2018 Predictions: Full-Scale Cyber War

2018 will see the arms race between organisations and hackers continue to intensify. As well as this, 2018 could see a full-scale cyber war break out between countries. 

There are also predictions that nation states and law enforcement agencies around the world will begin to use cyber tactics offensively within the next 12 months.

Growth in number of attacks
2017 saw a significant escalation in the number of cyber-attacks levied against nation states, and Ward Solutions believes that 2018 will see similar growth in the number of attacks. 

However, what will change in 2018 is how nation states react to cyber-aggression. Many states, including a number of NATO allies, are currently drafting cyber warfare principles, and some agree that cyber-attacks on the part of another nation state constitute an effective act of war.

This justification could see states react with physical force to any virtual intrusion. Ward expects governments to adopt combative cyber strategies to tackle both aggressive nation states and state-backed cybercriminals. It’s possible that this strategy could lead to the emergence of a cybersecurity war.

Focused attacks on critical infrastructure
As cyber-attacks intensify and increase in frequency, Ward also predicts that large swathes of the civilian population will be impacted. We believe that 2018 will see cyber-criminals focus their attacks on critical infrastructure, such as national power grids, to destabilise the countries in their crosshairs. Worryingly, many countries are ill-equipped to deal with this type of attack.

Reflecting on the predictions, CEO of Ward SolutionsPat Larkin says: “2018 will see cyber-security threats increase further in sophistication and the amount of damage that they can potentially cause. Furthermore, as state-sponsored groups increase their attacks on countries’ national infrastructures, civilians could begin to suffer as essential services come under strain. 
Ireland is particularly unprepared to deal with an attack on our critical national infrastructure, and to protect our interests we need to implement a comprehensive national cyber security strategy as soon as possible.

“There is clear evidence that state-sponsored cyber-attacks are already happening around the world. Continued attacks on nations by cybercriminals will build legitimacy for national cyber response teams, and 2018 marks the tipping point when those targeted nations escalate their response to cyber-attacks, which they now classify an act of war. Cyber-attacks represent a very real threat to national security, and so expect countries to devise official coordinated defensive responses, utilising both cyber and physical, military force to protect their interests."

“We would expect certain nations to go on the offensive against hackers and launch coordinated cyber campaigns to disable them before they have the chance to strike. Offensive cyber strategies will become a key element in countries’ national defence plans, helping them to prevent attacks.”

AI and GDPR
Finally, Ward also predicts that, in 2018, cyber-criminals will embrace Artificial Intelligence (AI) and Machine Learning (ML) technologies, using them to supplement their attacks and circumvent the advanced cybersecurity tools employed by businesses. 

At the same time, companies will also embrace AI and ML to bolster their defences and protect their assets. This will lead to an ongoing arms race between criminals and organisations, as both threats and defences increase in complexity.
General Data Protection Regulation (GDPR) will also remain a key priority for companies in 2018, especially until the deadline for compliance arrives on 25th May. 

Pat Larkin commented: “GDPR awareness will reach its zenith in the first few months’ of 2018, with the regulation itself set to come into force on May 25th. It is likely that punitive examples will be made of large organisations who will be fined heavily for failing to comply with the legislation. 

The focus on GDPR compliance will also drive the need for an overarching framework that will enable companies to maintain compliance with information security standards going forward.”

Ward Solutions

You Might Also Read: 

Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions:

Startups Are Changing The Future Of Cybersecurity:
 

« Iran’s Cyber Capabilities
VW and Hyundai To Offer Autonomous Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

ITConnexion

ITConnexion

From cloud migration to ransomware protection, our managed IT services can be customised to address the most prevalent IT issues for your business.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Google Cloud

Google Cloud

Accelerate your digital transformation. Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.