The number of targeted attacks and the amount of damage from them are on the rise, cybercriminals receive huge amount of money, allowing them to implement more and more powerful attacks. According to major analytics, the main threat of 2015 will be targeted attacks for banks and financial institutions, in particular, ATM networks.
For the 1st half of 2014 the total loss from the targeted attacks was RUR 1 800 millions, and 800 millions were lost by banks, including 200 millions as damage to ATM networks.
Meanwhile, one of the main reasons for the cybercrime growth is the impunity. The risk for attackers is limited by loss of time and money for organization of an attack. They know, than nobody will try to catch them. The risks are similar to the legal business, so, potential investors (who earned money in traditional crime and who earned in cybercrime) evaluate them respectively.
In addition, foreign agencies could be interested in compromising of the backbone and critical enterprises. On the one hand, counteracting foreign agencies is FSB's responsibility, but on the other hand, it doesn't matter for the businesses, who will steal their money.
Information security divisions spend almost all of their resources for implementation, configuration and maintenance of different protection systems, forgetting what these systems were created for. In fact, they nearly don't have resources for using this systems. So, security actions are being replaced with doubling IT-department functions, and security problems remain unsolved. We can take an analogy with soldiers, only digging entrenchments. Of course, it's important. But soldiers, which can only dig, wouldn't be successful at war.
There's not a big deal for qualified malefactors to sink trough unmanaged protection. If you don't implement any measures for discovering attacks, any attack becomes a surprise, providing an attacker with extra possibilities.
One of the main factors, provoking cyberattacks is impunity of the attackers. To deal with this problem, we need to create precedents and provide this information to the potential aggressors. Any criminal must know, that after a targeted attack, the security department will take measures for finding and punishing him. Ideally, the measures should be taken at the stage of preparing an attack.
Making traps, we can build "black" reputation for the organization in the criminal society, when any proposal to work against will be considered a provocation. Undoubtedly, the number of enthusiasts will decrease quickly, and security officers will receive valuable experience.
So, what kind of actions should take information security divisions to grant business protection in new conditions? Among innovative methods, there must be - penetration into criminal groups to get information on future attacks, creation of traps for discovering identities of attackers and building black reputation of organization for cybercriminals. As a result, there must be initiations of criminal cases, arrests, courts.
For this kind of cases, we need specialists with field action experience and special skills in computer criminology, virus analysis and intrusion tests. Currently, there's a leak of such specialists in any country, and the process of their training is long and complex. That's why, starting this process now, the organizations will get an advantage. Nobody will attack the depot with well-trained and well-armed security, if there are 3 similar depots nearby without any protection.
The problem of subordination
Nowadays, security department is an IT division in fact, mainly project oriented. They rarely do anything by hands, at best, managing security systems. But the administrator of the antivirus protection is not a specialist in technologies of malware.
In any country, the economical security division is represented by ex-cops, with nearly zero tech skills. Therefore, an innovative division must be independent from information security and economical security departments. It's impossible to get all the specialists fast - searching for the right people will be a long-term deal. That's why for the first time analytics and cyber intelligence can be delegated to external companies like iSIGHT partners, Verisign, Booz Allen, Cyveillance, IID, Group-IB.

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic