Industry News


18 Dec 2017

Cybersecurity in 2018: what we can expect to face

Sam Clark

Brian Chappell, senior director, enterprise and solution architecture, BeyondTrust


There will be an increase in mobile phone spam. With there being more mobile phones than citizens in most countries, mobile phone spam will rise 10,000% due to automated spam and dialling ‘botnets’ that essentially render most phones unusable because they receive so many phone calls from unidentified numbers.

This rise in phone spam will push cellular carriers to start to require that end users adopt an “opt in” policy so only those in their contacts can call them.

We can also expect to see an increase in ‘gaming eleteware’ infections. ‘Gaming deleteware infections across most major platforms will increase as botnets continuously attack gaming networks and devices such as Steam, Xbox, PlayStation, and Nintendo systems, with the sole intention of rendering the machine inoperable. The malware is downloaded as an embedded game add-on, causing millions of devices to need to be replaced.

Finally, as we see a rise in the adoption of the ‘latest and greatest’ device, we will see devices, including IoT devices, be cyber recycled. These devices, including mobile phones, won’t be destroyed, however. They will be wiped, refurbished, and resold within the U.S. and overseas even though they are have reached the end of their life. Look for geographic attacks against these devices to rise since they are out of maintenance.

Sarah Lahav, CEO, SysAid Technologies


IoT devices are starting to appear in our workplaces, and that trend is set to accelerate. This is something that should make all of us pause for thought because it’s going to have an impact on how we manage security.

If you belong to an organization that thinks of itself as security conscious, you have no doubt already devoted resources to managing network security, patches, version control and everything else needed to ensure your computers are safe and secure. You are much less likely to have given a lot of thought to your IoT devices.

Ensuring that these are safe is certainly going to make security management quite a lot harder; but if you ignore them, you might suddenly find your data centre under attack from the lightbulbs and toasters in the canteen!

The number of security breaches reported in the press has been escalating for many years and the scale of such breaches has been growing too. Many of these breaches have resulted in huge costs for the companies involved and the resignation of the board members responsible. There is no end in sight.

Carson Sweet, co-founder and CTO, CloudPassage 


Every business wants to be more competitive, and the growing acceptance of shadow IT helps. Enterprise reliance on shadow IT will explode in 2018, and so will cyber attacks on these resources. Organizations will need to develop comprehensive policies and strategies for their shadow IT, or the consequences will be stark.

Cyber is the new battleground for cross-state conflict. There are a few reasons that this situation has evolved to the point that attacks on U.S. infrastructure will happen in the near future. These include growing dependence on technology, growing challenges in protecting technology, and the attractiveness of cyber warfare.

These issues have existed for years, but they’re independently hitting critical mass while at the same time converging into a “perfect storm” situation.

Jeff Costlow, director of security at ExtraHop


Big tech companies have been preparing for Perfect Forward Secrecy for several years now, and now the rest of the world will be catching up. Apple Store requires TLS 1.3 (requiring PFS) for all apps. Twitter, Signal, WhatsApp have used it for years, as have privacy activists such as Amnesty International and the Electric Frontier Foundation.

Within a couple of years, people will have started to change their keys as PFS picks up pace. To be sure, staying with TLS 1.2 will leave you open to Drown, Sloth, Poodle attacks and a variety of other ‘man in the middle’ attacks.

Derek Brost, director of engineering, Bluelock


Expect targeted ransoms to get more precise and expensive. Cyber attackers are increasingly recognizing that the value of attorney-client and financial data may exceed its conventional ransom evaluation. Most notably in this category is the Panama Papers breach, which has continued to have significant client implications.

Furthermore, sophisticated financial data theft from breaches such as Equifax, DocuSign, and the U.S. Securities and Exchange Commission demonstrate adversaries’ knowledge of data value and an ability to leverage it to their advantage. In addition to simple ransomware attack vectors, covert data theft and high-target ransoming will continue to become more common.

David Emm, principal security researcher, Kaspersky Labs


Connected vehicles are likely to face new threats as a result of growing supply chain complexity leading to a scenario where no one player has visibility of, let alone control over, all of a vehicle’s source code. This could make it easier for attackers to break in and bypass detection.

In healthcare, attacks breaching private networks to target medical equipment and data with the aim of extortion, malicious disruption or worse, could rise as the volume of specialist medical equipment connected to computer networks grows.

In financial services, the increased security of online payments means that fraudsters will turn their attention to account takeover attacks. Industry estimates suggest fraud of this type will run into billions of dollars.

Industrial security systems are likely to be at increased risk of targeted ransomware attacks. Operational technology systems are more vulnerable than corporate IT networks.

I also expect to see targeted attacks on companies for the purpose of installing cryptocurrency miners – and in time this could become a more lucrative, long-term business proposition than ransomware.

View all Industry News

Latest News

2019 Sponsors

Diamond Sponsor

  • Huawei Technologies

Theatre Sponsors

  • Netpoleon
  • McAfee
  • Senetas

VIP Lounge Sponsor

  • Cyfirma

Platinum Sponsors

  • Cloudfare
  • McAfee

Platinum Sponsors

  • Pacific Tech
  • Sophos

Gold Sponsors

  • Aversafe
  • Barracuda
  • BlackBerry Cylance
  • Cato Networks
  • CISCO Meraki

Gold Sponsors

  • Forcepoint
  • Forescout
  • Fortinet
  • IBM

Gold Sponsors

  • Retarus
  • Silver Peak
  • Singtel
  • Telstra
  • Zscaler

Silver Sponsors

  • Halodata
  • Tindo Group
  • Hillstone Networks
  • A10 Networks
  • 689 Cloud
  • Checkpoint
  • Nozomi Networks

