Experts Predict Bad Year Ahead for Cyber-crime, Cyber-terrorism

According to information released by Risk Bloggers, security and risk management experts around the world predict information security events will occur in 2007, with sophisticated criminal groups increasingly exploiting technology to keep one step ahead of consumer and corporate defenses, resulting in unprecedented losses.

Some key vulnerabilities cited were large groups of zombie computers organized into Botnets, web server security holes and uncontrolled mobile devices, such as portable storage and smart phones.

"Attack methodologies will become dramatically more sophisticated and dangerous," said Dave Cullinane, Chief Information Security Officer and co-founder of the Alliance for Enterprise Security Risk Management. "The risk of cyber-terrorism will continue to increase as world tensions increase. Lack of preparation and plans to deal with the consequences place countries and businesses at significant risk."

Security expert and best selling author Ira Winkler feels these attacks will often use Botnets. "Botnets will create the largest losses and potentially large scale Internet outages. Botnets enable spam, spim, phishing attacks, distributed denial of service attacks, extortion, etc. The attacks result in billions of dollars of thefts, millions of dollars of extortion, and billions of dollars in productivity loss."

The experts also cited a related threat, the web browser security problem. The Chief Technology Officer of Atlanta-based security company SPI Dynamics, Caleb Sima, stated that web tools that are used by software developers are the key enabler for these hackers. He adds that in 2007, "The security of the web application becomes the #1 concentration of security teams."

Joel Scambray, Chief Strategy Officer of Leviathan Security and noted author, says in addition, corporations are increasingly losing control of their own networks, "...applications and data continue to perforate everything (inbound and out) and mobility proliferates beyond anything we've yet imagined."

Of the experts interviewed, none expect any significant action by the government to address these issues this year and some felt that businesses do not have the basic understanding of how important information security and the Chief Information Security Officer (CISO) are to these threats. According to Scambury, CISO job security is tenuous and to "expect more churn as exec management continues to struggle with how to integrate security as a business imperative rather than a bolt-on."

From a business point of view, the information security industry may break out of its many year drought of initial public offerings (IPOs). A partner with a leading venture capital firm, Greylock Partners, Asheem Chandna says, "It has been many years since we have seen any security companies go public. We will see 3+ security company IPOs on Nasdaq in 2007. The security sector will remain over funded, though we will see a decline of new venture dollars into the security sector in 2007. 2007 will continue to be an active year for security M&A (mergers and acquisitions)."

To view the full feature, "Ready or Not, Here Comes 2007" visit

You may like these other stories...

BKD LLP adds Illinois accounting firm Wolf & Co.Springfield, Missouri-based CPA and advisory firm BKD LLP and Chicago-based accounting firm Wolf & Co. have agreed to merge, the firms announced on Monday. Wolf will...
Ernst & Young fiscal-year revenue rises 6% to $27.4 billionMichael Rapoport of the Wall Street Journal reported late Thursday that Ernst & Young's (EY) global revenue was $27.4 billion in its latest fiscal year,...
TIGTA recommends improvements to selection of problematic paid preparers for further enforcement actionsThe IRS could improve its selection of problematic paid tax return preparers for further enforcement actions, according...

Already a member? log in here.

Upcoming CPE Webinars

Oct 9In this jam-packed presentation Excel expert David Ringstrom, CPA will give you a crash-course in creating spreadsheet-based dashboards.
Oct 15This webinar presents the requirements of AU-C 600, Audits of Group Financial Statements (Including the Work of Component Auditors).
Oct 21Kristen Rampe will share how to speak and write more effectively by understanding your own and your audience’s communication style.
Oct 23Amber Setter will show the value of leadership assessments as tools for individual and organizational leadership development initiatives.