KEMBAR78
2017 Cybersecurity Predictions | PDF
New Norms Expected in
Threat Landscape
Threat Landscape
Recruiters Search for Cyber
Talent Outside of Security
Talent Hiring
Successful Ransomware
Attack Causes Critical
Infrastructure Downtime
ICS
Awareness of Flaws in IoT
Security Will Be Magnified
Endpoint Security
Financial Sector Attackers
Exploit Cracks in Blockchain
Technology
Financial Services
Machine Learning and
AI-Driven Frameworks
Shape Cloud Security
Cloud
Service Providers Confront
IoT Security
Service Provider
The Year We Get Serious
About IoT Security
Network Security
Price of Ransomware Continues
to Increase in Asia-Pacific
APAC
Ransomware and SaaS
Challenges Persist in Healthcare
Healthcare
Confronts SMB Cyber Resiliency,
Anticipating Tokyo 2020
Japan
Preparation, Proliferation,
Personnel and Protection
= a Bumper Year in EMEA
EMEA
2017
CYBERSECURITY
PREDICTIONS
Learn more: http://go.paloaltonetworks.com/predictions2017
¥
$
Automation and Playbook
Models Take On Key Roles in
Threat Intelligence Sharing
Threat Intelligence
Sharing

2017 Cybersecurity Predictions

  • 1.
    New Norms Expectedin Threat Landscape Threat Landscape Recruiters Search for Cyber Talent Outside of Security Talent Hiring Successful Ransomware Attack Causes Critical Infrastructure Downtime ICS Awareness of Flaws in IoT Security Will Be Magnified Endpoint Security Financial Sector Attackers Exploit Cracks in Blockchain Technology Financial Services Machine Learning and AI-Driven Frameworks Shape Cloud Security Cloud Service Providers Confront IoT Security Service Provider The Year We Get Serious About IoT Security Network Security Price of Ransomware Continues to Increase in Asia-Pacific APAC Ransomware and SaaS Challenges Persist in Healthcare Healthcare Confronts SMB Cyber Resiliency, Anticipating Tokyo 2020 Japan Preparation, Proliferation, Personnel and Protection = a Bumper Year in EMEA EMEA 2017 CYBERSECURITY PREDICTIONS Learn more: http://go.paloaltonetworks.com/predictions2017 ¥ $ Automation and Playbook Models Take On Key Roles in Threat Intelligence Sharing Threat Intelligence Sharing