World Economic Leaders Fear Increasing Cyber Attacks

The threat of large-scale cyberattacks and a “deteriorating geopolitical landscape” since the election of US President Donald Trump have jumped to the top of the global elite’s list of concerns, the World Economic Forum (WEF), said ahead of its annual meeting in Davos, Switzerland.

The growing cyber-dependency of governments and companies, and the associated risks of hacking by criminals or hostile states, has replaced social polarisation as a main threat to stability over the next decade, according to the WEF’s yearly assessment of global risks, published at Bloomberg LP’s new European headquarters in London. 

While the economic outlook has improved, nine in 10 of those surveyed said they expect political or trade clashes between major powers to worsen. Some 80 percent saw an increased chance of war.

“Cybersecurity is the issue most on the minds of boards and executives, given the visibility of state-sponsored attacks in an environment of increasing geopolitical friction,” John Drzik, president of global risk and digital at Marsh, which contributed to the study, said in an interview. As companies “invest in things like artificial intelligence, they are widening their attack surface.”

Drzik said recent high-profile security breaches that have fueled this perception include the WannaCry ransomware attack, which infected more than 300,000 computers across 150 countries, and NotPetya, which caused two companies losses in excess of $300 million. 

The cost of cyber-crime to firms over the next five years could reach $8 trillion, the WEF said. Similarly, thousands of attacks every month on critical infrastructure from European aviation systems to US nuclear power stations show state-sponsored hackers are attempting to “trigger a breakdown in the systems that keep societies functioning,” the WEF said.

Information-Management

You Might Also Read:

UN Cyber Warfare Talks Collapse:

World Economic Forum Says  Cyber-attack Is A Top Risk To Business:

 

 

 

« Companies Are Buying Cyber Insurance 'in mad panic'
Pentagon Considers Nuclear Retaliation To Big Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.