{"id":47981,"date":"2023-04-21T06:10:09","date_gmt":"2023-04-21T10:10:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=47981"},"modified":"2023-11-15T03:01:55","modified_gmt":"2023-11-15T08:01:55","slug":"7-future-roles","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/7-future-roles\/47981\/","title":{"rendered":"7 new roles we&#8217;ll soon see keeping business secure"},"content":{"rendered":"<p>Technology penetrates every sphere of our lives, and more devices mean more cybersecurity challenges. How we protect systems is evolving with technology and threats: Routine work like <a href=\"https:\/\/www.kaspersky.com\/blog\/introducing-kedr-optimum\/45549\/\" target=\"_blank\" rel=\"noopener nofollow\">monitoring and response is being automated<\/a>. But cybersecurity isn\u2019t getting less complex \u2013 businesses will soon need new, more creative, more diverse roles.<\/p>\n<p>While they may seem futuristic, some already exist in one form or another. Given long-term trends, leaders should start planning to recruit for these new roles, coming soon.<\/p>\n<h2>1.\u00a0 AI mentor<\/h2>\n<p>The rise of AI-based technologies like ChatGPT and voice assistants like Siri and Alexa made new tech more accessible while bringing <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/ai-ethics-beth-singler\/41250\/\" target=\"_blank\" rel=\"noopener nofollow\">new concerns around privacy and security<\/a>. AI\u2019s control, regulation and monitoring requirements go beyond product management and development expertise.<\/p>\n<p>William Gibson\u2019s 1984 science fiction book <em>Neuromancer<\/em> imagined we\u2019d one day have \u2018Turing Police\u2019 to control AI and AI-based systems, stopping them evolving and becoming independent. Turing refers to famed UK mathematician and computer scientist Alan Turing\u2019s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Turing_test\" target=\"_blank\" rel=\"noopener nofollow\">test to distinguish humans from machines<\/a>. A need for firm limits on AI is little disputed among experts, with a range of <a href=\"https:\/\/www.bbc.com\/news\/technology-65110030\" target=\"_blank\" rel=\"noopener nofollow\">tech leaders, including Elon Musk, signing a open letter asking for a pause in AI development<\/a> in March 2023.<\/p>\n\t\t\t\t\t<div class=\"c-promo-post\">\n\t\t\t\t\t\t<div class=\"o-row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"o-col-12@sm\">\n\t\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--hor@xs c-card--small@xs\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__figure c-card__figure--small@xs c-card__figure--medium@sm\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-year-threats\/46971\/\" class=\"c-card__figure-link\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/01\/24070702\/343_cybersecurity_predictions-500x500.jpg\" class=\"attachment-card-default size-card-default wp-post-image\" alt=\"cybersecurity predictions\" data-src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/01\/24070702\/343_cybersecurity_predictions-500x500.jpg\" data-srcset=\"\" srcset=\"\">\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Related article<\/p>\n\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-year-threats\/46971\/\" class=\"c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span>What a year of changing cyberthreats can tell business<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"o-icon o-svg-icon o-svg-right\"><use xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-emagazine\/assets\/sprite\/icons.svg#icon-arrow-long\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t\t\t\t\t<p>Knowing which threats are on the rise can help your business stay ahead. Here are some your business should look out for in 2023.<\/p>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<footer class=\"c-card__footer\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__list\">\n\t\t\t\t\t\t\t\t\t\t\t<ul class=\"c-list-labels js-has-reading-time\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"c-list-labels__link\" href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/safer-business\/\" target=\"_blank\" rel=\"noopener nofollow\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Safer business<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span class=\"js-reading-time\"><\/span> min read<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"u-hidden js-reading-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tFor business leaders, knowing what's changing in cybersecurity helps you recruit the right people with the right skills today for what you'll soon need.\r\n\r\nKaspersky's 2022 Security Bulletin (free download) analyzes which attacks their global cloud service Kaspersky Security Network (KSN) has detected, blocked and disabled over the past year. There are some numbers your business will want to know about.\r\n15 percent of users had a malware attack\r\nKaspersky Security Network blocked malware-class attacks on some 15 percent of users in 2022, or around 1 in 7. This shows just how common malware is.