dcsimg

9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

  • 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

    9 Predictions for Cybersecurity’s Role in Government and Politics in 2017-

    A stolen device will uncover major political scandal

    Cybersecurity isn’t always about malware or infiltrating the network. Absolute's Global Security Strategist, Richard Henderson, thinks that with all the attention being put on securing backend infrastructure, groups will forget to educate and secure the endpoint devices being used by the politicians themselves. “A stolen laptop without full disk encryption or asset tracking software can very easily be broken into and ransacked. Why hack the hardened email server when you can just get the emails from the user directly?” Henderson asks. “Expect to see at least one embarrassing incident where leaked emails that came directly from a stolen device are sent to the press.”

1 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

  • 1 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017-7

    A stolen device will uncover major political scandal

    Cybersecurity isn’t always about malware or infiltrating the network. Absolute's Global Security Strategist, Richard Henderson, thinks that with all the attention being put on securing backend infrastructure, groups will forget to educate and secure the endpoint devices being used by the politicians themselves. “A stolen laptop without full disk encryption or asset tracking software can very easily be broken into and ransacked. Why hack the hardened email server when you can just get the emails from the user directly?” Henderson asks. “Expect to see at least one embarrassing incident where leaked emails that came directly from a stolen device are sent to the press.”

The 2016 presidential election ushered in new era. As Grant Shirk, senior director of Product Marketing at Vera, pointed out, it was our first true cyber election. Not only did much of it play out in social media, particularly on Twitter and Facebook, but the election brought attention to how stolen data can be used to manipulate opinions, and it may have presented us with the our first taste of cyber espionage.

“As we enter 2017,” says ThetaRay CEO Mark Gazit, “we will see more and more occasions where cybersecurity is not about computer geeks and IT departments, but about threats to financial institutions and critical infrastructure, including very well-protected mail servers. History has taught us that the warfare arena, including espionage and intelligence gathering, follows technological progress -- and in some cases leads the progress. As such, we will almost certainly see new and more advanced technological solutions being used by governments to conduct cyber warfare, even before they fall into the hands of civilian cyber criminals.”

Here are expert predictions about how cybersecurity will affect and involve our government, policies and politics in 2017.