy Act) are just the tip of the iceberg with regards to the protection and consumer control of consumer data. Over the course of the next decade, consumer control of personal data can be expected to increase dramatically as governments and regulators drive new privacy legislation. In time, these regulatory actions will likely lead to complete consumer control of personal data and opportunities for consumers to directly monetize their data or directly exchange data for goods and services”—Buno Pati. CEO, Infoworks
“IT security has always been a priority, but OT security will require the same level of attention. OT security involves protecting manufacturing robots, refinery equipment, nuclear reactors, power substations and the like from intruders. There are large differences between OT and IT security breaches, and OT needs to improve its approach”—Richard Beeson, CTO, OSIsoft
“The build, test, and deploy component of DevOps will become a top priority in 2020. There is a growing emphasis on one pillar of the DevOps process—building, testing, and deploying, and what can be done to optimize this critical component of software development. The answer lies in continuous integration and continuous delivery. CI/CD is a process and mentality change whereby moving faster and testing smaller, more atomic units you end up building a much better, higher quality application. Test now, test often, and automate anything that developers need to do more than twice”—Jim Rose, CEO, CircleCI