Cyber Terrorism Will Be A Top Threat By 2020

Nation-state-led cyber-terrorism will be a top threat by 2020, and every organisation should prepare.

That’s the word from the Information Security Forum (ISF)’s latest Threat Horizon 2020 report, which postulates that terrorist groups, organised criminals, hacktivists and hackers working in various collaborations and configurations to increasingly weaponise the cyber-domain.

They will launch attacks on critical national infrastructure that cause widespread destruction and chaos. Further, their activities will take no account of land barriers or legislation.

With power, communications and logistics systems down, organisations will lose the basic building blocks needed for doing business; heating, air conditioning, lighting, transport, information, communication and a safe working environment will no longer be taken for granted.

“Over the next two years, business leaders will face regular and complex decisions about protecting their critical information and systems. Existing solutions that have been relied upon for years will be exposed as inadequate,” said Steve Durbin, managing director, ISF.

“Only organisations that understand this rapidly changing and complex environment will remain firm and unshakable. Those that are unprepared and incapable of responding quickly will crumble as they defend against an onslaught of potent, day-to-day cyber-attacks.”

Aside from the doomsday-like prediction, the report also predicts that technology will outpace controls. Capabilities that seemed impossible only a short time ago will develop extremely quickly, aiding those who see them coming and hindering those who don’t.

Developments in smart technology will create new possibilities for organisations of all kinds, but they will also create opportunities for attackers and adversaries by reducing the effectiveness of existing controls. Previously well-protected information will become vulnerable.

Also, according to the ISF, pressure will skew judgement. Existing controls and methods of managing information risk will be put under severe stress by an avalanche of new technologies, regulations and pressures on employees.

Organisations that have a good record of securing information will be at risk of complacency, judging that the way they have always done things will continue to work in the future, a dangerous attitude to take.

“Over the coming years, the very foundations of today’s digital world will shake, violently,” Durbin said. Innovative and determined attackers, along with seismic changes to the way organisations conduct their operations, will combine to threaten even the strongest establishments. Only those with robust preparations will stand tall.”

Infosecurity-Magazine

You Might Also Read: 

Terrorism, A Sea Change In Tactics:

Cyberterrorism: The Next Threat From Islamic State:

 

« Iranian Hackers Adopt New Methods
Europol Chief Moves to Deloitte »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

US Coast Guard Cyber Command

US Coast Guard Cyber Command

US Coast Guard Cyber Command’s focus is to ensure the security of our cyberspace, maintain superiority over our adversaries,and safeguard our Nation’s critical maritime infrastructure.

South East Cyber Resilience Centre (SECRC)

South East Cyber Resilience Centre (SECRC)

The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.