Silver Sponsors

  • Alsid
  • Aqua
  • Aversafe
  • ICE71
  • Illumio
  • CyberArk

Silver Sponsors

  • Darktrace
  • Radware
  • Endpoint
  • NSFocus
  • Techfindr
  • Qulays
  • Centrify

Silver Sponsors

  • Git Lab
  • Jetico
  • Senetas
  • Sonic Wall
  • Terrabit Networks
  • BluePIsh
  • Keyless

Silver Sponsors

  • IntSights Cyber Intelligence
  • Kanguru
  • Thales
  • Tufin
  • Uniscon GmbH
  • Senhasegura
  • OneKIY

Silver Sponsors

  • WatchGuard
  • Groundlabs
  • Jiransoft
  • Horanji
  • ViewQuest
  • Zimperium
  • Seconize

Bronze Sponsors

  • ALC
  • AnqLave
  • Utimaco
  • Axway
  • Digital Shadows
  • KeyOptions
  • Zetaris Pty Ltd

Bronze Sponsors

  • AlgoSec
  • Cyberint
  • PT Sydeco
  • AppviewX
  • Netskope
  • Business Intelligence Technologies

Bronze Sponsors

  • HackEDU
  • HaltDos
  • Cyber Intelligence House
  • Tenable
  • Noviflow
  • M2M Connectivity

Bronze Sponsors

  • Hyperg Smart Technology
  • Iconz
  • Proficio
  • SecneurX
  • NSecured
  • Nexright

Bronze Sponsors

  • Icyberwise
  • Privasec
  • Ubiq Security
  • UCWare
  • PI Exchange
  • Bitglass
  • Exclusive Networks

Bronze Sponsors

  • ITEL Learnings Systems (S) Pte Ltd
  • NTUC LearningHub
  • TransWARE
  • Plott
  • Wilson A.I Pty Ltd
  • Wiredhands
  • Audacix

2019 Partners

Knowledge Partner


News Distribution Partner

  • ACN Newswire

Associate Content Partner

  • Uptime Institute

Strategic SEO Partner

  • AdVantage

Strategic Event Partner

  • ISC2

Event Partners

  • AiSP
  • ARC Advisory
  • Asia Cloud Computing Association (ACCA)
  • Asosiasi Cloud Computing Indonesia
  • Fintech Association of Hong Kong
  • Accelerating Asia

Event Partners

  • Best Practice of eCommerce
  • BigDataX
  • CMO Council
  • La French Tech
  • ASME

Event Partners

  • Practical DevSecOps
  • Digital Advertising Association Thailand (DAAT)
  • DevOps Institute
  • Forrester
  • Singapore Chamber of E-Commerce
  • Plug And Play
  • Co Creation Lab

Event Partners

  • IASA
  • IPI Singapore
  • itSMF
  • IFMA
  • European Data Centre Association
  • GS1

Event Partners

  • KinerjaBisa
  • Logistics & Supply Chain Management Society
  • Michael Page
  • NexChange
  • SG Tech

Event Partners

  • Singapore Cyber Security Consortium (SGCSC)
  • Structure Research
  • General Assembly
  • Open Connectivity Foundation
  • Smart Asia India

Media Partners

  • APSM
  • Asia Blockchain Review
  • Asia Research News

Media Partners

  • Australian Cybersecurity Magazine
  • Australian Security Magazine
  • BizClik Media
  • European Data Centre Association

Media Partners

  • Chief IT
  • CIO Advisor APAC
  • Cross Border Magazine
  • AI Time Journal

Media Partners

  • CryptoNewsZ
  • Cyber Security ASEAN
  • Asia Content News
  • Enterprise Security Magazine

Media Partners

  • Data Storage ASEAN
  • e27
  • Fintech Finance
  • CMO Asia
  • GovTech SEA

Media Partners

  • Jumpstart Media
  • My Security Media
  • Retail CIO Outlook
  • Cybersec Asia
  • Frontier Enterprise – Jicara Media

Media Partners

  • Telecom Era
  • Supply Chain Digital
  • Techwire Asia
  • Gigabit
  • Digicon Asia

Media Partners

  • FutureIoT
  • Marketing Ops
  • Payment & Cards Network
  • Techtarget
  • FutureCIO

Official Partner Hotel

  • MBS

Media Partners

  • Wire 19
  • 计算机网络世界
  • Supply Chain Brain
  • Disruptive Tech Asean
  • FutureCFO


  • As cyber security is the hot topic at the moment, there are many exhibitors with new product showcase and conference speakers sharing their expertise, I find it very informative and insightful. My job scope covers a broad spectrum, having other shows like Big Data and IoT in one room is very convenient. Look forward to coming back next year too!
    Deputy Manager, Land Transport Authority
  • I’m interested in a couple of topics (i.e. Internet of Things, eCommerce and cloud & cyber security), so that’s why I’m here. We’ve just finished a conversation with NETSCOUT and are quite interested in their products – we will keep in touch with them to see how we can further collaborate.
    IT Manager, BSH Home Applications Pte Ltd
  • The event was good and informative. I've attended this event to browse for more products and solutions which we can use in our organisation to improve operations efficiency. I'll definitely be back next year.
    Team Lead, FMIS ICT Strategy, Lead and Innovation, Ministry of Economy and Finance
  • I attend this show with no particular focus but the speaker line up is good, the topics covered are wide as well. The speakers provide insightful content that are relevant to my job – cloud, cyber security, networks and the co-location of different shows help to save time too!
    Regional IT Governance Manager, TP ICAP