\r\n\r\nThe malware class of attacks covers familiar cybercrime tools like viruses, trojans and ransomware. The countries where Kaspersky's software blocked the most malware attacks in 2022 were Tunisia, Taiwan and Algeria.\r\n\r\n\r\n506 million web-based attacks\r\nWeb-based attacks result from users downloading files that then trigger a cyberattack. These might come from websites made by cybercriminals, infected online resources within user-created content (like online forums) or legitimate resources that cybercriminals have hacked.\r\n\r\nCybersecurity education can be a powerful tool in preventing web-based attacks. Heathrow Airport has a novel staff cybersecurity education that carefully targets those needing it most with 10-minute online learning modules.\r\n\r\n\r\n1.4 million cryptocurrency mining attempts\r\nCryptocurrency mining is very much on the rise. Kaspersky Security Network detected around 1.4 million attempts to install mining software in the past year.\r\n\r\n\r\n\r\nMining means digitally solving complex mathematical problems that verify cryptocurrency transactions, which also earns cryptocurrency. It slows devices and uses much electricity.\r\n\r\nIn November 2022, Kaspersky announced they'd seen a 230 percent growth in cryptocurrency mining in the third quarter of 2022 compared with the same period in the year before.\r\n102 million attempts to visit malicious URLs\r\nMalicious URLs are a common tool in 'phishing' attacks \u2013 when cybercriminals send emails inducing recipients to click on links, downloading malware.\r\n\r\nEndpoint security is vital in protecting against phishing, as is employee cyber-awareness.\r\n377,000 attempts to steal money\r\n\r\n\r\nThese attacks were often in the form of 'banking Trojans'. In early 2022 a particularly sophisticated money-stealing Trojan popped up that masquerades as a banking app and imitates phone conversations with bank employees. The app fooled many, highlighting the need to teach employees 'cyber hygiene' \u2013 like remembering to pause and think before downloading anything. Those who provide legitimate apps or financial services might also reflect on how they can show customers their products are trustworthy.\r\n\r\nThese big numbers in cybersecurity over the past year show how threats to business are growing and changing. Cybercriminals always find new ways to get through consumers' and employees' defenses. By combining hiring the right people with robust cybersecurity education and strong security solutions, your business will greatly reduce its chances of a serious attack succeeding. Then, you can spend your time on what you do best.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/footer>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\n<p>AI Mentors will assess and control AI technology. They may also teach AIs, control access to data and constrain evolution \u2013 you might call it, being AI\u2019s parent. As AI\u2019s complexity and sophistication grows, there will be growing demand for such experts.<\/p>\n<p>AI mentors could also develop \u2018stop\u2019 buttons to prevent systems operating on their own. They may also develop protection against malfunction and alternative rescue plans if computers are out of service.<\/p>\n<h2>2.\u00a0 Digital footprint consultant<\/h2>\n<p>Leaks and breaches negatively affect any brand. Cybercriminals often use threats of reputational damage to extort money from companies once inside systems. A digital footprint consultant will work to protect your brand.<\/p>\n<p>However, there\u2019s no need to wait for a digital footprint consultant to come on board before you <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cyber-incidence-communication-response\/32379\/\" target=\"_blank\" rel=\"noopener nofollow\">develop strategies to restore your brand reputation<\/a> after a data leak.<\/p>\n<h2>3.\u00a0 Cyber immunity developer<\/h2>\n<p>Cybersecurity will change as businesses are forced to rethink how they develop new tech.<\/p>\n<blockquote><p>Instead of cybersecurity being an afterthought \u2013 sometimes even after prototyping and testing \u2013 we\u2019ll need to think \u2018security first.\u2019<\/p>\n<\/blockquote>\n<p>Embedding cybersecurity principles from the start makes <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/how-to-create-cyberimmune-system\/25223\/\" target=\"_blank\" rel=\"noopener\">cyber immunity<\/a> possible \u2013 systems so secure that the cost of hacking them isn\u2019t worth the reward. Demand for cyber-immune products will see employees scrambling to hire designers and developers with security-first skills.<\/p>\n<h2>4.\u00a0 Threat endurance manager<\/h2>\n<p><a href=\"https:\/\/www.agileit.com\/news\/biggest-cyberattacks-2022\/\" target=\"_blank\" rel=\"noopener nofollow\">2022 was a costly year for cyberattacks<\/a>, with high-profile big tech names like Twitter, Uber and Rockstar Games all hit. Cybercriminals don\u2019t shy away from attacking public services and <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/attacked-hospital-fights-back\/44638\/\" target=\"_blank\" rel=\"noopener nofollow\">life-saving institutions<\/a> either, with several universities, the UK\u2019s National Health Service and the Red Cross among those attacked.