Cybersecurity Futures 2030

17 Jan 2024 11:30h - 12:00h

Event report

A proliferation of inexpensive tools available to cyber criminals, advances in value transfer and identification, supply chain frictions and fractures in global internet governance mean that by 2030 the landscape of digital security will once again be radically transformed.

What key driving forces will shape the long-term future of cybersecurity and how can it inform leaders’ strategic plans across the globe?

More info @ WEF 2024.

Table of contents

Disclaimer: This is not an official record of the WEF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the WEF YouTube channel.

Full session report

Promotional video

The analysis highlights four key topics that have significant implications for various aspects of our society.

Firstly, there was a break-in at a semiconductor factory in Dresden, Germany, followed by a series of cyber attacks on chip makers. These events have exposed the vulnerability of global supply chains, particularly in the semiconductor industry. There are speculations that these attacks may lead to rising chip prices and inflation. It is believed that nation states and black market forces may be involved in these actions. This situation raises concerns about the security and stability of the global supply chain, particularly in relation to critical industries.

Secondly, there are concerns regarding the potential compromise of voting machine software, which poses a significant threat to election security. While there is no concrete evidence of corrupted vote counts, the discovery that software in widely used voting machines may have been compromised has fueled confusion and threats of violence. Online disinformation campaigns have contributed to the exacerbation of this situation, further heightening concerns. Additionally, the effectiveness of the multilateral trustworthy election treaty of 2028 has been questioned, highlighting the need to enhance and strengthen election security measures.

On a positive note, major artificial intelligence (AI) companies have announced record profits, leading to a surge in global stocks. This highlights the growing impact and significance of AI in various industries. Furthermore, the announcement of new robot land factories capable of producing up to 2,500 vehicles per day has led to a surge in stock prices for automakers. These developments indicate the potential for economic growth and technological advancements in the AI and automobile sectors.

Lastly, there have been discussions on new custom gene therapies that have the potential to prolong human lifespans. While this represents a significant advancement in healthcare, concerns have been raised regarding the vulnerability of DNA data to misuse. There is a shift of operations by companies to regions with less stringent safeguards to protect citizens’ DNA data, raising privacy and security concerns.

Overall, the analysis highlights the fragility of global supply chains and the need for enhanced cybersecurity measures to protect vital industries. It underscores the importance of strengthening election security in the face of evolving threats. Additionally, it demonstrates the positive impacts of emerging technologies like AI and gene therapies, while also emphasizing the need to address associated risks and ethical considerations.

Ken Xie

The initial design of the internet protocol, which was created 50 years ago, is considered inadequate in today’s digital age. The original purpose of the internet was to connect a limited number of universities and government entities that had the same level of trust. However, as the digital landscape has evolved, the need for network security to handle different levels of trust has become evident.

It is predicted that network security will become even more crucial in the future and will likely surpass the networking business in terms of size by 2030. With the advent of 5G and 6G technology, there will be a significant increase in connectivity. It is estimated that in the next five to seven years, there will be ten times more devices connected online than there are people. This exponential growth in connectivity brings increased risks and emphasizes the importance of robust network security measures.

The cybersecurity industry is currently fragmented, with no single company holding more than a 10% market share. To efficiently manage the growing number of cybersecurity risks, consolidation within the industry is seen as a solution. Consolidation would enable the industry to handle the tempo of people and devices connecting online, ultimately improving efficiency.

Ken Xie, a prominent figure in the cybersecurity industry, believes that industry consolidation is necessary to solve efficiency issues and lower costs. He disagrees with the argument that consolidation would increase the risk due to a homogeneous ecosystem. Xie asserts that some consolidation has already taken place in the last 10 to 20 years, making cybersecurity and network security more widely deployed.

In addition to consolidation, Xie advocates for cybersecurity training and education. He has established a center for cybersecurity where over 2 million people have been trained, with more than 1 million people certified. Xie and his company, Fortinet, have also partnered with 600 universities globally to provide free cybersecurity training. Xie emphasizes the need for collaboration and a community effort involving education, business, government, and non-profits to better understand and address the risks associated with cybersecurity.

