The Next 9/11 Will Be A Cyber Attack

The FBI has compared recent cyber attacks on US government and corporate entities to the same level of threat presented by the 9/11 terrorist attack. 

US Admiral James Stavridis,  ex- NATO Supreme Allied Commander for Europe, has echoed this perspective in a recent TV interview. “We’re headed toward a cyber Pearl Harbor, and it is going to come at either the grid or the financial sector... we need to think about this cyber attack as a pandemic.”

Now, as tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is only a matter of time.

The rapid transformation from office-based activity to remote work prompted by the Coronavirus pandemic has demanded the adoption of robust cyber security protocols to mitigate the risk many organisations face from  malware and ransomware.

Pressure Points On Critical Infrastructure 

The World Economic Forum’s Global Risk Report ranks cyber security failure among the greatest threats facing humanity within the next decade, saying “…attackers could trigger a breakdown in the systems that keep societies functioning.” Industry and critical infrastructure which need to be running continuously - such as nuclear power plants, banking operations, intensive care units in hospitals and Coronavirus vaccine distribution - could be potential targets for hackers, whether they are small groups or state actors. 

Concerns exist that nation-state actors will test the pressure points of critical infrastructure through hacks with the aim of sowing seeds of more chaos by disrupting the supply chains during future periods of geo-political conflict. At such times, targeting food and energy supplies of an adversary will be a classic strategy to begin with. 

Escalating Concerns

The hacking of the Colonial Pipeline controlling  45 percent of fuel in the Eastern US, led to panic buying of petrol by consumers which in turn escalated fuel prices on the entire Eastern coast.  Around the world, recent cyber attacks on critical infrastructure in Australia and Israel the vulnerabiltiy of some of the computer operated distribution networks upon which nations rely.  

These are various  scenarios that concern independent cyber security experts and they have three common characteristics: 

  • Physical attacks that shut off or damage some aspect of critical services.
  • Financial attacks that spin out of control and lead to bank runs. 
  • Disinformation via manipulating data and information in a way that undermines trust in critical national institutions.

Today, its not hard to imagine a scenario  in which a cyber attack could shut down basic services such as electricity or water supply, which can and will adversely affect millions of people. 

The Challenge Facing Policymakers

Political leaders all over the world are waking up to the serious threats posed by cyber warfare. Huawei's 5G technology is an example where companies all over the globe, policy makers and governments, especially of Denmark, India, Japan, and South Africa have raised issues about the geopolitical neutrality and the subsequent threat to sovereignty from private corporations involved within the cyber realm. 

Some countries have issued a complete ban on Huawei 5G communications equipment, although the Chinese the company continues to gains more ground by virtue of low pricing for its innovative technology 

Technology innovation is not likely to slow and indeed digital advances are likely to accelerate. Super-computing and quantum computing will push change ahead and enable even more powerful digital applications. Only by focusing on controlling technological advances will vulnerable nations be able to address the  problems of misinformation, personal privacy, cyber security and disinformation. 

WEF:     Brookings:      Economic Times:    Guardian:       CNBC:      Biometrica

You Might Also Read: 

Cyber Warfare Is The New Frontier:

 

 

« Is Cyber Training Fit For Purpose?
NATO & Ukraine Agree Deeper Cyber Co-operation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

CyberQP

CyberQP

CyberQP (formerly Quickpass Cybersecurity) provide Privileged Access Management built for MSPs. Our system is designed to reduce ransomware and social engineering attack risks.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.