Infographic: key cybersecurity insights in all industries
Which trends are shaping our future?
Digital transformation has been strongly accelerating in the last few years, especially since the pandemic. Each industry had to adapt and modernize their structure, business processes and technologies. Explore this infographic outlining what are the main trends we are seeing for each of them, the related cyber threats and how their transformation can be effectively secured.
Key figures for 2022
24.4%
The overall cloud workload protection (CWP) market is estimated at about $5.9 billion in 2022, at 24.4% CAGR.
(source)
Trend
Telco cloud systems – especially NFVi (network function virtualization infrastructure) – are increasingly based on cloud-native paradigms.
Use cases:
- Bare-metal Kubernetes platforms included, without security options in deeper software layers
- Edge computing – whether in Radio Access Networks (RAN) or multi-access edge computing (MEC) – uses the same cloud-native platforms as telco cloud
Threat
All system or platform security threats apply, from the Linux OS kernels typically used in modern NFV or cloudification systems upward through middleware and communication through network function DevSecOps.
Technology
The challenge can be addressed in two ways:
- CSPM for cloud-native network functions and their platforms. Relevant controls range from platform hardening to electronic GRC management systems for NFVi
- CWPP software installed in telco cloud Kubernetes clusters
Cloud security posture management
Cloud workload protection platform
Trend breakers
Future telco cloud platform software may include built-in CWPP features. Red Hat can be expected to integrate StackRox functions into OpenShift, a Kubernetes system very popular in the telco cloud market.
Key figures for 2022
Expect growth of 200 million additional devices each year, as providers undergo digital transformation. (source)
17%
Utilities increased IoT use by 17% in 2020, to 1.39 billion devices globally
Trend
Energy and utility providers are rapidly deploying smart energy solutions to modernize infrastructure, manage finite resources and reduce cost.
Use cases:
- Smart metering
- Creating delivery efficiencies with analytics and machine learning
- Leveraging real-time data to identify anomalies and dispatch maintenance
Threat
Without security controls, unauthorized individuals can disrupt service, steal service and expose sensitive data.
Ransomware
DDoS attacks
Privacy information exfiltration
Service theft
Technology
IoT and connected infrastructure must be secured to only allow access and interrogation by authorized individuals and services.
Secure vulnerability and patch management
Network security and segmentation
Threat detection and response
Encryption
Trend breakers
Utility and energy management has traditionally been segregated from IT networks, but the trend has been moving away from network segmentation in favor of centralization.
Key figures for 2022
$40 Billion
Operational Technology (OT) hardware and software sales are expected to reach $40 Billion in 2022.
(source)
Trend
Integrating legacy OT systems into modern infrastructure and IoT implementation for efficiency and data collection have evolved and are rapidly being adopted.
Use cases:
- OT monitoring and sensing
- Smart factory for management ease and visibility
- Resource consolidation and IT/OT convergence
Threat
IoT is being developed without proper cybersecurity considerations and legacy OT devices are susceptible to attacks.
Ransomware
Denial of service
Beachhead and advanced persistent threat
Intellectual property theft
Technology
Manufacturers need technology and threat visibility and response capabilities and need to consider connected threats that affect typically air-gapped devices.
Secure vulnerability management
Network security and segmentation
Zero trust
Trend breakers
Cybersecurity standards and requirements for IoT and OT devices are becoming more homogenous, accepted and required, paving the way to more inherently secure sensors and devices.
Key figures for 2022
By the end of 2023, 10% of banks will use consumer digital identities. (source)
70%
By 2022, Bring Your Own Identity (BYOI) will be common practice in 70% of consumer Identity and Access Management (IAM) programs.
(source)
Trend
As consumers increasingly engage with their banks digitally, digital identity becomes a foundational asset upon which highly personalized offerings can be securely presented.
Use cases:
- Provide superior customer experiences
- Offer new innovative services
- Enable consumers to be in control of their data
Threat
Compromised digital identities can be abused to access bank accounts and make purchases online.
Ransomware
Phishing attacks
Credential attacks
Technology
Digital identities provide strong protection against fraud and financial crime risks and are critical for adopting a zero trust approach.
