MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Gartner lists top security and risk management trends 2021 devolutions blog

Gartner Lists Top Security and Risk Management Trends in 2021

Gartner has revealed its list of the top security and risk management trends that will shape the business landscape in 2021. There are eight trends in total, which have been grouped into three categor...

Photo of Laurence Cadieux Laurence Cadieux

Gartner has revealed its list of the top security and risk management trends that will shape the business landscape in 2021. There are eight trends in total, which have been grouped into three categories:

Below are the eight trends as they are listed in the Gartner report, and not necessarily in order of priority. For each trend, we also include Gartner’s recommendations for IT leaders who are responsible for security and risk management.

1. Cybersecurity Mesh

COVID-19 has accelerated the relocation of end users and digital assets outside of the organization, which is driving a modern InfoSec approach — called the cybersecurity mesh — in which controls are implemented where they are most required, and in a way that is flexible, scalable, resilient and composable (i.e., components can be selected and assembled in multiple combinations to satisfy specific organizational requirements).

Typically, the cybersecurity mesh architecture is deployed in the cloud (although on-premises deployments are possible). Leveraging the public cloud supports various enforcement points, which can be associated with multiple distributed assets. This model also enables SaaS providers to provide customers with reliable, high-performance services.

Gartner advises IT leaders who are responsible for security and risk management to focus on the following cybersecurity mesh strategies:

2. Identity-First Security

Identity access management (IAM) certainly is not new. However, COVID-19 has thrust this approach into the spotlight and elevated it from an optional best practice to an essential day-to-day requirement. Indeed, organizations no longer operate in a paradigm in which location determines the degree (or lack thereof) of security controls. Instead, all resources, applications, tools and network areas need to be perceived as potentially vulnerable and at-risk.

Gartner advises IT leaders who are responsible for security and risk management to focus on the following identity-first strategies:

3. Security Support for Remote Work Is Here to Stay

Remote working in one form or another has been in place for decades, and well before the pandemic, an increasing number of employees and contractors were contributing from a distance. However, COVID-19 dramatically accelerated the remote working migration. And while in some parts of the world workplaces are slowly welcoming back workers, a significant number will not be leaving their home office — at least not on a full-time basis.

As a result, organizations need to reinvent their pre-pandemic policies and tools, so that they make sense in a post-pandemic remote work environment. This approach includes developing multiple robust use cases that: define various end users (roles and functions); identify what kinds of devices end users have (and who owns them); determine what apps, data and network areas end users need access to; and identify where end users are located.

Gartner advises IT leaders who are responsible for security and risk management to focus on the following strategies to support remote workers (including hybrid remote/on-site workers):

4. Cyber-Savvy Board of Directors

As organizations pay more attention to cybersecurity — especially in light of high-profile breaches such as the Solorigate attack — they are realizing that their leadership roster lacks the personnel required to evaluate the quality of cyber-risk information, and establish a strong and reliable security posture. To fill this insight gap, they are adding cybersecurity specialists to the Board of Directors, and in some cases, creating executive-level cybersecurity committees.

Gartner advises IT leaders who are responsible for security and risk management to focus on the following strategies to support a cyber-savvy Board of Directors:

5. Security Vendor Consolidation

While diversity in an organization is an advantage, using a large number of security products can increase complexity and cost. It can also lead to overlap, as organizations fail to optimize the functionality and potential of existing tools, and instead add new solutions to the stack. Security vendor consolidation can simplify operations, while at the same time help achieve regulatory and compliance requirements.

With this in mind, Gartner also points out that security vendor consolidation also carries inherent risks. These can include forced legacy products after acquisitions, limited threat intelligence, lack of product integration, vendor lock-in, and overlapping software terms and conditions. Furthermore, some “best-of-breed” security vendors may not achieve this level of excellence across their entire product line.

Gartner advises IT leaders who are responsible for security and risk management to focus on the following strategies to support security vendor consolidation:

6. Privacy-Enhancing Computation (PEC)

Functions like multi-party data sharing, data processing, and analytics in untrusted environments are becoming more complex and riskier in light of expanding privacy regulations and legislation — both on a regional (country) and global scale. Adding to the challenge is the fact that, historically, attempts to establish in-use data protection (as opposed to data protection at rest or in motion) has been notoriously difficult.

Privacy-enhancing computing (PEC) is an approach that leverages emerging technologies to safeguard data in-use in both trusted and untrusted environments. Gartner highlights three levels upon which PEC can be applied: data level (includes transformations on-the-fly controls like differential privacy and transformations to hide individual data values); software (combine specialized software with data transformations); and hardware (establishing secure hardware systems and trusted execution environments).

Gartner advises IT leaders who are responsible for security and risk management to focus on the following strategies to support PEC:

7. Breach and Attack Simulation

Today’s cyberattacks are potentially much more costly and devastating than in the past. Whereas hackers used to focus on destroying machines and wreaking havoc, today they are motivated to steal data and commit identity theft. In order to thwart hackers from invading endpoints and networks, organizations need to put their defensive systems to the test — and that is where breach and attack simulation (BAS) tools enter the picture.

BAS tools continuously evaluate an organization’s defensive posture, which includes both the readiness of its security products and its workforce. While BAS is important, it should be used alongside other threat assessment approaches including penetration testing, bug bounties, and vulnerability scanning/prioritization.

Gartner advises IT leaders who are responsible for security and risk management to focus on the following strategies to support BAS:

8. Managing Machine Identities

Driven by artificial intelligence and machine learning, nonhuman entities such as devices, apps, gateways, cloud services, virtual machines, RPA/bots, and other SaaS and IaaS workloads are at the leading edge of digital transformation. Managing machine identities focuses on establishing trust — and therefore security — across these digital identities. This approach can include the use of keys, X.509 certificates, secrets, and other cryptographic materials.

Gartner advises IT leaders who are responsible for security and risk management to focus on the following strategies to support managing machine identities:

Looking Ahead

After a year like 2020, it is understandable that the only thing we should definitely predict and expect in 2021 is uncertainty. However, amidst the chaos and change, these eight trends from Gartner will shape the narrative in security and risk management. Organizations that adopt and optimize these projects and strategies will find themselves in a much safer and more successful position in the years ahead.

For additional insights, we highly recommend downloading the full Gartner report which can be found here. It is a free download, and a work email address is required.

More from Security

Read more articles