The field of cybersecurity is rapidly changing. Here we spoke with a number of Cybersecurity experts and Industry leaders to find out the most critical cybersecurity trends to watch in 2023. Here are the top cybersecurity predictions for 2023 from the experts:

Cyber resilience will come from people—not technology

I believe that 2023 will be the year when enterprises recognize that they are only as secure and resilient as their people—not their technologies. Only by supporting initiatives that prioritize well-being, learning and development and regular crisis exercising can organizations better prepare for the future.

Bec McKeown, Director of Human Science

In 2023, organizations will focus on driving a positive digital employee experience (DEX) without compromising security. Not only do draconian security controls lead to bad DEX, but they also cause users to find workarounds, which on balance creates an overall less-secure IT estate

Jason.Keogh , Field CTO

The cybersecurity workforce shortage is no secret. In 2025, research says global openings will reach 3.5 million. So far that conversation has been theoretical – if anything, positioned as an opportunity for young professionals seeking a career in cybersecurity, which it is. But unfortunately, 2023 is the year we’ll see this all come to a head. I expect we’ll see a nationally significant attack in the U.S. that can be directly tied to a shortage of cybersecurity talent – either due to a mistake made by an overburdened employee, or an attack that overwhelms an understaffed team

Marcin Kleczynski , CEO

Research has consistently shown that humans are still the most notable risk to cybersecurity, and this largely results from a lack of awareness, negligence, or inappropriate access controls. Training alone will not solve these problems, nor will attempts to turn everyone into a cybersecurity expert.

John McClurg , CISO

Cloud-native and Kubernetes projects become secure by default 

Kubernetes offers many advantages but also poses unique security challenges that can be difficult to address for organizations lacking in Kubernetes talent and experience. However, Kubernetes clusters are not secure by default, and as threats become more advanced and mature it will be unrealistic to require developer teams to also be security experts. Deploying Kubernetes platforms with security built in by default will be recognized as a means to reduce the burden of security on IT teams. Keeping security and developer expertise separate will reduce the pressure and burnout on both sides.

Deepak Goel , CTO

As Istio becomes an integral part of organisations’ cloud-native stack of technologies (along with Kubernetes, all things open source), it will also become a key part of bolstering security within companies. We will see more government agencies and commercial organisations adopt Istio to strengthen zero-trust mandates within technology infrastructure.

Idit Levine , Founder and CEO

Cyber risk management will be a top priority for business leaders

As a result of this, in 2023, we will see companies double down on cyber risk management. Cyber risk governance is not just the domain of the CISO it is now clearly a Director and Officer level concern. When it comes to cyber, plausible deniability is dead.

Karen Worstell , Senior Cybersecurity Strategist

Budget cuts, amid economic uncertainty, will leave companies vulnerable to cyberattacks

Once rumblings of economic uncertainty begin, wary CFOs will begin searching for areas of superfluous spending to cut in order to keep their company ahead of the game.

Jadee Hanson, CIO and CISO

The cybersecurity industry is historically resilient in tough economic times. On the cusp of a recession, this time won’t be any different. Recession or not, businesses are facing unprecedented volume and sophistication of threats, and the potential losses from cybersecurity threats aren’t going to go down, either; cybercrime cost the UK £27B in 2022, and that figure is likely to increase. Amid that backdrop, CIOs in the UK predict that the top area of increased investment (66%) will be cyber and information security during 2023.

Marcin Kleczynski , CEO

Cybercriminals will increase ransomware attacks on SMBs as prime targets in the wake of heightened geopolitical tensions, such as the War in Ukraine, and rising inflation in the UK and globally.

Tyler Moffitt , Security Analyst

Cyber insurance will become a core part of understanding cyber risk and building resiliency

I expect the volume of virtual-first business operations to increase in the year ahead. In turn, cyber insurers will need a deeper and more dynamic understanding of organizations’ cybersecurity risks and IT systems in order to reduce cyber risk and build resilience. By partnering with third-party cybersecurity solutions providers, insurers will gain greater risk insights and leverage these to set new expectations for potential policyholders and help raise their cyber posture. 

Vincent Weafer , Chief Technology Officer

I expect to see more investment into quantifying cyber risk. This will drive better collaboration and data sharing between security companies. Cyber insurance carriers will lean into partnerships with technology companies to fuse security data with insurance and risk modeling insights. The net result is more accurate risk quantification, which will in turn help keep policyholders safer.

Jason Rebholz , CISO

Healthcare will continue to be top targets for cybercriminals in 2023

With telemedicine becoming the norm, ransomware and deepfake attacks on the healthcare industry will continue in 2023. As increased amounts of people turn to telehealth to connect with healthcare professionals, have prescriptions filled and file their healthcare records, the door for fraud is left wide open for attackers to strike.

