Infographic: key cybersecurity insights in all industries

Which trends are shaping our future?

Digital transformation has been strongly accelerating in the last few years, especially since the pandemic. Each industry had to adapt and modernize their structure, business processes and technologies. Explore this infographic outlining what are the main trends we are seeing for each of them, the related cyber threats and how their transformation can be effectively secured.

Key figures for 2022

24.4%

The overall cloud workload protection (CWP) market is estimated at about $5.9 billion in 2022, at 24.4% CAGR.

(source)

Trend

Telco cloud systems – especially NFVi (network function virtualization infrastructure) – are increasingly based on cloud-native paradigms.

Use cases:

  • Bare-metal Kubernetes platforms included, without security options in deeper software layers
  • Edge computing – whether in Radio Access Networks (RAN) or multi-access edge computing (MEC) – uses the same cloud-native platforms as telco cloud

Threat

All system or platform security threats apply, from the Linux OS kernels typically used in modern NFV or cloudification systems upward through middleware and communication through network function DevSecOps.

Technology

The challenge can be addressed in two ways:

  • CSPM for cloud-native network functions and their platforms. Relevant controls range from platform hardening to electronic GRC management systems for NFVi
  • CWPP software installed in telco cloud Kubernetes clusters

Cloud security posture management

Cloud workload protection platform

Trend breakers

Future telco cloud platform software may include built-in CWPP features. Red Hat can be expected to integrate StackRox functions into OpenShift, a Kubernetes system very popular in the telco cloud market.

Key figures for 2022

Expect growth of 200 million additional devices each year, as providers undergo digital transformation. (source)

17%

Utilities increased IoT use by 17% in 2020, to 1.39 billion devices globally

Trend

Energy and utility providers are rapidly deploying smart energy solutions to modernize infrastructure, manage finite resources and reduce cost.

Use cases:

  • Smart metering
  • Creating delivery efficiencies with analytics and machine learning
  • Leveraging real-time data to identify anomalies and dispatch maintenance

Threat

Without security controls, unauthorized individuals can disrupt service, steal service and expose sensitive data.

Ransomware

DDoS attacks

Privacy information exfiltration

Service theft

Technology

IoT and connected infrastructure must be secured to only allow access and interrogation by authorized individuals and services.

Secure vulnerability and patch management

Network security and segmentation

Threat detection and response

Encryption

Trend breakers

Utility and energy management has traditionally been segregated from IT networks, but the trend has been moving away from network segmentation in favor of centralization.

Key figures for 2022

$40 Billion

Operational Technology (OT) hardware and software sales are expected to reach $40 Billion in 2022.

(source)

Trend

Integrating legacy OT systems into modern infrastructure and IoT implementation for efficiency and data collection have evolved and are rapidly being adopted.

Use cases:

  • OT monitoring and sensing
  • Smart factory for management ease and visibility
  • Resource consolidation and IT/OT convergence

Threat

IoT is being developed without proper cybersecurity considerations and legacy OT devices are susceptible to attacks.

Ransomware

Denial of service

Beachhead and advanced persistent threat

Intellectual property theft

Technology

Manufacturers need technology and threat visibility and response capabilities and need to consider connected threats that affect typically air-gapped devices.

Secure vulnerability management

Network security and segmentation

Zero trust

Trend breakers

Cybersecurity standards and requirements for IoT and OT devices are becoming more homogenous, accepted and required, paving the way to more inherently secure sensors and devices.

Key figures for 2022

By the end of 2023, 10% of banks will use consumer digital identities. (source)

70%

By 2022, Bring Your Own Identity (BYOI) will be common practice in 70% of consumer Identity and Access Management (IAM) programs.

(source)

Trend

As consumers increasingly engage with their banks digitally, digital identity becomes a foundational asset upon which highly personalized offerings can be securely presented.

Source: IDC

Use cases:

  • Provide superior customer experiences
  • Offer new innovative services
  • Enable consumers to be in control of their data

Threat

Compromised digital identities can be abused to access bank accounts and make purchases online.

Ransomware

Phishing attacks

Credential attacks

Technology

Digital identities provide strong protection against fraud and financial crime risks and are critical for adopting a zero trust approach.

Zero trust model assessment

Identity and access management

Know your customer (KYC)

Key figures for 2022

24.2%

IoT in retail markets are predicted to grow to $150.1 billion by 2027, at a compound annual growth rate of 24.2%

(source)

Trend

Evolving retail customer experience adds the need for IoT sensors, in-store customer interfaces and mobile integrations.

