Cyber Terrorism Will Be A Top Threat By 2020

Nation-state-led cyber-terrorism will be a top threat by 2020, and every organisation should prepare.

That’s the word from the Information Security Forum (ISF)’s latest Threat Horizon 2020 report, which postulates that terrorist groups, organised criminals, hacktivists and hackers working in various collaborations and configurations to increasingly weaponise the cyber-domain.

They will launch attacks on critical national infrastructure that cause widespread destruction and chaos. Further, their activities will take no account of land barriers or legislation.

With power, communications and logistics systems down, organisations will lose the basic building blocks needed for doing business; heating, air conditioning, lighting, transport, information, communication and a safe working environment will no longer be taken for granted.

“Over the next two years, business leaders will face regular and complex decisions about protecting their critical information and systems. Existing solutions that have been relied upon for years will be exposed as inadequate,” said Steve Durbin, managing director, ISF.

“Only organisations that understand this rapidly changing and complex environment will remain firm and unshakable. Those that are unprepared and incapable of responding quickly will crumble as they defend against an onslaught of potent, day-to-day cyber-attacks.”

Aside from the doomsday-like prediction, the report also predicts that technology will outpace controls. Capabilities that seemed impossible only a short time ago will develop extremely quickly, aiding those who see them coming and hindering those who don’t.

Developments in smart technology will create new possibilities for organisations of all kinds, but they will also create opportunities for attackers and adversaries by reducing the effectiveness of existing controls. Previously well-protected information will become vulnerable.

Also, according to the ISF, pressure will skew judgement. Existing controls and methods of managing information risk will be put under severe stress by an avalanche of new technologies, regulations and pressures on employees.

Organisations that have a good record of securing information will be at risk of complacency, judging that the way they have always done things will continue to work in the future, a dangerous attitude to take.

“Over the coming years, the very foundations of today’s digital world will shake, violently,” Durbin said. Innovative and determined attackers, along with seismic changes to the way organisations conduct their operations, will combine to threaten even the strongest establishments. Only those with robust preparations will stand tall.”

Infosecurity-Magazine

You Might Also Read: 

Terrorism, A Sea Change In Tactics:

Cyberterrorism: The Next Threat From Islamic State:

 

« Iranian Hackers Adopt New Methods
Europol Chief Moves to Deloitte »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

LinOTP

LinOTP

LinOTP is an enterprise level, innovative, flexible and versatile OTP-platform for strong authentication.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.