2022 security predictions from Ping Identity

Andre Durand, Founder, and CEO of Ping Identity shares security predictions for 2022.

  1. Cybersecurity becomes ESG issue

As our lives become more digital, and digital and physical controls collide, investing in security to keep society safe will become recognised as the 4th responsibility of ESG (environment, social, and governance) for corporations. Data breaches have more than just technological implications, as the disruptions affect society, making cybersecurity a key metric in the social pillar.

  1. MFA to become a global mandate

In the ongoing war against the global threat landscape, multi-factor authentication (MFA) will become mandated everywhere to secure logins, not just in the US, but across the world.

  1. Bad bot tsunami

Bots are over-running customer-facing systems, and we will need to leverage AI and machine learning to both detect and protect against bots impersonating humans when creating or attempting to take over accounts.

  1. Focus shifts to authorisation

Driven by zero trust, a decade of focus on authentication begins to shift towards authorisation. Identity doesn’t stop with ensuring you’re talking to the right person, it’s all about authorising appropriate access.

  1. Rise of digital wallets

Users will begin to store verified data about themselves on their phone, such as their real identity via government-issued IDs in digital wallets as those provided by Apple and Google. But it won’t stop at real IDs and will extend into all sorts of other identity data being shared with the user for better privacy and control by the individual.

  1. Attacks on zombie and shadow APIs

It’s projected that over 90% of attacks will focus on APIs in 2022. For those companies without well-formed API governance, controls, and security practices, APIs will become the weak link.

  1. Convergence of IT and OT

Information Technology and Operational (physical) Technology collide, and IT teams take over responsibility for the security of OT. This will lead to a need for interoperability between IT/OT initially, and ultimately a convergence of redundant technology to control who can physically get in the building and who can access apps.

  1. Rise of the CISO

Corporate boards care about cyber risk, so identity leaders will report directly to the CISO, and the CISO will report to the board. Gartner predicts that 40% of boards will have a dedicated cybersecurity committee by 2025.

  1. Identity focus shifts to experience

The focus will shift from the deployment model as the enabler of speed to no-code, low-code orchestration as the enable of both speed and agility of extraordinary end-user experiences.

 

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by Veeam

AI and Ransomware: Cutting Through the Hype

Rick Vanover, Vice President Product Strategy, Veeam discusses how It might be the great paradox: Artificial Intelligence (AI)….
Copyright: Security Buyer

AmiViz Partners with Titania

AmiViz announced a strategic distribution agreement with Titania. This collaboration underscores a shared commitment to enhancing…
Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures.
blackhat

Black Hat Europe Starts Soon

Black Hat Europe starts Monday and now is the perfect time to start planning your experience. With a full lineup of Keynotes…

VIVOTEK’s All-in-One Software Boosts Operational Efficiency for Enterprises

As demand for high-efficiency security systems rises among large enterprises, the global leading…
Assa Abloy website

WTC Amsterdam enhances security and efficiency with digital access solution

The World Trade Center (WTC) Amsterdam, home to over 300 companies, has upgraded its building security with a streamlined, digital access solution from ASSA ABLOY.
John Maddison website

Fortinet launches Lacework FortiCNAPP to enhance cloud-native security

In an advancement in cybersecurity, Fortinet has announced Lacework FortiCNAPP, providing organisations with visibility and security.
GITEX Global 2024 website

GITEX GLOBAL 2024: AI revolution drives strategic tech innovation

GITEX GLOBAL 2024 concluded on Friday, showcasing artificial intelligence (AI) as a transformative force driving business and economic growth
Security Mircon website

Edge Storage Powers Cloud Security

Micron Technology, alongside International Security Buyer, conducted a survey of installers, integrators, distributors, and security managers
Scroll to Top