Technology is evolving at a rapid pace, so are threat actors as they continue to find new ways to infiltrate their targets. IoT, 5G, cloud and others will be at the forefront of cybersecurity in the next decade.
2. As Weak as its Weakest Links:
The Internet of Things
“The Internet of Things (IoT)
will continue to evolve and
create complex ecosystems
that are challenging from a
cybersecurity standpoint, as
the weakest links and new
unearthed vulnerabilities will
prove to be a continuous
threat to the IoT
environment”.
Further concerns:
- Liability re. obsolete
infrastructure?
- Liability re. malfunction
because of integrated
environment?
Guillherme Peterson,
GPetrium
3. As Weak as its Weakest Links:
Company Resources
“It will no longer be enough to
not be on the list of companies
that have faced a cybersecurity
breach that year, as investors
and analysts will begin pricing
cybersecurity risk into the
market.”
“To decrease cybersecurity
risks, companies will need to
embark in a cultural and
strategic transformation to
drive measurable
cybersecurity improvements”.
4. Cybersecurity and Individuals:
Comfort Technologies
“Executives will need to balance potential reputational
damage followed by a security breach with customer
demand for such products and proactive spending on
R&D to make such products safer.”
Brenda Gonzales, GPetrium
5. Cybersecurity and Individuals:
“The private sector will continue
to realize that they are not able
to fight certain types of cyber
threats alone. This will lead to a
partial shift in the mindset of
certain organizations, leading to
increased cooperation, albeit at
an arm’s length, with the public
sector.” Guillherme Peterson,
GPetrium
Public & Private Connections
6. Cybersecurity and Individuals:
“Cybersecurity thefts will propel the
creation of new business
adversaries causing drastic impacts
to the competitiveness. Major
business losses will follow, leading
to some business failure and
workforce displacement”.
Workforce Displacement
Brenda Gonzales,
GPetrium
7. Cybersecurity and Government:
Social Credits
“The interest in creating an
environment with stronger
data privacy will grow in
some countries, but it will be
hampered by the global trend
on social credit and its cost-
benefit analysis”.
Guillherme Peterson,
GPetrium
8. Cybersecurity and Government:
Regulatory Compliance
“AI and Machine
Learning cyber
security solutions will
go head-to-head
against governmental
regulations,
increasing regulatory
compliance scrutiny
at all organizational
sizes.” Brenda Gonzales,
GPetrium
9. Cybersecurity and Government:
National Security
“Expect the infiltration of
adversaries into public and
private institutions to
continue. A combination of
data breach, social
engineering, blackmailing and
perceived socio and economic
movements in society will be
used as tools.” Guillherme Peterson,
GPetrium
10. Cybersecurity and Individuals:
“The actions of society coupled with
governmental reinforcement of its
beliefs will be a major driver as to
whether private organizations will
hide a cyber breach, increase/
decrease cybersecurity budget and
work with peers to decrease
potential risks.”
Political Stability
Brenda Gonzales,
GPetrium
11. Cybersecurity and Businesses:
Organizational Reputation
“Cybersecurity breaches will
continue to stain the
reputation of organizations
around the world. According to
Comparitech, publicly traded
companies that have been
through a cyber breach have
on average underperformed in
the NASDAQ.” Guillherme Peterson,
GPetrium
12. Cybersecurity and Infrastructure:
5G’n Their Way Out
“5G will allow for increased
connectivity, larger numbers of devices,
more capable IoT and more. This will
power a boom for technological
innovation, however, in cybersecurity
terms, all the items listed above are
simply an exponential increase in threat
vectors raising the alarms in
cybersecurity departments.”
Guilherme Peterson,
GPetrium
13. Cybersecurity and Infrastructure:
Explainability
“A lack of AI and Machine
learning explainability towards
cybersecurity processes and
decisions will raise red flags at
all levels of society. Demand
for increased transparency
over its actions and decisions
will affect future software
development.” Brenda Gonzales,
GPetrium
14. Cybersecurity and Infrastructure:
Quantum Leap
“Although, without a doubt there
will continue to be challenges to
build a fully functioning quantum
computing apparatus, one thing
is clear: when fully functional,
quantum computing will have a
profound change in the very
fabric of technology and
computing.” Brenda Gonzales,
GPetrium
15. Cybercrime:
Cerberus of Data Leakage
“For every breach, the
potential for damage by
cybercriminals compounds.”
“Interference in the 2016
United States election will
prove to have been just the
prototype to much larger scale
interferences in the public and
private sectors.”
Guilherme Peterson,
GPetrium
16. Cybercrime:
The Rise of Cyber Militias
Cyber militias, a group who is
willing and able to conduct
cyber-attacks for the benefit or
interest of a larger organization,
will gain prominence and
continue to grow at a fast pace,
spreading to a larger portion of
the cyber environment.
Guillherme Peterson,
GPetrium
17. Cybercrime:
Defensive Attacks
“More actors both in the
private and public sector will
look for new, innovative ways
to use an attack to their assets
as an opportunity to infiltrate
the attacker.” Brenda Gonzales,
GPetrium
19. Cybercrime:
Bug Hunters Become Hunted
“Sophisticated and well
financed threat actors will
advance their attacks on bug
hunting prize providers and
bug hunters to gain insight on
the most prolific bug hunters.”
Brenda Gonzales,
GPetrium
20. Cybercrime:
Oil Leak or Cloud Leak?
“There will be a heightened interest
for sophisticated actors to infiltrate
cloud providers and its suppliers to
gain direct access to data. Issues
with improper installation and
management of cloud services will
continue to be a major
cybersecurity challenge to many
cloud users.”
Guilherme Peterson,
GPetrium
21. Cybercrime:
Physical Safety
“A single or a few major
incidents associated with data
breach and advanced malicious
attacks with clear physical
implications will be a catalyst
that pushes certain
governments towards policies
that are considered to be
unacceptable in today’s
environment.”Brenda Gonzales,
GPetrium
22. Cybercrime:
Bio-Cyberhacking
“As individuals begin using technology in
their bodies for treatment, monitoring of
diseases, enhancements and more,
concerns over a malicious actor’s ability
to infiltrate such technology and lead to
physical harm will increase
exponentially.” Guilherme Peterson,
GPetrium
23. Cybercrime:
Deepfake and Cybersecurity
“The evolution of deepfake and its
derivatives will continue and, with that, it
will be used for new, more advanced
malicious attacks. Deepfake will likely be
used as a way to extort and blackmail
individuals, families and organizations.”
Brenda Gonzales,
GPetrium
25. Terms of Use
In no way shall GPetrium be liable to you or any involved parties, for any damage or cost due
directly, indirectly, incidental or consequential led by the use or inability to use the tools or solutions. The
individual or organization using the tools or solutions are to take ownership of all risks and responsibilities
associated with the tools or solutions.
The documents, text, tools, insights, solutions, and other articles (the “Documents”) created by
GPetrium.com are considered copyrighted works under Canadian and other foreign copyright laws and
are owned by GPetrium. For a full bibliography of all images used in this document or any other request,
please contact the author(s).
Due to the sensitive nature of the topic, examples have been limited to highly publicized stories.
For those interested in enhancing their cybersecurity capabilities and overall digital strategy, contact the
authors.
GPetrium’s publication do not necessarily represent the views and opinions of its clients.
www.gpetrium.com