SlideShare a Scribd company logo
1 of 17
THE 5 BIGGEST CYBER SECURITY
TRENDS IN 2022
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
THE 5 BIGGEST CYBER SECURITY TRENDS IN
2022
Cyber security is evolving rapidly and is becoming one of today's most
important technology areas. In 2022, we will see many new developments
and advances. Here are some trends that will reshape the cyber security
space over the next year.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
The changed world we’ve found ourselves living in since the global pandemic struck in
2020 has been particularly helpful to cybercriminals. Nothing illustrates this so well as the
SolarWinds hack, described by Microsoft president Brad Smith as the most sophisticated
cyberattack of all time, the reverberations of which have been felt throughout 2021.
Homeworking, the ongoing digitization of society, and the increasingly online nature of our
lives mean opportunities about for phishers, hackers, scammers, and extortionists. As we
head into 2022, there is, unfortunately, no sign of this letting up. This is why it's essential
for individuals and businesses to be aware of the ever-growing avenues of attack as well as
what can be done to mitigate the risks!
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
So let’s take a look at the most important and significant trends affecting our
online security in the next year and beyond while throwing in some practical
steps we can all take to avoid becoming victims:
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
TREND 1: AI-POWERED CYBERSECURITY
Similar to the way in which it is used in financial services for fraud detection,
artificial intelligence (AI) can counteract cybercrime by identifying patterns of
behavior that signify something out-of-the-ordinary may be taking place.
Crucially, AI means this can be done in systems that need to cope with
thousands of events taking place every second, which is typically where
cybercriminals will try to strike.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
It's the predictive powers of AI that make it so useful here, which is why more and more
companies will be investing in these solutions as we go into 2022. Unfortunately,
cybercriminals are also aware of the benefits of AI, and new threats are emerging that use
technologies like machine learning to evade the protective measures of cybersecurity. This
makes AI even more essential – as it’s the only hope of counteracting AI-powered cyber-
attacks!
Research by Capgemini recently found two-thirds of businesses now believe AI is necessary
to identifying and countering critical cybersecurity threats, and nearly three-quarters of
businesses are using or testing AI for this purpose.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
TREND 2: THE GROWING THREAT OF RANSOMWARE
According to the UK National Cyber Security Centre, there were three times as many
ransomware attacks in the first quarter of 2021 as there were in the whole of 2019. And
research by PwC suggests that 61% of technology executives expect this to increase in
2022. Once again, we can largely blame this on the pandemic, and the growth in the
amount of activity carried out online and in digital environments.
Ransomware typically involves infecting devices with a virus that locks files away behind
unbreakable cryptography and threatens to destroy them unless a ransom is paid, usually
in the form of untraceable cryptocurrency. Alternatively, the software virus may threaten
to publish the data publicly, leaving the organization liable to enormous fines.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Ransomware is typically deployed through phishing attacks – where employees of an
organization are tricked into providing details or clicking a link that downloads the
ransomware software (sometimes called malware) onto a computer. However, more
recently, a direct infection via USB devices by people who have physical access to machines
is becoming increasingly common. Worryingly there has been an increase in these types of
attacks targeting critical infrastructure, including one at a water treatment facility that briefly
managed to alter the chemical operations of the facility in a way that could endanger lives.
Other ransomware attacks have targeted gas pipelines and hospitals.
Education is the most effective method of tackling this threat, with research showing that
employees who are aware of the dangers of this type of attack are eight times less likely to
fall victim.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
TREND 3: THE INTERNET OF VULNERABLE THINGS
The number of connected devices – known as the internet of things (IoT) is forecast to
reach 18 billion by 2022. One consequence of this is a hugely increased number of
potential access points for cybercriminals looking to gain access to secure digital systems.
The IoT has long been recognised as a specific threat – attacks that have been identified
in the past include hackers using connected household appliances like fridges and kettles
