SlideShare a Scribd company logo
1 of 16
The 5 Biggest Cybersecurity
Trends In 2020 Everyone
Should Know About
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Title
Text
IntroductionIntroduction
The vital role that cybersecurity plays in protecting our privacy, rights,
freedoms, and everything up to and including our physical safety will be more
prominent than ever during 2020. More and more of our vital infrastructure is
coming online and vulnerable to digital attacks, data breaches involving the
leak of personal information are becoming more frequent and bigger, and
there’s an increasing awareness of political interference and state-sanctioned
cyberattacks. The importance of cybersecurity is undoubtedly a growing
matter of public concern.
The 5 Biggest Cybersecurity Trends In 2020
Everyone Should Know About
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Title
Text
IntroductionIntroduction
We put our faith in technology to solve many of the problems we are facing,
both on a global and personal scale. From smartphones and AI personal
assistants to space travel, curing cancer, and tackling climate change. But as
the world becomes increasingly connected, the opportunities for bad guys to
take advantage for profit or political ends inevitably increases.
Here’s what will be top of the agenda when it comes to cybersecurity over the
coming year:
The 5 Biggest Cybersecurity Trends In 2020
Everyone Should Know About
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Artificial intelligence (AI) will play
an increasing role in both cyber-attack
and defense
AI is the new arms race, but unlike earlier arms races, anyone can get involved – there’s no
need for the sort of resources that were previously only available to governments.
This means that while AI is undoubtedly being researched and developed as a means of
crippling an enemy state’s civil and defense infrastructure during war, it’s also easily
deployable by criminal gangs and terrorist organizations.
So rather than between nations, today’s race is between hackers, crackers, phishers and
data thieves, and the experts in cybersecurity whose job it is to tackle those threats before
they cause us harm. Just as AI can “learn” to spot patterns of coincidence or behavior that
can signal an attempted attack, it can learn to adapt in order to disguise the same
behavior and trick its way past our defenses.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Artificial intelligence (AI) will play
an increasing role in both cyber-attack
and defense
This parallel development of offensive and defensive capabilities will become an
increasingly present theme as AI systems become more complex and, importantly, more
available and simpler to deploy. Everything from spam email attempts to trick us into
revealing our credit card details to denial-of-service attacks designed to disable critical
infrastructure will grow in frequency and sophistication. On the other hand, the tech
available to help us avoid falling victim, such as deep learning security algorithms,
automation of systems that are vulnerable to human error, and biometric identity
protection, are getting better too.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Political and economic divisions
between east and west lead to increased security
threats
As it appears to most people, the internet and the online world is an international entity –
relatively free of borders or restriction on the free movement of information and ideas. It’s
been built that way because its architects understand the importance of international
cooperation when it comes to accessing talent and resources. But that’s really all just an
illusion. The corporations, networks, and associations which provide the infrastructure
behind the scenes are legal entities obliged to comply with national laws and regulations.
With no end in sight to the “trade war” between the world’s superpowers, talk of
fracturing among international organizations like the UN or EU, and an ongoing tech-
driven arms race among nations that are economic competitors, that illusory veneer is
being stretched thinner and thinner. And that could have very scary consequences.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Political and economic divisions
between east and west lead to increased security
threats
Just a few weeks ago, Russia announced that it had tested an 'unplugged' internet,
basically a country-wide alternative to the global internet, which could give their
Government control over what citizens can access on the web. Countries like Iran and
China are already censoring content and block access to external information.
In 2019, we also saw the US government effectively embargoing partnerships between US
tech firms and the Chinese mobile giant Huawei, due to fears over the close links between
Huawei and the Chinese state. If more barriers like these go up, it could easily have the
effect of preventing international cooperation on both the technological and regulatory
challenges of cybersecurity, and that’s only likely to benefit the bad guys.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Political interference increasingly common and
increasingly sophisticated
Targeted disinformation campaigns aimed at swaying public opinion have almost become
an accepted feature of democracy today. With a US presidential election coming up in
2020, it seems certain that they will make headlines once again.
So far, cybercrime targeting elections has taken two forms. The first involves the spreading
of “fake news” and false narratives – usually designed to slur a candidate – via social
media. The second is direct attacks against candidates' or digital electoral infrastructure.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Political interference increasingly common and
increasingly sophisticated
Countering the false narratives means building systems, either automated or manual, that
can sift out lies, propaganda, and bad-faith by analyzing both content and metadata –
where the information originates from, and who is likely to have created it. Facebook and
Google have both invested in technology designed to determine whether or not political
