strategical
tactical
homeland
cyber

WEF warns of impending cyber pandemic

WEF experts urged to develop new approaches to risk management associated with the development of next generation technologies.

68.jpg

By 2025, next-generation technologies, such as ubiquitous connectivity, artificial intelligence, quantum computing or new approaches to identity and access management, could overwhelm the defenses and lead to a global cyber pandemic, experts at the World Economic Forum's Cybersecurity Center predict.

“Next generation technologies pose new risks to the world, and their impact is not fully understood at this stage. There is an urgent need for collective action, policy intervention, and improved accountability for government organizations and private enterprises. Without this intervention, it will be difficult to maintain confidence in new technologies, on which the future development of the world depends” says the WEF website.

In this regard, the WEF, together with the Oxford Martin School at the University of Oxford, launched an initiative called Future Series: Cybercrime 2025, the main goal of which is to identify the approaches required to manage cyber risks associated with major technology trends. More than 150 global cybersecurity experts from information security companies, research institutes and other organizations, including Palo Alto Networks, Mastercard, KPMG, Europol, ENISA and NIST, are involved in the program.

“Safety is not seen as an integral part of innovative technologies and, as a result, there is not enough investment in support (knowledge, guidance, research) and incentives (market forces, regulation) for the safe development of new technologies. The existing capabilities and technologies are not suitable for this purpose, therefore, preventing threats and responding to incidents will require new approaches, ”the WEF experts believe.

Among the recommended approaches, the WEF lists reducing the global capacity gap in cybersecurity, creating a workforce, and moving away from fragmented approaches to cybersecurity that lead to interdependencies and confusion of policies and technologies.

All News

Scroll top