Use cases:

  • Unattended retail stores
  • Analytics for shopping experience enhancements
  • Smart inventory and supply chain management

Threat

Unsecure IoT devices can be compromised, exposing private customer and payment data, disrupting experience and creating inventory loss.

Device masquerading

Credential escalation

Denial of service

Data sniffing

Technology

To secure new and emerging technologies, retailers must control access to IoT networks, manage identities on mobile devices and ensure supply-chain security.

Network security and segmentation

Network and message encryption

Mobile identity and access management

Secure firmware updates

Secure connected inventory

Trend breakers

Retail was historically an in-person experience, but is evolving to a connected, blended experience including online shopping, mobile apps, and in-person pickup.

Key figures for 2022

50%

By 2025, over 50% of government agencies will have modernized critical core legacy applications to improve resilience and agility.

(source)

Trend


The need to scale and secure digital infrastructure to handle requests for new service delivery models.

Use cases:

  • Trusted digital connections for people and devices
  • Improved digital experience
  • Faster service with reduced human workload

Threat

The adoption of new technologies without digital trust and digital resilience will fail.

Ransomware

Use of unauthorized credentials and phishing

Data exfiltration and espionage

Supply chain attacks

Disruption of operations

Technology

Government agencies must have a holistic security view and implement comprehensive security controls to prevent threats.

Secure public administration digital transformation

Ensure data security and data sovereignty

Improve cyber resilience with detection and response to cyberattacks

Secure smart infrastructure and critical services

Key figures for 2022

9.4%

Network encryption market estimated at about $4 billion in 2022, at 9.4% CAGR.

(source)

Trend


Telco systems – including NFV – are increasingly based on distributed IT systems.

Use cases:

  • IP-level encryption is becoming a paramount technical control in modern telco networks
  • Advent of MEC and other telco value-add services (VAS)

Threat

Threats include DOS (sabotage) and telecom cybercrime, like SIM card fraud to overcome mobile MFA in banking.

Affecting both machine-to-machine and man-to-machine communication, they are technically based on:

Man in the middle attacks

Identity spoofing

Technology

Communication encryption today is typically based on IPSec and TLS. While the encryption itself is done in the operating system and app software, its quality depends on endpoint authentication through certificates.

IPSec (OSI layer 3 encryption, typically used for RAN any-haul or MEC)

TLS (OSI layer 4 encryption, typically used for REST-full HTTPS-based APIs)

Trend breakers

New encryption algorithms and libraries, and increased NFVi processing power provide a remedy, but the need for endpoint authentication through certificates will increase.

Key figures for 2022

20%

20% of all transportation and logistics providers are prepared for cloud transformation and spending on IoT devices is estimated at $40 billion in 2022.

(source, source)

Trend

Global quarantines and restrictions have increased last-mile shipping demand and supply chain strain, increasing the need for artificial intelligence, smart transportation, autonomous vehicles, and smart inventory management.

Use cases:

  • Autonomous shipping vehicles
  • Machine learning and AI for smart inventory
  • On-time shipping at increased volumes

Threat

Connected shipping, IoT sensors, and connected inventory requires security to ensure quality of service and data security.

Ransomware

Denial of service

Data exfiltration

Personally identifiable information theft

Technology

IoT and converged technologies need to be sufficiently secure to ensure operational capabilities, accuracy in service delivery and efficiency.

Blockchain for inventory

Network security and segmentation

Identity and access management

Secure vulnerability & patch management

Key figures for 2022

10-15

There will be an average of 10-15 connected medical devices per patient bed by 2022.

(source)

Trend

The need for remote patient monitoring and precision medicine have led to the increased adoption of the Internet of medical things (IoMT).

Use cases:

  • Real-time patient health monitoring
  • Advanced medical data analytics for research purposes
  • Timely and accurate diagnosis

Threat

If not properly protected, sensitive medical data can be exposed and patient services interrupted.

Ransomware

DDoS attacks

Data exfiltration

Phishing attacks

Credential escalation

Technology

Healthcare delivery organizations must tightly control devices connected to their networks and allow only patched and monitored devices.

Strong access management

Network security and segmentation

Secure firmware updates

Asset inventory

Encryption

Trend breakers

Connected medical devices were commonly used to monitor medical equipment. As they rely on more advanced sensors, new security issues arise.

Share this article