messaging fits patterns that suggest it could be part of a targeted “fake news” campaigns.
This is because of the overwhelming evidence that these tactics are being increasingly
adopted by state actors with the aim of causing political unrest. The Chinese government
has been suspected of attempting to push a pro-China narrative around elections in
Taiwan and civil protests in Hong Kong using fake social media accounts, and candidates’
private emails were hacked and released in both the 2016 US elections and the 2017
French elections.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Political interference increasingly common and
increasingly sophisticated
Both forms of digital electoral interference are likely to become a growing problem over
the next 12 months, partly due to the fact that they have proven to be highly effective up
until now. Consequently, we can expect more investment in technology designed to
counter them, as well as efforts to raise public awareness of the issue.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
The cybersecurity skills gap
continues to grow
During 2020, research suggests the number of unfilled cybersecurity jobs will increase
from just 1 million in 2014 to 3.5 million. This deficit of skills is likely to become a growing
matter of public concern during the early part of this new decade.
The threats we face in cyberspace today, from thieves attempting to clone identities to
carry out fraud, to political disinformation campaigns designed to alter the course of
democracies, will only become more intense unless there are sufficient people with the
skills to counter them coming through the pipeline. Without investing in training existing
staff on how to prevent or mitigate cyberattacks in their field, as well as hiring experts with
the skills to spot new threats on the horizon, industry stands to lose hundreds of millions
of dollars. The current average cost incurred by a company in the US that suffers a data
breach stands at $8.19 million. Amongst organizations that have implemented fully
automated cybersecurity defenses, that cost drops to $2.6 million. Of course,
implementing these mature defenses requires access to a skilled, experienced
cybersecurity workforce – something that is likely to increasingly become a challenge in
coming years.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Vehicle hacking and data theft increases
Even before we get into the subject of self-driving cars, vehicles today are basically
moving data factories. Modern cars are fitted with an array of GPS devices, sensors, and
in-car communication and entertainment platforms that make them an increasingly
profitable target for hackers and data thieves.
Criminals have learned to piggyback into private networks through connected home
appliances and smart devices, thanks to the lack of security standards among the
thousands of device manufacturers and service providers. Likewise, the automobile is likely
to increasingly become the backdoor of choice in the coming years thanks to the growing
amount of data they collect and store about our day-to-day lives. Attackers will have the
choice of targeting either the vehicles themselves, perhaps using them to access email
accounts and then personal information, or the cloud services where our data is routinely
sent for storage and analysis. Large scale harvesting and resale of this data on the black
market is highly lucrative for cybercriminals.
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Vehicle hacking and data theft increases
Another very real danger is that malicious actors could learn to compromise the digital
controls and safety features of modern vehicles. The idea of hijacking autonomous cars
and taking over their controls may seem far-fetched right now, but it’s a threat that’s
being taken seriously by the automotive industry as well as lawmakers. During 2020, we’re
likely to see more debate over this aspect of the safety of self-driving vehicles, as the
regulatory framework that will allow them to operate on our roads continues to take
shape.
For more on this topic, have a look at my conversation with cybersecurity expert Professor
Kevin Curran, in which we discuss the biggest cybersecurity challenges and how to tackle
them.
© 2017 Bernard Marr , Bernard Marr & Co. All rights reserved
© 2018 Bernard Marr, Bernard Marr & Co. All rights reserved
Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a
strategic business & technology advisor to governments and companies. He helps
organisations improve their business performance, use data more intelligently, and
understand the implications of new technologies such as artificial intelligence, big data,
blockchains, and the Internet of Things.
LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is a frequent
contributor to the World Economic Forum and writes a regular column for Forbes. Every day
Bernard actively engages his 1.5 million social media followers and shares content that
reaches millions of readers.
Visit The
Website
© 2017 Bernard Marr , Bernard Marr & Co. All rights reserved
© 2019 Bernard Marr, Bernard Marr & Co. All rights reserved
Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a
strategic business & technology advisor to governments and companies. He helps
organisations improve their business performance, use data more intelligently, and
understand the implications of new technologies such as artificial intelligence, big data,
blockchains, and the Internet of Things.
LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is a frequent
contributor to the World Economic Forum and writes a regular column for Forbes. Every day
Bernard actively engages his 1.5 million social media followers and shares content that
reaches millions of readers.
Visit The
Website
Title
Subtitle
Be the FIRST to receive news,
articles, insights and event
updates from Bernard Marr & Co
straight to your inbox.
Signing up is EASY! Simply fill out
the online form and we’ll be in
touch!
© 2018 Bernard Marr, Bernard Marr & Co. All rights reserved
BernardMarr
hello@bernardmarr.com
www.bernardmarr.com

