An Apocalyptic Cyber Event

The world faces a set of entirely new risks according to the World Economic Forum (WEF) Global Security Outlook Report 2023, which has predicted  a “catastrophic cyber event" is on the way and will take place  in the "near future".

Speaking at the report's presentation, the WEF Managing Director Jeremy Jurgens, said that "geopolitical instability makes a catastrophic cyber event likely in the next two years". Jurgens said that the prediction comes from 93 per cent of cyber leaders, and 86 per cent of cyber business leaders. "This far exceeds anything that we’ve seen in previous surveys.”

Jürgen Stock, Secretary-General of Interpol, said “This is a global threat... It calls for a global response and enhanced and coordinated action.” He also commented that the increased profits that the multiple bad “actors” reap from cyber crime should encourage world leaders to work together to make it a priority as they face “new sophisticated tools.”

Jurgens referred to a recent cyber attack that aimed to shut down Ukrainian military capabilities, but unexpectedly led to closing off of parts of electricity production in other parts of Europe.

Also present was Jürgen Stock, the Secretary-General of Interpol, who called it "a global threat". “It calls for a global response and enhanced and coordinated action.” He urged multiple bad “actors” who benefit from cybercrime to encourage world leaders to work together to thwart all such efforts.

Albania, one of the countries that fell victim to a large-scale cyber attack last year, has now been working with larger allies to fight cyber criminals. Also present was Edi Rama, the Prime Minister of Albania’ who commented that, if cyber crime were a nation-state, it would be the third largest global economy after the US and China. Rama said that the cybercrime industry stood at $3 trillion in 2015 and is expected to grow to $10.5 trillion in 2025.

Rama compared the attack predicted by WEF to a virus like Covid-19 and how it can turn to an "apocalypse".

“Let’s imagine an exponential multitude of viruses that mutate everyday exponentially while not threatening our body, but the bodies we live in, our organisations, our countries, our system, then, you know, it could be just apocalypse... It’s about viruses that can not only block our way of living, but can control it and deviate it.” Rama added.

The report is based on a survey of 1,200 - plus risk experts, including the WEF’s Global Risks Report Advisory Board and its Chief Risk Officers Community, as well as thematic experts from academia, business, the international community, civil society and the government.

The WEF challenges leaders to “think more deeply about cybersecurity and listen more intently to cyber experts, and to each other, in order to ensure our shared resilience.” Additionally, the WEF urges cyber security leaders to refrain from using language that is too technical and jargony. Instead, it recommends using language their business counterparts will fully understand and can act upon.

WEF:     Tenable:    WIONews:    Popular Mechanics:    HelpNetSecruity:    Cybersecurity Dive:

You Might Also Read: 

Coming Your Way - The Top Cyber Crimes In 2023:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Calculating The Ransom Demand On The Victim’s Insurance
Digital ID Cards For Everyone In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

ISF Annual World Congress

ISF Annual World Congress

ISF Annual World Congress, our flagship global event, offers attendees an opportunity to discuss and find solutions to current security challenges.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.