The Next 9/11 Will Be A Cyber Attack

The FBI has compared recent cyber attacks on US government and corporate entities to the same level of threat presented by the 9/11 terrorist attack. 

US Admiral James Stavridis,  ex- NATO Supreme Allied Commander for Europe, has echoed this perspective in a recent TV interview. “We’re headed toward a cyber Pearl Harbor, and it is going to come at either the grid or the financial sector... we need to think about this cyber attack as a pandemic.”

Now, as tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is only a matter of time.

The rapid transformation from office-based activity to remote work prompted by the Coronavirus pandemic has demanded the adoption of robust cyber security protocols to mitigate the risk many organisations face from  malware and ransomware.

Pressure Points On Critical Infrastructure 

The World Economic Forum’s Global Risk Report ranks cyber security failure among the greatest threats facing humanity within the next decade, saying “…attackers could trigger a breakdown in the systems that keep societies functioning.” Industry and critical infrastructure which need to be running continuously - such as nuclear power plants, banking operations, intensive care units in hospitals and Coronavirus vaccine distribution - could be potential targets for hackers, whether they are small groups or state actors. 

Concerns exist that nation-state actors will test the pressure points of critical infrastructure through hacks with the aim of sowing seeds of more chaos by disrupting the supply chains during future periods of geo-political conflict. At such times, targeting food and energy supplies of an adversary will be a classic strategy to begin with. 

Escalating Concerns

The hacking of the Colonial Pipeline controlling  45 percent of fuel in the Eastern US, led to panic buying of petrol by consumers which in turn escalated fuel prices on the entire Eastern coast.  Around the world, recent cyber attacks on critical infrastructure in Australia and Israel the vulnerabiltiy of some of the computer operated distribution networks upon which nations rely.  

These are various  scenarios that concern independent cyber security experts and they have three common characteristics: 

  • Physical attacks that shut off or damage some aspect of critical services.
  • Financial attacks that spin out of control and lead to bank runs. 
  • Disinformation via manipulating data and information in a way that undermines trust in critical national institutions.

Today, its not hard to imagine a scenario  in which a cyber attack could shut down basic services such as electricity or water supply, which can and will adversely affect millions of people. 

The Challenge Facing Policymakers

Political leaders all over the world are waking up to the serious threats posed by cyber warfare. Huawei's 5G technology is an example where companies all over the globe, policy makers and governments, especially of Denmark, India, Japan, and South Africa have raised issues about the geopolitical neutrality and the subsequent threat to sovereignty from private corporations involved within the cyber realm. 

Some countries have issued a complete ban on Huawei 5G communications equipment, although the Chinese the company continues to gains more ground by virtue of low pricing for its innovative technology 

Technology innovation is not likely to slow and indeed digital advances are likely to accelerate. Super-computing and quantum computing will push change ahead and enable even more powerful digital applications. Only by focusing on controlling technological advances will vulnerable nations be able to address the  problems of misinformation, personal privacy, cyber security and disinformation. 

WEF:     Brookings:      Economic Times:    Guardian:       CNBC:      Biometrica

You Might Also Read: 

Cyber Warfare Is The New Frontier:

 

 

« Is Cyber Training Fit For Purpose?
NATO & Ukraine Agree Deeper Cyber Co-operation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Lastline

Lastline

Lastline is the leader in advanced malware protection.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

FortifyData

FortifyData

FortifyData is the next generation of cyber risk management–a comprehensive platform that continuously evaluates your third-party, internal and people risks.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

Lab 1

Lab 1

Lab 1 turns criminal data breaches and attacks into insights. Get alerts of data breaches or ransomware attack incidents as they happen.

Boltonshield

Boltonshield

Boltonshield provide a unique and proactive approach to cyber defence with managed security services, integrated technologies, and a team of security experts, ethical hackers and analysts.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.