More Related Content

What's hot

Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlookBloomberg LP
 
Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for SmartgridGruene-it.org
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013IMC Institute
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Andrea Mennillo
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020Bernard Marr
 

What's hot (20)

Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Security economics
Security economicsSecurity economics
Security economics
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlook
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
 

Similar to The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About

The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023Bernard Marr
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCigniti Technologies Ltd
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019BluePayProcessing
 
The 4 Top Artificial Intelligence Trends For 2021
The 4 Top Artificial Intelligence Trends For 2021The 4 Top Artificial Intelligence Trends For 2021
The 4 Top Artificial Intelligence Trends For 2021Bernard Marr
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 

Similar to The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About (20)

Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
The 4 Top Artificial Intelligence Trends For 2021
The 4 Top Artificial Intelligence Trends For 2021The 4 Top Artificial Intelligence Trends For 2021
The 4 Top Artificial Intelligence Trends For 2021
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 

More from Bernard Marr

The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023Bernard Marr
 
How To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessHow To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessBernard Marr
 
The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023Bernard Marr
 
The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023Bernard Marr
 
Policing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening NowPolicing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening NowBernard Marr
 
Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services Bernard Marr
 
The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023Bernard Marr
 
Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Bernard Marr
 
The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023Bernard Marr
 
How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023Bernard Marr
 
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence? Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence? Bernard Marr
 
The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023Bernard Marr
 
The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023Bernard Marr
 
12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work 12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work Bernard Marr
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerBernard Marr
 
How AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareHow AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareBernard Marr
 
Top 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of WorkTop 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of WorkBernard Marr
 
Artificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of MarketingArtificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of MarketingBernard Marr
 
Is AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoIs AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoBernard Marr
 
Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?Bernard Marr
 

More from Bernard Marr (20)

The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023
 
How To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessHow To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For Business
 
The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023
 
The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023
 
Policing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening NowPolicing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening Now
 
Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services
 
The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023
 
Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?
 
The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023
 
How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023
 
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence? Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
 
The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023
 
The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023
 
12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work 12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your Career
 
How AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareHow AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of Healthcare
 
Top 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of WorkTop 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of Work
 
Artificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of MarketingArtificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of Marketing
 
Is AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoIs AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say No
 
Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About

  • 1. The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
  • 2. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Title Text IntroductionIntroduction The vital role that cybersecurity plays in protecting our privacy, rights, freedoms, and everything up to and including our physical safety will be more prominent than ever during 2020. More and more of our vital infrastructure is coming online and vulnerable to digital attacks, data breaches involving the leak of personal information are becoming more frequent and bigger, and there’s an increasing awareness of political interference and state-sanctioned cyberattacks. The importance of cybersecurity is undoubtedly a growing matter of public concern. The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
  • 3. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Title Text IntroductionIntroduction We put our faith in technology to solve many of the problems we are facing, both on a global and personal scale. From smartphones and AI personal assistants to space travel, curing cancer, and tackling climate change. But as the world becomes increasingly connected, the opportunities for bad guys to take advantage for profit or political ends inevitably increases. Here’s what will be top of the agenda when it comes to cybersecurity over the coming year: The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
  • 4. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Artificial intelligence (AI) will play an increasing role in both cyber-attack and defense AI is the new arms race, but unlike earlier arms races, anyone can get involved – there’s no need for the sort of resources that were previously only available to governments. This means that while AI is undoubtedly being researched and developed as a means of crippling an enemy state’s civil and defense infrastructure during war, it’s also easily deployable by criminal gangs and terrorist organizations. So rather than between nations, today’s race is between hackers, crackers, phishers and data thieves, and the experts in cybersecurity whose job it is to tackle those threats before they cause us harm. Just as AI can “learn” to spot patterns of coincidence or behavior that can signal an attempted attack, it can learn to adapt in order to disguise the same behavior and trick its way past our defenses.
  • 5. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Artificial intelligence (AI) will play an increasing role in both cyber-attack and defense This parallel development of offensive and defensive capabilities will become an increasingly present theme as AI systems become more complex and, importantly, more available and simpler to deploy. Everything from spam email attempts to trick us into revealing our credit card details to denial-of-service attacks designed to disable critical infrastructure will grow in frequency and sophistication. On the other hand, the tech available to help us avoid falling victim, such as deep learning security algorithms, automation of systems that are vulnerable to human error, and biometric identity protection, are getting better too.
  • 6. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Political and economic divisions between east and west lead to increased security threats As it appears to most people, the internet and the online world is an international entity – relatively free of borders or restriction on the free movement of information and ideas. It’s been built that way because its architects understand the importance of international cooperation when it comes to accessing talent and resources. But that’s really all just an illusion. The corporations, networks, and associations which provide the infrastructure behind the scenes are legal entities obliged to comply with national laws and regulations. With no end in sight to the “trade war” between the world’s superpowers, talk of fracturing among international organizations like the UN or EU, and an ongoing tech- driven arms race among nations that are economic competitors, that illusory veneer is being stretched thinner and thinner. And that could have very scary consequences.
  • 7. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Political and economic divisions between east and west lead to increased security threats Just a few weeks ago, Russia announced that it had tested an 'unplugged' internet, basically a country-wide alternative to the global internet, which could give their Government control over what citizens can access on the web. Countries like Iran and China are already censoring content and block access to external information. In 2019, we also saw the US government effectively embargoing partnerships between US tech firms and the Chinese mobile giant Huawei, due to fears over the close links between Huawei and the Chinese state. If more barriers like these go up, it could easily have the effect of preventing international cooperation on both the technological and regulatory challenges of cybersecurity, and that’s only likely to benefit the bad guys.
  • 8. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Political interference increasingly common and increasingly sophisticated Targeted disinformation campaigns aimed at swaying public opinion have almost become an accepted feature of democracy today. With a US presidential election coming up in 2020, it seems certain that they will make headlines once again. So far, cybercrime targeting elections has taken two forms. The first involves the spreading of “fake news” and false narratives – usually designed to slur a candidate – via social media. The second is direct attacks against candidates' or digital electoral infrastructure.
