Cyber Terrorism Will Be A Top Threat By 2020

Nation-state-led cyber-terrorism will be a top threat by 2020, and every organisation should prepare.

That’s the word from the Information Security Forum (ISF)’s latest Threat Horizon 2020 report, which postulates that terrorist groups, organised criminals, hacktivists and hackers working in various collaborations and configurations to increasingly weaponise the cyber-domain.

They will launch attacks on critical national infrastructure that cause widespread destruction and chaos. Further, their activities will take no account of land barriers or legislation.

With power, communications and logistics systems down, organisations will lose the basic building blocks needed for doing business; heating, air conditioning, lighting, transport, information, communication and a safe working environment will no longer be taken for granted.

“Over the next two years, business leaders will face regular and complex decisions about protecting their critical information and systems. Existing solutions that have been relied upon for years will be exposed as inadequate,” said Steve Durbin, managing director, ISF.

“Only organisations that understand this rapidly changing and complex environment will remain firm and unshakable. Those that are unprepared and incapable of responding quickly will crumble as they defend against an onslaught of potent, day-to-day cyber-attacks.”

Aside from the doomsday-like prediction, the report also predicts that technology will outpace controls. Capabilities that seemed impossible only a short time ago will develop extremely quickly, aiding those who see them coming and hindering those who don’t.

Developments in smart technology will create new possibilities for organisations of all kinds, but they will also create opportunities for attackers and adversaries by reducing the effectiveness of existing controls. Previously well-protected information will become vulnerable.

Also, according to the ISF, pressure will skew judgement. Existing controls and methods of managing information risk will be put under severe stress by an avalanche of new technologies, regulations and pressures on employees.

Organisations that have a good record of securing information will be at risk of complacency, judging that the way they have always done things will continue to work in the future, a dangerous attitude to take.

“Over the coming years, the very foundations of today’s digital world will shake, violently,” Durbin said. Innovative and determined attackers, along with seismic changes to the way organisations conduct their operations, will combine to threaten even the strongest establishments. Only those with robust preparations will stand tall.”

Infosecurity-Magazine

You Might Also Read: 

Terrorism, A Sea Change In Tactics:

Cyberterrorism: The Next Threat From Islamic State:

 

« Iranian Hackers Adopt New Methods
Europol Chief Moves to Deloitte »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Onyxia

Onyxia

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.