Photo by Markus Spiske on Unsplash

Future Technologies and Cyber Risk

Tooba Durraze
3 min readJun 10, 2021

--

The digital world connects everything and everyone to apps, data, purchases, services, and communication. Securing this world is essential for protecting people, organizations, habitats, infrastructure, and just about everything we value and rely on for health and prosperity — from smarter choices to smart cities. Risks abound, but so do solutions, including those based on artificial intelligence and the “Zero Trust” model. As hazards morph, so must our responses; digital threats demand vigilance, determination, and resolve to react with precision to an ever-expanding cycle of risk.

Explore the top key issues in Cybersecurity on the Strategic Intelligence platform

In order for digital technologies to deliver on their immense promise, evolving cyber vulnerabilities and threats need to be addressed.

Where has this trend had an impact?

  • A software company lost millions in revenue after it fell prey to a malware attack that scrambled computer hard drives, which affected its order receiving and processing systems.
  • Security researchers unveiled vulnerabilities in connected medical devices that can be exploited by hackers remotely to alter vital signs of patients in real time and potentially cause medical staff to make inappropriate critical care decisions.
  • A financial services firm experienced financial losses due to a software glitch in its high-frequency trading algorithm that forced the company to automatically sell overvalued shares back to the market at a lower Where has this trend had an impact?

What does this mean for organizations?

  • Invisibility of cyber risks for digital transformation leaders and other senior executives because cyber risk management is distributed among lower-level IT professionals and technology service providers.
  • Increased complexity in addressing new cyber risk challenges as the adoption of digital technologies, such as IoT and cloud, have increased the attack surface.
  • Greater difficulty in identifying intelligent malware as it learns to mimic normal user behavior to avoid being detected.
  • More instances of impact on physical safety, especially as automated attacks compromise or subvert physical systems, such as home automation systems and even industrial infrastructure.
  • Increased frequency of intelligent attacks on a large scale using AI and automation technologies delivered via the cloud. (Deloitte)

Hackers are already using AI technology to break into organizations. Quantum computing is evolving faster every day. What does this mean for the future of encryption? The proliferation of the internet of things in an age of 5G networks could result in the spread of malware to such an extent that the internet shuts down. How is it possible to prepare for these emerging risks?

Join the conversation

To shed more light on this important topic, we have organized a session with some of the leading experts as a part of the World Economic Forum’s Building Strategic Intelligence series.

This session will highlight the cybersecurity-related challenges associated with the evolving technology landscape. Emerging technologies like artificial intelligence (AI), 5G, quantum computing and digital identity are presenting great opportunities while introducing cybersecurity risks at a systemic level.

You can join by becoming a Digital Member today.

Strategic Intelligence is an online digital platform that helps individuals and organizations decipher the potential impacts of accelerating global complexity, while counteracting the misleading and unreliable information that is circulating. The Strategic Intelligence tool helps you understand the global forces at play and make more informed decisions.

Join the World Economic Forum’s Digital Membership community to monitor these issues and more

To explore Strategic Intelligence, visit intelligence.weforum.org or search Strategic IQ in the iOS, Play or Huawei stores.

For further inquires, please contact intelligence@weforum.org.

--

--