SlideShare a Scribd company logo
THREAT HORIZON 2017
Dangers accelerate
• Annual report
• Identifies information security threat trends over next 2 years
• Links threat trends to business impact
WHAT IS THREAT HORIZON?
METHODOLOGY
Regular and increasingly large disruptions will impact the social, political and
economic foundations of the internet, all underpinned by faster connectivity
and new users.
THEME 1
DISRUPTION DIVIDES AND CONQUERS
Gigabit connectivity will offer new possibilities for everyone including criminals.
Impact: Increased exposure to attacks and disruption to critical business
systems.
Threat 1.1
Supercharged connectivity overwhelms defences
Organised crime will migrate online, developing complex internal hierarchies
and commoditising their activities at a global level. Impact: Law enforcement
and infosec struggle to keep pace, resulting in business disruption and increased
security budgets.
Threat 1.2
Crime syndicates take a quantum leap
Civil unrest will emerge in response to relentless technology advances that
increase socio-economic inequality. Impact: Disruption, including negative
publicity and brand damage, to organisations caught in the unrest.
Threat 1.3
Tech rejectionists cause chaos
Society is increasingly dependent on digital systems that are highly complex and
often based on trust. This will prove to be an unreliable method of operating
systems that are integral to the global economy.
THEME 2
COMPLEXITY CONCEALS FRAGILITY
Following several large cascading failures (e.g. to energy grid or GPS) hidden
dependencies on digitally connected critical infrastructure will become
transparent. Impact: Delayed production and deliveries. Reputational damage
and loss of customers.
Threat 2.1
Dependence on critical infrastructure becomes dangerous
Targeted exploitation of widely distributed and homogenous technologies will
occur frequently and have implications for the normal functioning of the
Internet and wider global economy. Impact: Loss of business-critical
information. Reduced or unavailable customer service.
Threat 2.2
Systemic vulnerabilities are weaponised
Digital connectivity inside and between organisations grows, exposing legacy
technology to attackers and a greater likelihood of accidents. Impact: Inability to
maintain consistent service delivery. Steep costs for maintenance expertise and
technology transformation programmes.
Threat 2.3
Legacy technology crumbles
Disruption to cyber-physical systems (i.e. systems that have direct physical
impact) will lead to verifiable human deaths. Impact: Loss of life. Loss of
customer trust. Legal liabilities increase dramatically. Safety regulations bring
new costs.
Threat 2.4
Death from disruption to digital systems
Large information providers will continue to expand into emerging markets,
solidifying their global ambitions and frustrating government attempts at
regulation. Companies will become complacent about dealing with data
breaches, and poorly conceived regulations will be enforced selectively.
THEME 3
COMPLACENCY BITES BACK
Major information companies such as Google, Amazon, Facebook and Apple will
grow their global market share, raising concerns about competition and anti-
trust law. Impact: Lack of commercial competition. Regulators struggle to keep
pace, neither enforcing fair competition nor delivering optimal prices to
consumers.
Threat 3.1
Global consolidation endangers competition and security
The number of data breaches will grow along with the volume of compromised
records, becoming far more expensive for organisations of all sizes. Impact:
Customer impact and delay as liabilities are unravelled in court. Reputational
damage. Unforeseen costs from expensive and lengthy remediation.
Threat 3.2
Impact of data breaches increases dramatically
1. Disruption divides and conquers
1.1. Supercharged connectivity overwhelms defences
1.2. Crime syndicates take a quantum leap
1.3. Tech rejectionists cause chaos
2. Complexity conceals fragility
2.1. Dependence on critical infrastructure becomes dangerous
2.2. Systemic vulnerabilities are weaponised
2.3. Legacy technology crumbles
2.4. Death from disruption to digital services
3. Complacency bites back
3.1. Global consolidation endangers competition and security
3.2. Impact of data breaches increases dramatically
Download Threat Horizon 2017
Join Threat Horizon group on ISF Live to continue discussion
Give us feedback on how to improve the report
What next?
Thank you

More Related Content

What's hot

Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Luis Veras Landron
 

What's hot (20)

7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity experts7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity experts
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)Key Growth Trends of Connected Devices in the Internet of Things (IoT)
Key Growth Trends of Connected Devices in the Internet of Things (IoT)
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
CBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to KnowCBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to Know
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 

Viewers also liked

Viewers also liked (10)

Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
FireEye
FireEyeFireEye
FireEye
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 

Similar to Threat horizon 2017 by isf forum

What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
HateMe9
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
ssuserc1c354
 

Similar to Threat horizon 2017 by isf forum (20)

Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
From One Crisis to the Next: Supply Chain Issues and Climate Change
From One Crisis to the Next: Supply Chain Issues and Climate ChangeFrom One Crisis to the Next: Supply Chain Issues and Climate Change
From One Crisis to the Next: Supply Chain Issues and Climate Change
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
L479096.pdf
L479096.pdfL479096.pdf
L479096.pdf
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Ch&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserCh&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - Teaser
 
CH&Cie Cyber Security - CIB - Teaser
CH&Cie Cyber Security - CIB - TeaserCH&Cie Cyber Security - CIB - Teaser
CH&Cie Cyber Security - CIB - Teaser
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Threat horizon 2017 by isf forum

  • 2. • Annual report • Identifies information security threat trends over next 2 years • Links threat trends to business impact WHAT IS THREAT HORIZON?
  • 4. Regular and increasingly large disruptions will impact the social, political and economic foundations of the internet, all underpinned by faster connectivity and new users. THEME 1 DISRUPTION DIVIDES AND CONQUERS
  • 5. Gigabit connectivity will offer new possibilities for everyone including criminals. Impact: Increased exposure to attacks and disruption to critical business systems. Threat 1.1 Supercharged connectivity overwhelms defences
  • 6. Organised crime will migrate online, developing complex internal hierarchies and commoditising their activities at a global level. Impact: Law enforcement and infosec struggle to keep pace, resulting in business disruption and increased security budgets. Threat 1.2 Crime syndicates take a quantum leap
  • 7. Civil unrest will emerge in response to relentless technology advances that increase socio-economic inequality. Impact: Disruption, including negative publicity and brand damage, to organisations caught in the unrest. Threat 1.3 Tech rejectionists cause chaos
  • 8. Society is increasingly dependent on digital systems that are highly complex and often based on trust. This will prove to be an unreliable method of operating systems that are integral to the global economy. THEME 2 COMPLEXITY CONCEALS FRAGILITY
  • 9. Following several large cascading failures (e.g. to energy grid or GPS) hidden dependencies on digitally connected critical infrastructure will become transparent. Impact: Delayed production and deliveries. Reputational damage and loss of customers. Threat 2.1 Dependence on critical infrastructure becomes dangerous
  • 10. Targeted exploitation of widely distributed and homogenous technologies will occur frequently and have implications for the normal functioning of the Internet and wider global economy. Impact: Loss of business-critical information. Reduced or unavailable customer service. Threat 2.2 Systemic vulnerabilities are weaponised
  • 11. Digital connectivity inside and between organisations grows, exposing legacy technology to attackers and a greater likelihood of accidents. Impact: Inability to maintain consistent service delivery. Steep costs for maintenance expertise and technology transformation programmes. Threat 2.3 Legacy technology crumbles
  • 12. Disruption to cyber-physical systems (i.e. systems that have direct physical impact) will lead to verifiable human deaths. Impact: Loss of life. Loss of customer trust. Legal liabilities increase dramatically. Safety regulations bring new costs. Threat 2.4 Death from disruption to digital systems
  • 13. Large information providers will continue to expand into emerging markets, solidifying their global ambitions and frustrating government attempts at regulation. Companies will become complacent about dealing with data breaches, and poorly conceived regulations will be enforced selectively. THEME 3 COMPLACENCY BITES BACK
  • 14. Major information companies such as Google, Amazon, Facebook and Apple will grow their global market share, raising concerns about competition and anti- trust law. Impact: Lack of commercial competition. Regulators struggle to keep pace, neither enforcing fair competition nor delivering optimal prices to consumers. Threat 3.1 Global consolidation endangers competition and security
  • 15. The number of data breaches will grow along with the volume of compromised records, becoming far more expensive for organisations of all sizes. Impact: Customer impact and delay as liabilities are unravelled in court. Reputational damage. Unforeseen costs from expensive and lengthy remediation. Threat 3.2 Impact of data breaches increases dramatically
  • 16. 1. Disruption divides and conquers 1.1. Supercharged connectivity overwhelms defences 1.2. Crime syndicates take a quantum leap 1.3. Tech rejectionists cause chaos 2. Complexity conceals fragility 2.1. Dependence on critical infrastructure becomes dangerous 2.2. Systemic vulnerabilities are weaponised 2.3. Legacy technology crumbles 2.4. Death from disruption to digital services 3. Complacency bites back 3.1. Global consolidation endangers competition and security 3.2. Impact of data breaches increases dramatically
  • 17. Download Threat Horizon 2017 Join Threat Horizon group on ISF Live to continue discussion Give us feedback on how to improve the report What next?

Editor's Notes

  1. 1