<\/p>\n<p>Cyberattacks interrupt production and business processes, pose reputational risks and lead to big financial losses. Health insurance giant <a href=\"https:\/\/securityintelligence.com\/articles\/13-costliest-cyberattacks-2022\/\" target=\"_blank\" rel=\"noopener nofollow\">Medibank reported a ransomware attack<\/a> cost them 26 million US dollars.<\/p>\n<blockquote><p>Threat endurance managers will be in high demand among those that can\u2019t afford a shutdown, like critical infrastructure and healthcare.<\/p>\n<\/blockquote>\n<p>They\u2019ll be responsible for business continuity and protect companies by controlling IT systems, responding to cyberattacks and managing software and human errors.<\/p>\n<h2>5.\u00a0 Cyber investigator<\/h2>\n<p>Cyber investigators already exist, but their work will become more complex and diverse as digital systems get more sophisticated and automated.<\/p>\n<p>These specialists normally manage the aftermath of a security breach, covering the whole investigation and eliminating the threat. At Kaspersky, they collect evidence about an incident by analyzing log files and network events, finding <a href=\"https:\/\/support.kaspersky.com\/Cloud\/1.0\/en-US\/231798.htm\" target=\"_blank\" rel=\"noopener\">indicators of compromise<\/a> and more.<\/p>\n<p>New-generation cyber investigators will be generalists with skills in programming and hacking, but also psychology and decision-making in volatile conditions. They\u2019ll also understand robotics and AI, as they must work with emerging systems.<\/p>\n<h2>6.\u00a0 Digital bodyguard<\/h2>\n<p>Like bodyguards in the physical world, we\u2019ll want to hire consultants to protect our digital identities. These bodyguards will protect against <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/doxxing\/\" target=\"_blank\" rel=\"noopener\">doxing<\/a> \u2013 when attackers publish personal data online for revenge \u2013 and <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/cyberstalking\/\" target=\"_blank\" rel=\"noopener\">cyberstalking<\/a>. They\u2019ll clean our accounts and digital history, and guide and support our virtual lives.<\/p>\n<p>Pew Research Center found <a href=\"https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/\" target=\"_blank\" rel=\"noopener nofollow\">more than 40 percent of US adults experienced online harassment in 2020<\/a>. Sometimes, online harassment is linked with offline harassment and even violence. Digital bodyguards will help protect us from these kinds of threats, and disrupt and identify the offender when they happen. They may also give victims emotional support.<\/p>\n<p>Businesses that provide digital technologies must consider how they\u2019ll facilitate digital bodyguards\u2019 work protecting their clients.<\/p>\n<h2>7.\u00a0 Space cybersecurity engineer<\/h2>\n<p>Satellites are the most conspicuous piece of space technology in daily life, used in communications, navigation systems, broadcast media and more. Our reliance on satellites makes them <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/space-infrastructure-cybersecurity-future\/41724\/\" target=\"_blank\" rel=\"noopener nofollow\">attractive to threat actors<\/a>.<\/p>\n<p>The space industry needs dedicated specialists to prevent attacks, particularly securing operational systems like navigation, engine control and life support. With the advent of space tourism, asteroid mining and new space stations, there\u2019ll be rising demand for out-of-this-world cybersecurity experts.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/Di0ArBMCFw8?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h2>What does it all mean for business?<\/h2>\n<p>The cybersecurity landscape is complex and always changing, giving rise to new roles like these predicted. It\u2019s easy for businesses to get left behind.<\/p>\n<p>Examples of expensive data breaches at big-name institutions suggest those who invest in top cybersecurity will save time and money long-term. For those developing future technologies, embedding cyber immunity is becoming necessary, especially if your tech will be used in critical services like healthcare and infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How we protect systems and people is changing with threats and technology. The upside? We\u2019ll see creative and diverse new roles in the near future.<\/p>\n","protected":false},"author":2571,"featured_media":47982,"template":"","coauthors":[3739],"class_list":{"0":"post-47981","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-category-future-tech","8":"emagazine-category-talent-business","9":"emagazine-tag-careers","10":"emagazine-tag-future-of-work"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-year-threats\/46971\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-year-threats\/27723\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/47981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/47982"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=47981"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=47981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}