What should we expect in this new year in cybersecurity?
What does 2022 hold in store for corporate cybersecurity? Ping Identity, the provider of intelligent identity solutions for business, shares their predictions for the new year with us.
1. Cybersecurity is becoming a CSR issue: As our lives become more and more digitalized and digital and physical controls collide, investing in security to preserve society will be recognized as the 4th ESG (environment, social and governance) responsibility for companies. Data breaches have more than technological implications, as disruption affects society, making cybersecurity a key social pillar metric.
2. Multi-factor authentication will become a worldwide demand: In today’s war on the global threat landscape, multi-factor authentication (AMF) will become mandatory everywhere to secure connections, not only in the United States, but around the world.
3. Malicious Bot Tsunami: Bots are invading customer contact systems and we will need to leverage AI and machine learning to detect and protect bots that pose as humans when they create or attempt to take over accounts.
4. Emphasis is placed on authorization: Spurred on by Zero Trust, the decade-long focus on authentication began to shift to authorization. Identity isn’t just about making sure you’re talking to the right person, it’s about allowing the right access.
5. The rise of digital wallets: Users will start storing verified data about them, such as their real identity through government-issued IDs in digital wallets such as those provided by Apple and Google, on their phones. But it won’t stop at real identities, and will extend to all kinds of other identity data shared with the user for better privacy and control by the individual.
6. Attacks on the Shadow and zombie APIs: More than 90% of attacks are predicted to be on APIs by 2022. For organizations without well-established API governance, controls and security practices, APIs will become the weak link.
7. Convergence of information technologies and operational technologies: Information technology and physical operational technologies collide, and IT teams take responsibility for the security of operational technologies. This will result in a need for interoperability between information technology and operational technologies at the outset, and ultimately a convergence of redundant technologies to control who can physically enter the building and who can access applications.
8. The rise of the CISO: Corporate boards care about cyber risks, so identity officers will report directly to CISO, and CISO will report to the board. Gartner predicts that 40% of boards will have a dedicated cybersecurity committee by 2025.
9. Identity focuses on experience: The focus will no longer be on the deployment model (e.g. cloud) as a factor for speed, but on code-less, low-code orchestration, which enables both speed and agility of the business. extraordinary experiences for the end user.
About Ping Identity
Ping Identity provides intelligent identity solutions for the enterprise. We enable organizations to achieve identity-defined, zero-trust security and more personalized and streamlined user experiences. The PingOne Cloud Platform enables customers, staff and partners to access cloud, mobile, SaaS and on-premises applications in the hybrid enterprise. More than half of Fortune 100 companies choose us for our identity expertise, open standards, and partnerships with companies like Microsoft and Amazon. We provide flexible identity solutions that accelerate digital business initiatives, delight customers and secure the business with multi-factor authentication, single sign-on, access management, intelligent API security, directory functionality and data governance. For more information, please visit www.pingidentity.com.