Rick McElroy , Principal Cybersecurity Strategis

Software security still has significant holes

Today, software security still has significant holes, and a missed patch or single misconfiguration can open the door for a breach or hack.

Idit Levine , Founder and CEO

This will also be forced as more organisations implement Zero Trust. 

Over the past year, organisations have been looking into secure architecture and trying to understand what it truly means. Essentially, Zero Trust is attribution access, but an idea which is now mature. As we move into 2023, senior decision-makers and security teams are discussing how they can achieve a granular-approach in real-time, and ultimately, they will come back to the issue of identity data management.  

Wade Ellery , Solutions Architects and Senior Evangelist

Zero Trust security measures will only become more important. Zero Trust assumes that there is no longer a traditional network edge, and takes a more stringent, continuous, and dynamic approach to user authentication, but also does this seamlessly to avoid impacting the user experience. 

John McClurg , CISO

As more and more organizations abandon their internally hosted data centers and migrate to the cloud, they will increasingly rely on zero-trust models to improve security and prevent lateral movement.

Christopher Prewitt, CTO

Government and industry will take steps to eradicate ransomware

With ransomware more pervasive than ever, industry and government will be forced to address the issue at its core. Ultimately, paying ransomware simply funds the activity, so the only way to eradicate ransomware is to stop the payment of it entirely. It is unlikely that any new legislation will be introduced in the next year, but we will certainly see discussions start to materialise about what this may look like and possibly the first iteration of this developed.

Adam Brady , Director, Systems Engineering, EMEA

Below are the detail comments from the cybersecurity leaders, cybersecurity experts, industry leaders and industry experts on what will likely dominate the cybersecurity landscape in 2023 and beyond.

Subscribe
Notify of
guest
41 Expert Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Matias Madou
Matias Madou , Co-founder and CTO
InfoSec Expert
December 7, 2022 2:14 pm

In what ways do you see the developer becoming more security conscious in 2023?
 
Simply put, they won’t. Developers will not become more security conscious if there is no incentive in place. It is up to companies to have a long-term strategy, and not a short-term one. Companies implementing a long-term strategy should understand that good quality, secure code will need less rework and is a good long-term investment.
 
Once they understand this, they can provide developers with incentives to become security-conscious. Making secure code creation part of their annual review or their bonus are excellent ways to incentivize developers to operate at a higher standard, as well as minimize rework in the future.
 
What specific training/certifications should all developers have under their belt, and how will the perception of development teams and their qualifications shift within the next year?
 
Today, developers only have the option to upskill themselves in the language and framework they use on a day-to-day basis to write secure code, but there is no industry-accepted certificate that carries enough weight to become the industry standard.
 
Companies can install their own belting or certification program, but it would be better to have an industry-accepted certification program. If we compare ourselves to other examples of critical infrastructure, the creation of software and the people creating the software is one of the least regulated industries, despite it being central to the safe operation of many verticals these days.
 
How will companies be looking to attract and retain developer talent in 2023?
 
According to the US Bureau of Labor Statistics, the turnover rate of software developers is first of all increasing. For some large organizations including Adobe, Oracle, and Cisco, the average tenure is well over five years. However, the average software engineer’s tenure at some high-tech giants is under two years. The great resignation did of course help to bring this number down as well.
 
All in all, we clearly have to do something to retain talent, and while working from home can be a perk, it also creates less of a sense of belonging to the company, which makes it far more straightforward for developers to resign if they are enjoying the job less on a day-to-day basis.
 
Offering viable career pathways is crucial, giving the development cohort an opportunity to become better at what they do. Access to an upskilling platform, or letting them participate in a remote competition and feel more connected with their peers and the company can be fun and mutually beneficial as well, and it will give them a well-deserved break from the day-to-day stress they can experience.

Last edited 7 hours ago by Matias Madou
Kateh
Kateh , Chief Executive Officer, Chairman, and Co-Founder
InfoSec Expert
December 6, 2022 6:15 pm

What types of applications do you anticipate being more vulnerable to cyber incidents in 2023 due to poor or insecure code?
 
2022 saw significant threat activity against targets in the healthcare industry, resulting in that vertical experiencing the highest increase in volume of cyberattacks across all sectors, at 69% year over year. Sadly, I think that will continue, largely due to the complex, legacy systems so often in place.
 
With healthcare institutions requiring fast-paced digital transformation and maintenance like any other industry, it is all too easy for access control errors, misconfigurations, and other known exploits to go unpatched. A threat actor needs just one window of opportunity to inflict serious damage, and for organizations who are not putting their best defensive security strategy forward – which includes frequent and precision training of the development cohort – it’s hard to see this changing.
 
In addition, we cannot ignore the fact that, globally, there is an ongoing conflict between several world superpowers, and modern warfare has an increasingly digital front. Nation-State attacks will become more prevalent to cause chaos and interference, and are likely to target enterprises in telco, health, finance, and utilities to disrupt key economic pillars and manipulate public opinion.
 
