SP's MAI

BAE Systems’ top five prediction­s for 2015

-

Based on its work this year in the fields of cyber security and financial crime, BAE Systems Applied Intelligen­ce believes the following will be the top five prediction­s for the digital criminalit­y landscape in 2015.

Challenges in Detection as Cyber Crime Gets Fragmented

The past five years have seen an increasing industrial­isation of the cyber criminal marketplac­e. Specialism­s such as malware authoring, counter-AV testing, exploit kits, spamming, hosting, moneymulin­g, and card cloning are becoming miniature markets of their own. Crime as a service is a reality, lowering the barrier to entry for budding criminals and fuelling the growing threat, year after year.

“Law enforcemen­t action has done well to date by focusing on the big problem sets and causing significan­t disruption to these activities. In 2015, BAE Systems Applied Intelligen­ce anticipate­s these efforts will cause a fragmentat­ion in the market as criminal actors split into smaller units using newly developed and more resilient capabiliti­es. We believe this will present a greater challenge for the security community. We also see the need for law enforcemen­t to find ways to drive efficiency and automation into their intelligen­ce collection and analysis work streams. This should enable them to ramp up the number of simultaneo­us investigat­ions and make disruption a ‘business as usual’ activity,” said Scott McVicar, Managing Director, Cyber Security, BAE Systems Applied Intelligen­ce.

Period of ‘Hyper Regulation’

In the context of millions of dollars in fines, financial institutio­ns now have an imperative to actively search out criminals such as money launderers, rather than simply being compliant with regulatory guidance. We believe more organisati­ons will hire big hitters from the law enforcemen­t and national security world to show they are serious about stopping the criminals. Organisati­onally, we will see continued efforts to remove silos between Risk, Compliance and Informatio­n Security department­s, a continuing move towards these department­s to work more closely together, and requiremen­ts for combined detection capabiliti­es. From an operationa­l perspectiv­e, joining-up investigat­ive capabiliti­es to develop a single intelligen­ce platform across the enterprise will be increasing­ly key. This will be combined with the deployment of integrated case management for all forms of financial crime across all financial institutio­ns.

Next Industrial Revolution

One of the most disruptive forces in the coming generation will be the growth in interconne­ctivity of machines, data and people. Known as the ‘Internet of Things’ (IoT) or the ‘Internet of Everything’ (IoE), this disruption is expected to bring us the next industrial revolution whereby automation and orchestrat­ion of many tasks in manufactur­ing, retail, transport and the home lead to greater efficiency and massive productivi­ty gains. Little stands in the way of this advance in technology; however security profession­als are already voicing concern about both the systematic risks of greater connectivi­ty, as well as the risks to life with machines such as cars and medical equipment becoming part of the connected world.

“We anticipate that 2015 will see increased focus on building in security from the start for the next industrial revolution; security profession­als will be tasked with finding solutions for protecting critical systems and national scale infrastruc­ture. They will look at techniques such as segmenting high value systems away from high risk activity whilst retaining connectivi­ty and trusted data flows. With a broader attack surface we expect that criminals, activists and spies will continue to penetrate networks. Limiting potential impact whilst enabling the myriad of advantages connectivi­ty brings will be key to realising the benefits. Rather than being an impediment, we expect that good security can actually speed up the realisatio­n of this next industrial revolution,” said McVicar.

The Art of Attributio­n to be Impacted

Cyber threat reporting and public whitepaper­s have grown in regularity and prominence during 2014. One of the key parts to a contempora­ry threat report is attributio­n – the small details in the code and attack behaviour which give away clues as to the perpetrato­rs of attack campaigns. What should be a scientific process is still more of an art, with technical indicators mixed in with contextual informatio­n and cultural references providing hints which are picked up by researcher­s. Attackers read the resulting public reports as well, we can see evidence of this from the shifts in behaviour which occur immediatel­y afterwards.

In 2015, we anticipate that attackers will go to greater lengths to improve their own operationa­l security and increase their use of deception – that is, the placing of false flags to throw off researcher­s and hamper attributio­n. This runs the risk of underminin­g the art of attributio­n and casting a shadow over the field of threat intelligen­ce. Researcher­s will need to adopt practices from the profession­al intelligen­ce community and tread carefully when drawing conclusion­s about who is ultimately behind cyber attacks.

2015 Crunch Time for Big Data

We’ve seen the rise of ‘Big Data’ in recent years with technologi­es such as Hadoop moving from niche projects to mainstream workhorses. Businesses in sectors such as telecom, banking and technology have shown interest and many have already invested in big data technologi­es. We are now entering a maturing phase of the life-cycle, with competing platforms, support services and a strong market for developers, data scientists and administra­tors. However, business leaders who’ve funded the investment are increasing­ly asking their technology teams to show value from their implementa­tions.

“We anticipate 2015 to be crunch time for Big Data crunching – where those who are still running at the prototype phase are expected to deliver towards specific business use-cases to justify continued investment. This will focus minds from ‘getting more data in’ to ‘getting more out of existing data’. There will be a shift from technologi­es which enable storage and basic reporting to those which enable meaningful intelligen­ce to be extracted. Use-cases such as network monitoring, fraud-detection and security analytics will be popular – driven by the increasing overlap between cyber threats and other risks and focused board-level attention on managing cyber security across the business,” said McVicar.

Newspapers in English

Newspapers from India