Future of Work – Increasing cyber risk is challenging traditional employment models


Work is changing.

Globalisation, technological progress and Demographic changes are having a profound impact on labour markets, affecting both the quantity and quality of jobs that are available, as well as how and by whom they are carried out.

The way we work is changing. As new technologies continue to unfold in the workplace, more than a third of jobs are likely to require skills that are uncommon in today’s workforce. Workers are increasingly working independently.

We are living through a fundamental transformation in the way we work. Automation and ‘thinking machines’ are replacing human tasks and jobs, and changing the skills that organisations are looking for in their people. These momentous changes raise huge organisational, talent and HR challenges – at a time when business leaders are already wrestling with unprecedented risks, disruption and political and societal upheaval

It is clear that the information technology we are using today is not nearly as secure as it needs to be given the scale of organizations’ digital build-outs. A casual glance at the news bears that out. The 2016 U.S. election was potentially hacked, North Korea’s missile launch program was hacked, film studios, Pentagon satellites, Pacemakers and most recently Equifax.

The future infrastructures are not only limited to servers, workstations, network and security devices. New devices such as IoT sensors, Cloud infrastructures, Robots, Vehicle platform, Healthcare systems, surveillance machines, semi-conductor chips etc will continue to emerge. Likewise the business models of ‘security operations center’ based on analytics systems, event processing and ITSM tools may change.

The future cyber security operations require artificial intelligence, so that the first level tasks are completely automated and UI design based on augmented reality concepts to provide visibility into the security posture and impact of business. The self learning systems should provide recommendations to various system administrators (database, network, open hardware, etc.) that are most appropriate action they should take to fix the reported incident.

The traditional point solutions, multiple vendor technology stack, adding more security team members into the organization, risk appetite methodology will become nightmare.

The skills and expertise require to address the future of work in cyber security may exists in some form now. Business leaders should spend quality time discussing on this now.