SlideShare a Scribd company logo
1 of 18
THREAT HORIZON 2017
Dangers accelerate
• Annual report
• Identifies information security threat trends over next 2 years
• Links threat trends to business impact
WHAT IS THREAT HORIZON?
METHODOLOGY
Regular and increasingly large disruptions will impact the social, political and
economic foundations of the internet, all underpinned by faster connectivity
and new users.
THEME 1
DISRUPTION DIVIDES AND CONQUERS
Gigabit connectivity will offer new possibilities for everyone including criminals.
Impact: Increased exposure to attacks and disruption to critical business
systems.
Threat 1.1
Supercharged connectivity overwhelms defences
Organised crime will migrate online, developing complex internal hierarchies
and commoditising their activities at a global level. Impact: Law enforcement
and infosec struggle to keep pace, resulting in business disruption and increased
security budgets.
Threat 1.2
Crime syndicates take a quantum leap
Civil unrest will emerge in response to relentless technology advances that
increase socio-economic inequality. Impact: Disruption, including negative
publicity and brand damage, to organisations caught in the unrest.
Threat 1.3
Tech rejectionists cause chaos
Society is increasingly dependent on digital systems that are highly complex and
often based on trust. This will prove to be an unreliable method of operating
systems that are integral to the global economy.
THEME 2
COMPLEXITY CONCEALS FRAGILITY
Following several large cascading failures (e.g. to energy grid or GPS) hidden
dependencies on digitally connected critical infrastructure will become
transparent. Impact: Delayed production and deliveries. Reputational damage
and loss of customers.
Threat 2.1
Dependence on critical infrastructure becomes dangerous
Targeted exploitation of widely distributed and homogenous technologies will
occur frequently and have implications for the normal functioning of the
Internet and wider global economy. Impact: Loss of business-critical
information. Reduced or unavailable customer service.
Threat 2.2
Systemic vulnerabilities are weaponised
Digital connectivity inside and between organisations grows, exposing legacy
technology to attackers and a greater likelihood of accidents. Impact: Inability to
maintain consistent service delivery. Steep costs for maintenance expertise and
technology transformation programmes.
Threat 2.3
Legacy technology crumbles
Disruption to cyber-physical systems (i.e. systems that have direct physical
impact) will lead to verifiable human deaths. Impact: Loss of life. Loss of
customer trust. Legal liabilities increase dramatically. Safety regulations bring
new costs.
Threat 2.4
Death from disruption to digital systems
Large information providers will continue to expand into emerging markets,
solidifying their global ambitions and frustrating government attempts at
regulation. Companies will become complacent about dealing with data
breaches, and poorly conceived regulations will be enforced selectively.
THEME 3
COMPLACENCY BITES BACK
Major information companies such as Google, Amazon, Facebook and Apple will
grow their global market share, raising concerns about competition and anti-
trust law. Impact: Lack of commercial competition. Regulators struggle to keep
pace, neither enforcing fair competition nor delivering optimal prices to
consumers.
Threat 3.1
Global consolidation endangers competition and security
The number of data breaches will grow along with the volume of compromised
records, becoming far more expensive for organisations of all sizes. Impact:
Customer impact and delay as liabilities are unravelled in court. Reputational
damage. Unforeseen costs from expensive and lengthy remediation.
Threat 3.2
Impact of data breaches increases dramatically
1. Disruption divides and conquers
1.1. Supercharged connectivity overwhelms defences
1.2. Crime syndicates take a quantum leap
1.3. Tech rejectionists cause chaos
2. Complexity conceals fragility
2.1. Dependence on critical infrastructure becomes dangerous
2.2. Systemic vulnerabilities are weaponised
2.3. Legacy technology crumbles
2.4. Death from disruption to digital services
3. Complacency bites back
3.1. Global consolidation endangers competition and security
3.2. Impact of data breaches increases dramatically
Download Threat Horizon 2017
Join Threat Horizon group on ISF Live to continue discussion
Give us feedback on how to improve the report
What next?
Thank you

More Related Content

What's hot

Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Luis Veras Landron
 

What's hot (20)

7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity experts7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity experts
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
CBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to KnowCBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to Know
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 

Viewers also liked

Viewers also liked (10)

Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
FireEye
FireEyeFireEye
FireEye
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 

Similar to Threat horizon 2017 by isf forum

What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
HateMe9
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
ssuserc1c354
 

Similar to Threat horizon 2017 by isf forum (20)

Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
From One Crisis to the Next: Supply Chain Issues and Climate Change
From One Crisis to the Next: Supply Chain Issues and Climate ChangeFrom One Crisis to the Next: Supply Chain Issues and Climate Change
From One Crisis to the Next: Supply Chain Issues and Climate Change
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
L479096.pdf
L479096.pdfL479096.pdf
L479096.pdf
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Ch&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserCh&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - Teaser
 
CH&Cie Cyber Security - CIB - Teaser
CH&Cie Cyber Security - CIB - TeaserCH&Cie Cyber Security - CIB - Teaser
CH&Cie Cyber Security - CIB - Teaser
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Threat horizon 2017 by isf forum

  • 2. • Annual report • Identifies information security threat trends over next 2 years • Links threat trends to business impact WHAT IS THREAT HORIZON?
  • 4. Regular and increasingly large disruptions will impact the social, political and economic foundations of the internet, all underpinned by faster connectivity and new users. THEME 1 DISRUPTION DIVIDES AND CONQUERS
  • 5. Gigabit connectivity will offer new possibilities for everyone including criminals. Impact: Increased exposure to attacks and disruption to critical business systems. Threat 1.1 Supercharged connectivity overwhelms defences
  • 6. Organised crime will migrate online, developing complex internal hierarchies and commoditising their activities at a global level. Impact: Law enforcement and infosec struggle to keep pace, resulting in business disruption and increased security budgets. Threat 1.2 Crime syndicates take a quantum leap
  • 7. Civil unrest will emerge in response to relentless technology advances that increase socio-economic inequality. Impact: Disruption, including negative publicity and brand damage, to organisations caught in the unrest. Threat 1.3 Tech rejectionists cause chaos
  • 8. Society is increasingly dependent on digital systems that are highly complex and often based on trust. This will prove to be an unreliable method of operating systems that are integral to the global economy. THEME 2 COMPLEXITY CONCEALS FRAGILITY
  • 9. Following several large cascading failures (e.g. to energy grid or GPS) hidden dependencies on digitally connected critical infrastructure will become transparent. Impact: Delayed production and deliveries. Reputational damage and loss of customers. Threat 2.1 Dependence on critical infrastructure becomes dangerous
  • 10. Targeted exploitation of widely distributed and homogenous technologies will occur frequently and have implications for the normal functioning of the Internet and wider global economy. Impact: Loss of business-critical information. Reduced or unavailable customer service. Threat 2.2 Systemic vulnerabilities are weaponised
  • 11. Digital connectivity inside and between organisations grows, exposing legacy technology to attackers and a greater likelihood of accidents. Impact: Inability to maintain consistent service delivery. Steep costs for maintenance expertise and technology transformation programmes. Threat 2.3 Legacy technology crumbles
  • 12. Disruption to cyber-physical systems (i.e. systems that have direct physical impact) will lead to verifiable human deaths. Impact: Loss of life. Loss of customer trust. Legal liabilities increase dramatically. Safety regulations bring new costs. Threat 2.4 Death from disruption to digital systems
  • 13. Large information providers will continue to expand into emerging markets, solidifying their global ambitions and frustrating government attempts at regulation. Companies will become complacent about dealing with data breaches, and poorly conceived regulations will be enforced selectively. THEME 3 COMPLACENCY BITES BACK
  • 14. Major information companies such as Google, Amazon, Facebook and Apple will grow their global market share, raising concerns about competition and anti- trust law. Impact: Lack of commercial competition. Regulators struggle to keep pace, neither enforcing fair competition nor delivering optimal prices to consumers. Threat 3.1 Global consolidation endangers competition and security
  • 15. The number of data breaches will grow along with the volume of compromised records, becoming far more expensive for organisations of all sizes. Impact: Customer impact and delay as liabilities are unravelled in court. Reputational damage. Unforeseen costs from expensive and lengthy remediation. Threat 3.2 Impact of data breaches increases dramatically
  • 16. 1. Disruption divides and conquers 1.1. Supercharged connectivity overwhelms defences 1.2. Crime syndicates take a quantum leap 1.3. Tech rejectionists cause chaos 2. Complexity conceals fragility 2.1. Dependence on critical infrastructure becomes dangerous 2.2. Systemic vulnerabilities are weaponised 2.3. Legacy technology crumbles 2.4. Death from disruption to digital services 3. Complacency bites back 3.1. Global consolidation endangers competition and security 3.2. Impact of data breaches increases dramatically
  • 17. Download Threat Horizon 2017 Join Threat Horizon group on ISF Live to continue discussion Give us feedback on how to improve the report What next?

Editor's Notes

  1. 1