  • 9. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Political interference increasingly common and increasingly sophisticated Countering the false narratives means building systems, either automated or manual, that can sift out lies, propaganda, and bad-faith by analyzing both content and metadata – where the information originates from, and who is likely to have created it. Facebook and Google have both invested in technology designed to determine whether or not political messaging fits patterns that suggest it could be part of a targeted “fake news” campaigns. This is because of the overwhelming evidence that these tactics are being increasingly adopted by state actors with the aim of causing political unrest. The Chinese government has been suspected of attempting to push a pro-China narrative around elections in Taiwan and civil protests in Hong Kong using fake social media accounts, and candidates’ private emails were hacked and released in both the 2016 US elections and the 2017 French elections.
  • 10. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Political interference increasingly common and increasingly sophisticated Both forms of digital electoral interference are likely to become a growing problem over the next 12 months, partly due to the fact that they have proven to be highly effective up until now. Consequently, we can expect more investment in technology designed to counter them, as well as efforts to raise public awareness of the issue.
  • 11. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved The cybersecurity skills gap continues to grow During 2020, research suggests the number of unfilled cybersecurity jobs will increase from just 1 million in 2014 to 3.5 million. This deficit of skills is likely to become a growing matter of public concern during the early part of this new decade. The threats we face in cyberspace today, from thieves attempting to clone identities to carry out fraud, to political disinformation campaigns designed to alter the course of democracies, will only become more intense unless there are sufficient people with the skills to counter them coming through the pipeline. Without investing in training existing staff on how to prevent or mitigate cyberattacks in their field, as well as hiring experts with the skills to spot new threats on the horizon, industry stands to lose hundreds of millions of dollars. The current average cost incurred by a company in the US that suffers a data breach stands at $8.19 million. Amongst organizations that have implemented fully automated cybersecurity defenses, that cost drops to $2.6 million. Of course, implementing these mature defenses requires access to a skilled, experienced cybersecurity workforce – something that is likely to increasingly become a challenge in coming years.
  • 12. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Vehicle hacking and data theft increases Even before we get into the subject of self-driving cars, vehicles today are basically moving data factories. Modern cars are fitted with an array of GPS devices, sensors, and in-car communication and entertainment platforms that make them an increasingly profitable target for hackers and data thieves. Criminals have learned to piggyback into private networks through connected home appliances and smart devices, thanks to the lack of security standards among the thousands of device manufacturers and service providers. Likewise, the automobile is likely to increasingly become the backdoor of choice in the coming years thanks to the growing amount of data they collect and store about our day-to-day lives. Attackers will have the choice of targeting either the vehicles themselves, perhaps using them to access email accounts and then personal information, or the cloud services where our data is routinely sent for storage and analysis. Large scale harvesting and resale of this data on the black market is highly lucrative for cybercriminals.
  • 13. © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Vehicle hacking and data theft increases Another very real danger is that malicious actors could learn to compromise the digital controls and safety features of modern vehicles. The idea of hijacking autonomous cars and taking over their controls may seem far-fetched right now, but it’s a threat that’s being taken seriously by the automotive industry as well as lawmakers. During 2020, we’re likely to see more debate over this aspect of the safety of self-driving vehicles, as the regulatory framework that will allow them to operate on our roads continues to take shape. For more on this topic, have a look at my conversation with cybersecurity expert Professor Kevin Curran, in which we discuss the biggest cybersecurity challenges and how to tackle them.
  • 14. © 2017 Bernard Marr , Bernard Marr & Co. All rights reserved © 2018 Bernard Marr, Bernard Marr & Co. All rights reserved Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a strategic business & technology advisor to governments and companies. He helps organisations improve their business performance, use data more intelligently, and understand the implications of new technologies such as artificial intelligence, big data, blockchains, and the Internet of Things. LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is a frequent contributor to the World Economic Forum and writes a regular column for Forbes. Every day Bernard actively engages his 1.5 million social media followers and shares content that reaches millions of readers. Visit The Website © 2017 Bernard Marr , Bernard Marr & Co. All rights reserved © 2019 Bernard Marr, Bernard Marr & Co. All rights reserved Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a strategic business & technology advisor to governments and companies. He helps organisations improve their business performance, use data more intelligently, and understand the implications of new technologies such as artificial intelligence, big data, blockchains, and the Internet of Things. LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is a frequent contributor to the World Economic Forum and writes a regular column for Forbes. Every day Bernard actively engages his 1.5 million social media followers and shares content that reaches millions of readers. Visit The Website
  • 15. Title Subtitle Be the FIRST to receive news, articles, insights and event updates from Bernard Marr & Co straight to your inbox. Signing up is EASY! Simply fill out the online form and we’ll be in touch! © 2018 Bernard Marr, Bernard Marr & Co. All rights reserved