to get access to networks, and from there go on to access computers or phones where
valuable data could be stored.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
As well as more widespread, in 2022 the IoT is also getting more sophisticated. Many
organizations are now engaged in the development of "digital twins” – comprehensive digital
simulations of entire systems or even businesses. These models are often connected to
operational systems in order to model data gathered by them and may offer a treasure trove of
data and access points to those with nefarious intentions.
In 2022 we will undoubtedly continue to see attacks on IoT devices increase. Edge computing
devices – where data is operated on as close as possible to the point it is collected – as well as
centralized cloud infrastructure is all vulnerable. Once again, education and awareness are two of
the most useful tools when it comes to protecting against these vulnerabilities. Any cybersecurity
strategy should always include a thorough audit of every device that can be connected or given
access to a network and a full understanding of any vulnerabilities it may pose.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
TREND 4: CYBER-SECURITY RISK AND EXPOSURE A KEY
FACTOR IN PARTNERSHIP DECISIONS
Any cybersecurity operation is only as secure as its weakest link, which means
organizations increasingly see every link in a supply chain as a potential
vulnerability. Due to this, businesses will increasingly use cybersecurity resilience
and exposure as a determining factor in choosing who they will partner with.
This is borne out by Gartner's research which predicts that, by 2025, 60% of
organizations with use cybersecurity risk as a "primary determinant” when choosing
who to conduct business with.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
With more legislation following in the wake of the European General Data Protection
Regulation (GDPR), such as the Chinese Personal Information Protection Law and the
Californian Consumer Privacy Act, more organizations are at risk of potentially huge
penalties if they make information security slip-ups. This means every partner that
potentially has access to an organization's data or systems will be rigorously vetted.
Businesses that aren’t able to answer questions about their cybersecurity arrangements or
ratings will increasingly find themselves out in the cold. In fact, Garner predicts that
industry-standard security rating schemes like SecurityScorecard, Black Kite, or UpGuard
will become as important to companies as credit rating agencies.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
TREND 3: REGULATION STARTING TO CATCH UP WITH RISK
For years, cybercriminals have acted with the knowledge that understanding – let alone
policing – of their activities is weak due to the fast-changing nature of technology. With the
cost of cybercrime to global economies set to top $6 trillion in 2021, this isn’t a situation that is
sustainable. According to Security Magazine, 2022 is set to be the year when regulators pull
out the stops in order to get on top of the situation. One consequence of this could be an
expansion of penalties that currently only cover breach and loss to also cover vulnerabilities
and exposure to potential damage. Another may be an increasing number of jurisdictions
passing laws relating to making payments in response to ransomware attacks. We could also
see a growing number of legal obligations handed to Chief Information Security Officers, in
line with the responsibilities of Chief Financial Officers, in an attempt to limit the impact of data
thefts, losses, and breaches on customers.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
While this will inevitably increase the burden of those responsible for information
security in businesses, in the long term, this will only be a good thing. Today, more
than ever, building consumer trust is essential for organizations that want us to
give them the privilege of access to our valuable personal information.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Read more about these and other future trends in my books, Business Trends in
Practice: The 25+ Trends That are Redefining Organizations and Tech Trends In
Practice: The 25 Technologies That Are Driving The 4th Industrial Revolution.
© 2021 Bernard Marr , Bernard Marr & Co. All rights reserved
Bernard Marr is an internationally best-selling author, popular keynote speaker,
futurist, and a strategic business & technology advisor to governments and
companies. He helps organisations improve their business performance, use data
more intelligently, and understand the implications of new technologies such as
artificial intelligence, big data, blockchains, and the Internet of Things.
LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is
a frequent contributor to the World Economic Forum and writes a regular column for
Forbes. Every day Bernard actively engages his 1.5 million social media followers
and shares content that reaches millions of readers.
hello@bernardmarr.com
www.bernardmarr.com

