Serial cybersecurity entrepreneur Shlomo Kramer said in a 2005 interview that cybersecurity is “a bit like Alice in Wonderland” where you run as fast as you can only to stay in place. In 2020, to paraphrase the second part of the Red Queen’s observation (actually from Through the Looking Glass), if you wish to stay ahead of cyber criminals, you must run twice—or ten times—as fast as that.

The 141 predictions listed here reveal the state-of-mind of key participants in the cybersecurity defense industry and highlight all that’s hot today. The future is murky, but we know for sure that on January 1, 2020, the California Consumer Privacy Act (CCPA) will go into effect; that the U.S. presidential election will take place on November 3, 2020; and that on October 1, 2020, if you “wish to fly on commercial aircrafts or access federal facilities” in the U.S., you must have a REAL ID compliant card.

Other than these known events, the crystal balls of the participants in this survey warn us about the impact of emerging technologies such as AI, 5G, and quantum computing and evolving technologies such as the internet of things (IoT), things that move (autonomous vehicles and mobile phones), and the cloud; the role cybersecurity will play in the presidential election; the emerging global cyber war; the increasingly targeted and profitable ransomware attacks; the sorry state of personal data privacy; the significant issue of the best way to deal with identity and authentication; the new targets and types of cyber attacks; how to fix cyber defense; the important role people play in cybersecurity and the what do about the cybersecurity skills shortage; and the good, the bad, and the ugly of the business of cybersecurity.

To win a war, you better join forces with like-minded allies, something that unfortunately may not be considered at all by the entities under attack, but has proven to be a successful strategy for cyber criminals. “It takes a network to defeat a network” says Rina Shainski, Co-Founder and Chairwoman of Duality Technologies.

See full article