What will organisations’ procurement and security teams request from technology providers in the year ahead re: proof of secure code/software security before purchasing/implementing that technology?
 
I would hope that we have all learned something from the onslaught of supply chain attacks in the past couple of years. As a result, a comprehensive and current Software Bill of Materials (SBOM) will likely become a standard ask from vendors, in addition to trust and safety audits.
 
Every organization must keep front of mind the reality that a vendor may not care about security as much as they do, and due diligence is essential. The best vendors will ensure that a lot of this information is publicly accessible, as it really should be a point of pride.
 
From a policy perspective, what do you think will be enforced next year as it relates to safer security practices for organisations?
 
I believe we will be hearing more about security skills verification in development teams, as has been recommended several times by the US government.
 
However, it is one thing to enforce it, and quite another to implement a viable program that will both teach and verify code-level security and awareness skills that will make a difference. This is where the industry as a whole needs to devote the most effort.

Last edited 1 day ago by kateh
Paul Martini
Paul Martini , CEO
InfoSec Expert
December 6, 2022 6:13 pm

Criminal Sophistication

2022 saw the growing sophistication of threat actors as nation state attacks proliferated and costs of cyberattacks rose. However, massive companies and critical industries were still susceptible to simple attacks, including the phishing attack on Dropbox and DDoS attacks on U.S. travel websites this fall. 2023 will be defined by the difficulty of improving cybersecurity posture to face existing challenges while struggling to adapt to new increasingly sophisticated attacks from threat actors. 

Geopolitics 

Nation-state backed cyber attacks on U.S. and EU nations continued to grow following the invasion of Ukraine, ongoing protests in Iran and tensions over Taiwan. Russian sponsored attacks on nation states saw an increase as the conflict grew and Ukraine began turning the ground conflict in their favor. While a full scale cyberwar did not materialize as some experts feared, as the conflict approaches a harsh Russian winter, Russia will likely look to increase cyberattacks as ground fighting becomes more difficult. The recent mistaken attack on Poland showed that conversations around invoking NATO’s Article 4 are on the table and a potentially damaging cyberattack could push that conversation further. As tensions mount in mainland China over the country’s zero covid policy we will likely see ongoing cyberattacks against the West similar to increased Iranian cyberattacks following protests there. Geopolitical tensions are growing across an increasingly multi-polar world and this will manifest in further cyber conflict. 

Ransomware

Ransomware grew as a major concern for organizations, we found that 63% of security professionals cited it as a driving force as they make key decisions. Ransomware saw its increase in attacks directly alongside the conflict in Ukraine, as Russian-backed REvil stepped up attacks. These will only grow in scale and sophistication as long as the conflict in Ukraine continues on. Ransomware attacks carry even greater consequences and costs, including instances of penalties when data is leaked. Organizations will seek out new ways to improve their cybersecurity posture to prevent and mitigate ransomware attacks as they become more costly. 

Last edited 1 day ago by Paul Martini
W.Curtis.Preston
W.Curtis.Preston , Chief Technology Evangelist
InfoSec Expert
December 5, 2022 5:17 pm

IT leaders will rush to secure backup systems in light of rising cyber threats.

As we look forward into 2023, the number one concern of anyone responsible for data protection will be to secure their backup system. Ransomware groups will continue to directly target backup systems, using their knowledge of how the backup system works against it. Organizations must learn how to protect against such attacks. On premises systems should use local passwords on the backup server, use Multi-factor authentication (MFA) wherever possible, not store backups in user-accessible directories, consider using a non-Windows backup server to store backups, and copy some of the backups to immutable cloud storage. Customers of SaaS-based systems have fewer worries, but they should still enquire about what would happen if someone gained access to the username and password for the backup system and successfully worked around MFA. Such hackers can delete backups, with no backup for the backup. –

Last edited 2 days ago by W.Curtis.Preston
Adrian Moir
Adrian Moir , Senior Consultant of Product Management
InfoSec Expert
December 5, 2022 4:47 pm

Businesses that deploy chaos engineering for data security will gain an edge

Over the next year, businesses will refine their testing process for data security, increasingly deploying chaos engineering to shore up enterprise resilience. Originally built for developer testing, chaos engineering has the power to help IT teams test not just recovery operations, but the applications and pipelines data moves through. By testing each part of the business’s data protection apparatus regularly, teams will be able to confirm that recovery techniques, from immutable data stores to replicability, work effectively. Expect businesses to make this part of their regular data protection operations as the C-Suite makes resilience and risk reduction a higher priority in light of ransomware, natural disasters and other business disruptors.

Last edited 2 days ago by Adrian Moir
41
0
Would love your thoughts, please comment.x
()
x