More Related Content

What's hot

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 
Emerging trends in it technology
Emerging trends in it technologyEmerging trends in it technology
Emerging trends in it technology
Chetan Sagar
 

What's hot (20)

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Critical infrastructure
Critical infrastructureCritical infrastructure
Critical infrastructure
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Deception technology for advanced detection
Deception technology for advanced detectionDeception technology for advanced detection
Deception technology for advanced detection
 
Emerging trends in it technology
Emerging trends in it technologyEmerging trends in it technology
Emerging trends in it technology
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Botnet
Botnet Botnet
Botnet
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 

Similar to The Five Biggest Cyber Security Trends In 2022

CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
Krishna N
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 

Similar to The Five Biggest Cyber Security Trends In 2022 (20)

The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 

More from Bernard Marr

More from Bernard Marr (20)

The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023
 
How To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessHow To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For Business
 
The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023
 
The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023
 
Policing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening NowPolicing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening Now
 
Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services
 
The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023
 
Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?
 
The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023
 
How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023
 
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence? Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
 
The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023
 
The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023
 
12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work 12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your Career
 
How AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareHow AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of Healthcare
 
Top 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of WorkTop 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of Work
 
Artificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of MarketingArtificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of Marketing
 
Is AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoIs AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say No
 
Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 

The Five Biggest Cyber Security Trends In 2022

  • 1. THE 5 BIGGEST CYBER SECURITY TRENDS IN 2022
  • 2. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved THE 5 BIGGEST CYBER SECURITY TRENDS IN 2022 Cyber security is evolving rapidly and is becoming one of today's most important technology areas. In 2022, we will see many new developments and advances. Here are some trends that will reshape the cyber security space over the next year.
  • 3. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved The changed world we’ve found ourselves living in since the global pandemic struck in 2020 has been particularly helpful to cybercriminals. Nothing illustrates this so well as the SolarWinds hack, described by Microsoft president Brad Smith as the most sophisticated cyberattack of all time, the reverberations of which have been felt throughout 2021. Homeworking, the ongoing digitization of society, and the increasingly online nature of our lives mean opportunities about for phishers, hackers, scammers, and extortionists. As we head into 2022, there is, unfortunately, no sign of this letting up. This is why it's essential for individuals and businesses to be aware of the ever-growing avenues of attack as well as what can be done to mitigate the risks!
  • 4. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved So let’s take a look at the most important and significant trends affecting our online security in the next year and beyond while throwing in some practical steps we can all take to avoid becoming victims:
  • 5. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved TREND 1: AI-POWERED CYBERSECURITY Similar to the way in which it is used in financial services for fraud detection, artificial intelligence (AI) can counteract cybercrime by identifying patterns of behavior that signify something out-of-the-ordinary may be taking place. Crucially, AI means this can be done in systems that need to cope with thousands of events taking place every second, which is typically where cybercriminals will try to strike.
  • 6. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved It's the predictive powers of AI that make it so useful here, which is why more and more companies will be investing in these solutions as we go into 2022. Unfortunately, cybercriminals are also aware of the benefits of AI, and new threats are emerging that use technologies like machine learning to evade the protective measures of cybersecurity. This makes AI even more essential – as it’s the only hope of counteracting AI-powered cyber- attacks! Research by Capgemini recently found two-thirds of businesses now believe AI is necessary to identifying and countering critical cybersecurity threats, and nearly three-quarters of businesses are using or testing AI for this purpose.
  • 7. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved TREND 2: THE GROWING THREAT OF RANSOMWARE According to the UK National Cyber Security Centre, there were three times as many ransomware attacks in the first quarter of 2021 as there were in the whole of 2019. And research by PwC suggests that 61% of technology executives expect this to increase in 2022. Once again, we can largely blame this on the pandemic, and the growth in the amount of activity carried out online and in digital environments. Ransomware typically involves infecting devices with a virus that locks files away behind unbreakable cryptography and threatens to destroy them unless a ransom is paid, usually in the form of untraceable cryptocurrency. Alternatively, the software virus may threaten to publish the data publicly, leaving the organization liable to enormous fines.