Zero trust model assessment
Identity and access management
Know your customer (KYC)
Key figures for 2022
24.2%
IoT in retail markets are predicted to grow to $150.1 billion by 2027, at a compound annual growth rate of 24.2%
(source)
Trend
Evolving retail customer experience adds the need for IoT sensors, in-store customer interfaces and mobile integrations.
Use cases:
- Unattended retail stores
- Analytics for shopping experience enhancements
- Smart inventory and supply chain management
Threat
Unsecure IoT devices can be compromised, exposing private customer and payment data, disrupting experience and creating inventory loss.
Device masquerading
Credential escalation
Denial of service
Data sniffing
Technology
To secure new and emerging technologies, retailers must control access to IoT networks, manage identities on mobile devices and ensure supply-chain security.
Network security and segmentation
Network and message encryption
Mobile identity and access management
Secure firmware updates
Secure connected inventory
Trend breakers
Retail was historically an in-person experience, but is evolving to a connected, blended experience including online shopping, mobile apps, and in-person pickup.
Key figures for 2022
50%
By 2025, over 50% of government agencies will have modernized critical core legacy applications to improve resilience and agility.
(source)
Trend
The need to scale and secure digital infrastructure to handle requests for new service delivery models.
Use cases:
- Trusted digital connections for people and devices
- Improved digital experience
- Faster service with reduced human workload
Threat
The adoption of new technologies without digital trust and digital resilience will fail.
Ransomware
Use of unauthorized credentials and phishing
Data exfiltration and espionage
Supply chain attacks
Disruption of operations
Technology
Government agencies must have a holistic security view and implement comprehensive security controls to prevent threats.
Secure public administration digital transformation
Ensure data security and data sovereignty
Improve cyber resilience with detection and response to cyberattacks
Secure smart infrastructure and critical services
Key figures for 2022
Trend
Telco systems – including NFV – are increasingly based on distributed IT systems.
Use cases:
- IP-level encryption is becoming a paramount technical control in modern telco networks
- Advent of MEC and other telco value-add services (VAS)
Threat
Threats include DOS (sabotage) and telecom cybercrime, like SIM card fraud to overcome mobile MFA in banking.
Affecting both machine-to-machine and man-to-machine communication, they are technically based on:
Man in the middle attacks
Identity spoofing
Technology
Communication encryption today is typically based on IPSec and TLS. While the encryption itself is done in the operating system and app software, its quality depends on endpoint authentication through certificates.
IPSec (OSI layer 3 encryption, typically used for RAN any-haul or MEC)
TLS (OSI layer 4 encryption, typically used for REST-full HTTPS-based APIs)
Trend breakers
New encryption algorithms and libraries, and increased NFVi processing power provide a remedy, but the need for endpoint authentication through certificates will increase.
Key figures for 2022
Trend
Global quarantines and restrictions have increased last-mile shipping demand and supply chain strain, increasing the need for artificial intelligence, smart transportation, autonomous vehicles, and smart inventory management.
Use cases:
- Autonomous shipping vehicles
- Machine learning and AI for smart inventory
- On-time shipping at increased volumes
Threat
Connected shipping, IoT sensors, and connected inventory requires security to ensure quality of service and data security.
Ransomware
Denial of service
Data exfiltration
Personally identifiable information theft
Technology
IoT and converged technologies need to be sufficiently secure to ensure operational capabilities, accuracy in service delivery and efficiency.
Blockchain for inventory
Network security and segmentation
Identity and access management
Secure vulnerability & patch management
Key figures for 2022
Trend
The need for remote patient monitoring and precision medicine have led to the increased adoption of the Internet of medical things (IoMT).
Use cases:
- Real-time patient health monitoring
- Advanced medical data analytics for research purposes
- Timely and accurate diagnosis
Threat
If not properly protected, sensitive medical data can be exposed and patient services interrupted.
Ransomware
DDoS attacks
Data exfiltration
Phishing attacks
Credential escalation
Technology
Healthcare delivery organizations must tightly control devices connected to their networks and allow only patched and monitored devices.
Strong access management
Network security and segmentation
Secure firmware updates
Asset inventory
Encryption
Trend breakers
Connected medical devices were commonly used to monitor medical equipment. As they rely on more advanced sensors, new security issues arise.