* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/) * 2016 Prediction #11: Look... # 2016 Prediction \#11: Looking Ahead to Cybersecurity in 2016 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2015%2F12%2F2016-prediction-11-looking-ahead-to-cybersecurity-in-2016%2F) [](https://twitter.com/share?text=2016+Prediction+%2311%3A+Looking+Ahead+to+Cybersecurity+in+2016&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2015%2F12%2F2016-prediction-11-looking-ahead-to-cybersecurity-in-2016%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2015%2F12%2F2016-prediction-11-looking-ahead-to-cybersecurity-in-2016%2F&title=2016+Prediction+%2311%3A+Looking+Ahead+to+Cybersecurity+in+2016&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2015/12/2016-prediction-11-looking-ahead-to-cybersecurity-in-2016/&ts=markdown) \[\](mailto:?subject=2016 Prediction #11: Looking Ahead to Cybersecurity in 2016) Link copied By [Greg Day](https://www.paloaltonetworks.com/blog/author/greg-day/?ts=markdown "Posts by Greg Day") Dec 17, 2015 4 minutes [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Predictions](https://www.paloaltonetworks.com/blog/category/predictions/?ts=markdown) [Apple Pay](https://www.paloaltonetworks.com/blog/tag/apple-pay/?ts=markdown) [APT](https://www.paloaltonetworks.com/blog/tag/apt/?ts=markdown) [BYOD](https://www.paloaltonetworks.com/blog/tag/byod/?ts=markdown) [Google Wallet](https://www.paloaltonetworks.com/blog/tag/google-wallet/?ts=markdown) [Governance of Cybersecurity Report](https://www.paloaltonetworks.com/blog/tag/governance-of-cybersecurity-report/?ts=markdown) [shadow IT](https://www.paloaltonetworks.com/blog/tag/shadow-it/?ts=markdown) *This is the eleventh in our* [*series of cybersecurity predictions*](https://www.paloaltonetworks.com/blog/predictions/?ts=markdown)*for 2016. Stay tuned for more through the end of the year.* [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/11/Top-10-Predictions-Banner.png?ts=markdown) [![Top-10-Predictions-Banner](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/11/Top-10-Predictions-Banner-500x175.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/11/Top-10-Predictions-Banner.png?ts=markdown) Cybersecurity has become a mission-critical function for businesses over the years, and the need for comprehensive defences against cyberattacks will only increase as we move forward. Given some of the events over the last year, I'm sharing what I anticipate will develop over the next year in the cybersecurity space. ### 1. Security strategy shifts in the EU As cyberthreats increasingly impact society and economies, government regulation is evolving to reflect the risk and drive confidence in digital space. Initiatives like the Network Information Security Directive and General Data Protection Regulation Reform will have significant influence on cybersecurity policies in 2016. In the wake of these regulations, businesses will have to grapple with new requirements to align with these mandates. ### 2. Cybercriminals focus in on mobile payments The payments landscape is in the midst of a huge shift with the advent of Apple Pay, Google Wallet and other eWallet services, and there's no doubt that cybercriminals will follow the money. As a result, 2016 will see an increased focus from businesses and mobile providers on preventing cyberattacks on mobile devices. ### 3. Security of European supply chains is scrutinized It is commonly said about supply chains that we are only as strong as the weakest link. This proves true with cybersecurity across supply chains worldwide, as we've observed in a number of high-profile breaches over the last year. In Europe, supply chains often cross borders, and companies grapple with different levels of cybersecurity awareness or regulation, resulting in complex networks of potential entry points for cyberthreats. Over the next year, we can expect to see increased scrutiny of cybersecurity policies across all parts of the supply chain and the bolstering of weak points as they are identified. ### 4. CSO evolution Historically the CSO reported in to the CIO, but we have seen this shift as cybersecurity becomes a bigger issue for businesses. Our recent report, ["Governance of Cybersecurity 2015,"](https://www.paloaltonetworks.com/company/press/2015/new-cybersecurity-governance-study-shows-dramatic-increase-in-boards-addressing-cyber-risks.html?ts=markdown) highlights that Europe is the only region to show a sizable shift from CISO/CSOs reporting to the CIO, moving from 50 percent in 2012 down to 33 percent in 2015. We will see the role of the CSO continue to evolve over the next 12 months. ### 5. Reduction of traditional business networks As 2015 comes to a close, we're seeing over a zettabyte of data crossing global networks and three times as many IP-enabled devices as people. As data grows, businesses are opting to outsource, cloudsource and consumerise their IT systems rather than invest in big, complex systems themselves. This adoption of SaaS technology, along with the rise of BYOD, the IoT and wearables, is shifting how businesses are thinking about shadow IT. Over the next 12 months, we expect to see shadow IT become a business priority. ### 6. Blurring boundaries of attacks APT and nation-state attacks have been a key focus over the past few years; however, more common attacks are incorporating advanced concepts, such as multiple components to avoid detection, taken from the APT attack lifecycle, and focusing in on more implicit targets. As nation-states look to cybercriminals for knowledge sharing and new tactics, and as these boundaries blur, we need to use solutions that work cohesively to prevent blended approaches. No one truly knows what the future holds, but we have a pretty good idea of what we should anticipate in the cybersecurity world moving forward. The key for businesses is to identify their weak spots and ensure they have the right stronghold of policies and technology in place to prevent breaches and keep businesses up and running. And when we know what to look out for, we can bolster our businesses against the threats of tomorrow. *Want to explore more of our top 2016 cybersecurity predictions? [Register now](https://boom.weboom.com/sites/paloaltonetworks/ignite2016/forms/regform.html) for Ignite 2016.* [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/11/Ignite-2016.png?ts=markdown) [![Ignite 2016](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/11/Ignite-2016-500x124.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/11/Ignite-2016.png?ts=markdown) *** ** * ** *** ## Related Blogs ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Predictions](https://www.paloaltonetworks.com/blog/category/predictions/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) [#### Securing the AI Before Times](https://www.paloaltonetworks.com/blog/2025/08/securing-ai-before-times/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Davos 2018: Hot Topics in Cyber Risk](https://www.paloaltonetworks.com/blog/2018/02/cso-davos-2018-hot-topics-cyber-risk/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Predictions](https://www.paloaltonetworks.com/blog/category/predictions/?ts=markdown) [#### 2018 Predictions \& Recommendations: Data is the New Oil and Integrity is the Key](https://www.paloaltonetworks.com/blog/2017/12/2018-predictions-recommendations-data-new-oil-integrity-key/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Predictions](https://www.paloaltonetworks.com/blog/category/predictions/?ts=markdown) [#### 2018 Predictions \& Recommendations: The Internet of Things Blurs the Line Between Personal and Corporate Security](https://www.paloaltonetworks.com/blog/2017/12/cso-2018-predictions-recommendations-internet-things-blurs-line-personal-corporate-security/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [#### New Report: The State of Cybersecurity in Asia-Pacific](https://www.paloaltonetworks.com/blog/2017/07/cso-new-report-state-cybersecurity-asia-pacific/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Predictions](https://www.paloaltonetworks.com/blog/category/predictions/?ts=markdown) [#### 2017 Cybersecurity Predictions: Sure Things and Long Shots](https://www.paloaltonetworks.com/blog/2017/01/2017-cybersecurity-predictions-sure-things-long-shots/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language