  • 8. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Ransomware is typically deployed through phishing attacks – where employees of an organization are tricked into providing details or clicking a link that downloads the ransomware software (sometimes called malware) onto a computer. However, more recently, a direct infection via USB devices by people who have physical access to machines is becoming increasingly common. Worryingly there has been an increase in these types of attacks targeting critical infrastructure, including one at a water treatment facility that briefly managed to alter the chemical operations of the facility in a way that could endanger lives. Other ransomware attacks have targeted gas pipelines and hospitals. Education is the most effective method of tackling this threat, with research showing that employees who are aware of the dangers of this type of attack are eight times less likely to fall victim.
  • 9. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved TREND 3: THE INTERNET OF VULNERABLE THINGS The number of connected devices – known as the internet of things (IoT) is forecast to reach 18 billion by 2022. One consequence of this is a hugely increased number of potential access points for cybercriminals looking to gain access to secure digital systems. The IoT has long been recognised as a specific threat – attacks that have been identified in the past include hackers using connected household appliances like fridges and kettles to get access to networks, and from there go on to access computers or phones where valuable data could be stored.
  • 10. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved As well as more widespread, in 2022 the IoT is also getting more sophisticated. Many organizations are now engaged in the development of "digital twins” – comprehensive digital simulations of entire systems or even businesses. These models are often connected to operational systems in order to model data gathered by them and may offer a treasure trove of data and access points to those with nefarious intentions. In 2022 we will undoubtedly continue to see attacks on IoT devices increase. Edge computing devices – where data is operated on as close as possible to the point it is collected – as well as centralized cloud infrastructure is all vulnerable. Once again, education and awareness are two of the most useful tools when it comes to protecting against these vulnerabilities. Any cybersecurity strategy should always include a thorough audit of every device that can be connected or given access to a network and a full understanding of any vulnerabilities it may pose.
  • 11. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved TREND 4: CYBER-SECURITY RISK AND EXPOSURE A KEY FACTOR IN PARTNERSHIP DECISIONS Any cybersecurity operation is only as secure as its weakest link, which means organizations increasingly see every link in a supply chain as a potential vulnerability. Due to this, businesses will increasingly use cybersecurity resilience and exposure as a determining factor in choosing who they will partner with. This is borne out by Gartner's research which predicts that, by 2025, 60% of organizations with use cybersecurity risk as a "primary determinant” when choosing who to conduct business with.
  • 12. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved With more legislation following in the wake of the European General Data Protection Regulation (GDPR), such as the Chinese Personal Information Protection Law and the Californian Consumer Privacy Act, more organizations are at risk of potentially huge penalties if they make information security slip-ups. This means every partner that potentially has access to an organization's data or systems will be rigorously vetted. Businesses that aren’t able to answer questions about their cybersecurity arrangements or ratings will increasingly find themselves out in the cold. In fact, Garner predicts that industry-standard security rating schemes like SecurityScorecard, Black Kite, or UpGuard will become as important to companies as credit rating agencies.
  • 13. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved TREND 3: REGULATION STARTING TO CATCH UP WITH RISK For years, cybercriminals have acted with the knowledge that understanding – let alone policing – of their activities is weak due to the fast-changing nature of technology. With the cost of cybercrime to global economies set to top $6 trillion in 2021, this isn’t a situation that is sustainable. According to Security Magazine, 2022 is set to be the year when regulators pull out the stops in order to get on top of the situation. One consequence of this could be an expansion of penalties that currently only cover breach and loss to also cover vulnerabilities and exposure to potential damage. Another may be an increasing number of jurisdictions passing laws relating to making payments in response to ransomware attacks. We could also see a growing number of legal obligations handed to Chief Information Security Officers, in line with the responsibilities of Chief Financial Officers, in an attempt to limit the impact of data thefts, losses, and breaches on customers.
  • 14. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved While this will inevitably increase the burden of those responsible for information security in businesses, in the long term, this will only be a good thing. Today, more than ever, building consumer trust is essential for organizations that want us to give them the privilege of access to our valuable personal information.
  • 15. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Read more about these and other future trends in my books, Business Trends in Practice: The 25+ Trends That are Redefining Organizations and Tech Trends In Practice: The 25 Technologies That Are Driving The 4th Industrial Revolution.
  • 16. © 2021 Bernard Marr , Bernard Marr & Co. All rights reserved Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a strategic business & technology advisor to governments and companies. He helps organisations improve their business performance, use data more intelligently, and understand the implications of new technologies such as artificial intelligence, big data, blockchains, and the Internet of Things. LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is a frequent contributor to the World Economic Forum and writes a regular column for Forbes. Every day Bernard actively engages his 1.5 million social media followers and shares content that reaches millions of readers.