Home Features Top Security and Risk Trends for 2021

Top Security and Risk Trends for 2021

This year’s top security and risk trends highlight ongoing strategic shifts in the security ecosystem that aren’t yet widely recognized but are expected to have a broad industry impact and significant potential for disruption.

SHARE
Zero Trust

Cybersecurity and regulatory compliance are the top two biggest concerns of corporate boards, according to a recent CEO Agenda Survey by Gartner. Adding a cybersecurity expert directly to the board is just one of the eight security and risk trends for 2021, many of which are driven by recent events such as security breaches and the COVID-19 pandemic.

By Peter Firstbrook, VP Analyst, Gartner

In the past year, the typical enterprise has been turned inside out. As the new normal takes shape, all organizations will need an always-connected defensive posture and clarity on what business risks remote users elevate to remain secure.

This year’s security and risk trends highlight ongoing strategic shifts in the security ecosystem that aren’t yet widely recognized but are expected to have a broad industry impact and significant potential for disruption.

Trend No. 1: Cybersecurity mesh

The cybersecurity mesh is a modern conceptual approach to a security architecture that enables the distributed enterprise to deploy and extend security where it’s most needed.

When COVID-19 accelerated digital business, it also accelerated the trend wherein many digital assets — and individuals — are increasingly located outside of the traditional enterprise infrastructure. Additionally, cybersecurity teams are being asked to secure countless forms of digital transformation and other new technologies. This requires security options that are flexible, agile, scalable, and composable — those that will enable the organization to move into the future, but in a secure manner.

Trend No. 2: Cyber-savvy boards

With an increase in very public security breaches and increasingly complex security setups, boards are paying more attention to cybersecurity. They recognize it as a huge risk to the enterprise and are forming dedicated committees that focus on discussing cybersecurity matters, often led by a board member with security experience (such as a former CISO) or a third-party consultant.

This means that the organization’s CISO can expect increased scrutiny and expectations, alongside an increase in support and resources. CISOs will need to improve their communication and should expect tougher questions from the board as a result.

Trend No. 3: Vendor consolidation

The reality of security today is that security leaders have too many tools. Gartner found, in the 2020 CISO Effectiveness Survey, that 78% of CISOs have 16 or more tools in their cybersecurity vendor portfolio; 12% have 46 or more. Too many security vendors result in complex security operations and increased security headcount.

Most organizations recognize vendor consolidation as an avenue for reduced costs and better security, with 80% of organizations interested in a vendor consolidation strategy. Large security vendors are responding with better-integrated products. However, consolidation is challenging and often takes years to roll out. Although lower cost is often a driver of this trend, more streamlined operations and reduced risk are often more achievable.

Trend No. 4: Identity-first security

The perfect storm of several events made identity as the new perimeter a trend, including COVID-19’ resulting in remote work and technical and cultural shifts. Identity-first security has been considered the gold standard for a while, but because many organizations remained in more traditional setups, it wasn’t a focus.

Now that the pandemic has pushed organizations to fully (or mostly) remote, this trend has become vital to address. The result of these technical and cultural shifts is that “identity first security” now represents the way all information workers will function, regardless of whether they are remote or office-bound.

Trend No. 5: Managing machine identities as a critical security capability

As digital transformation progresses, organizations are seeing increased numbers of nonhuman entities, which means managing machine identities has become a vital part of the security strategy. Included in machine identities (as opposed to human identities) are workloads (i.e., containers, applications, services) and devices (mobile devices, desktop computers, IoT/OT devices).

As the number of devices increases — and continues to grow — establishing an enterprise-wide strategy for managing machine identities, certificates and secrets will enable the organization to better secure digital transformation.

Trend No. 6: Remote working is now just work

According to the 2021 Gartner CIO Survey, 64% of employees are now able to work from home, and two-fifths actually are working from home. As a result of COVID-19, what was once only available to executives, senior staff and sales are now widely available, with plans to shift some employees to remote permanently post-pandemic. From a security perspective, this requires a total reboot of policies and tools and approved machines to better mitigate the risks.

Trend No. 7: Breach and attack simulation

A new market is emerging to help organizations validate their security posture. Breach and attack simulation (BAS) offers continuous testing and validation of security controls and tests the organization’s posture against external threats, as well as offering specialized assessments and highlighting the risks to high-value assets like confidential data. Plus, BAS includes training to enable security organizations to mature.

These tools will help immediately identify issues when it comes to the efficacy of security controls, configuration issues, and detection capability. The ability to run this kind of assessment repeatedly and across a range of attack techniques enables better security assessments in near real-time.

Trend No. 8: Privacy-enhancing computation techniques

Privacy-enhancing computation (PEC) techniques are emerging that protect data while it’s being used — as opposed to while it’s at rest or in motion — to enable secure data processing, sharing, cross-border transfers, and analytics, even in untrusted environments.

This technology is rapidly transforming from academic research to real projects delivering real value, enabling new forms of computing, and sharing with reduced risk of data breaches.


About the Author

Peter FirstbrookPeter Firstbrook utilizes his 20+ years of experience as an industry analyst to help clients improve their security posture to defend and respond hacking, ransomware, and phishing attacks. As a Research VP with Gartner, Firstbrook is responsible for endpoint protection platform (“EPP”), Endpoint Detection and Remediation (“EDR”), extended detection and response (XDR), and Secure Email gateways (“SEG”). He is the Lead Analyst for Cisco Systems inc. and prepares the annual top Security and risk management trends. He helps companies implement best practices, select strategic technologies, and negotiate the best deal.

Before joining Meta Group in May 1997, Firstbrook worked as a financial analyst, implemented retail and branch office networks, developed software for tax reporting/invoicing programs, and was a database administrator.

Disclaimer

Views expressed in this article are personal. The facts, opinions, and language in the article do not reflect the views of CISO MAG and CISO MAG does not assume any responsibility or liability for the same.