The importance of a community approach in cybersecurity is further exemplified by initiatives such as the World Economic Forum (WEF), where business, government, academic leaders, and nonprofits come together to raise awareness and share knowledge about cybersecurity.

Artificial Intelligence (AI) also plays a significant role in improving cybersecurity. Fortinet has been working on AI for over 10 years and believes that it can enhance efficiency and response times in security operations. Moreover, AI has the potential to lower supporting costs, making cybersecurity more accessible to small to medium-sized businesses (SMBs) and consumers.

It is worth noting that independent third-party evaluations and testing of cybersecurity products and services are necessary. Many cybersecurity companies promote their products as the best, but customers often struggle to evaluate and test them. Ken Xie argues that the cybersecurity industry has reached a stage where third-party assistance, similar to certified professionals and institutions in industries like healthcare and financial services, is necessary.

In conclusion, the initial design of the internet protocol is inadequate for today’s digital age, and the need for network security to handle different levels of trust is growing. The cybersecurity industry requires consolidation to improve efficiency and lower costs. Strong emphasis is placed on cybersecurity training, education, and a community-oriented approach. Furthermore, AI can play a significant role in enhancing cybersecurity and making it accessible to SMBs and consumers. The establishment of independent third-party evaluations and testing in the industry is also considered crucial.

Ann Cleaveland

In the analysis, several speakers discuss different aspects of cybersecurity. Ann Cleveland, the Executive Director of the UC Berkeley Center for Long-Term Cybersecurity, emphasizes the importance of foreseeing future developments in cybersecurity. She highlights the need to adapt current practices and measures to address potential challenges that may arise.

The use of scenarios to anticipate challenges and opportunities in cybersecurity is discussed. These scenarios involve examining different variables such as technology, climate change, and the political and economic environment. By considering these factors, stakeholders can develop insights and preparedness strategies.

The role of artificial intelligence (AI) in enhancing presentations is also highlighted. The speakers acknowledge that off-the-shelf AI tools are being used to develop videos and improve the delivery of information. This technology is expected to have a positive impact on the quality and effectiveness of presentations in various fields.

Securing global supply chains for vital technologies is another important topic. Authorities are investigating break-ins at semiconductor factories linked to nation-state cyberattacks. These incidents reveal the vulnerability of the global supply chain and highlight the need for robust cybersecurity measures to protect vital technologies.

The intersection of AI and cybersecurity is also discussed. Major companies have announced record profits in the AI sector, and new robot land factories capable of producing customized vehicles at a high rate have been introduced. The speakers emphasize the importance of focusing on AI safety and security to ensure the responsible and secure development of AI technologies.

The potential misuse of gene therapy-related DNA data is a significant concern. New custom gene therapies that prolong human lifespan have been developed, but there are concerns about the vulnerability of the DNA data behind these therapies to misuse. Stakeholders in the cybersecurity field must address these concerns and implement measures to protect sensitive genetic data.

Trust, tempo, and talent are identified as crucial factors in the future of cybersecurity. With an increasing number of people going online, the risks of cyber threats are expected to rise. The global battle for cybersecurity talent is intensifying, and there is a need for broad-based public education on cyber hygiene and digital literacy. These factors contribute to building trust and maintaining a high tempo in addressing cybersecurity challenges.

The struggles faced by small and medium-sized enterprises (SMEs), nonprofits, small cities, and municipalities in dealing with cybersecurity are also highlighted. Less than 10% of SMEs have any cybersecurity protection, and cybersecurity services are often expensive. This calls for increased support and resources to enable these entities to effectively address cybersecurity challenges.

Transforming the talent equation for cybersecurity is seen as a necessary step. The cybersecurity industry is currently fragmented, and the speakers suggest that consolidation can lead to more efficient and widespread deployment of cybersecurity measures at a lower cost. This approach can help bridge the talent gap in the industry and enhance overall cybersecurity.

A community-driven approach to cybersecurity training is considered valuable. Fortinet has been a leader in advocating for this approach, collaborating with around 600 universities to train two million people globally in cybersecurity. The speakers support this community-driven model and emphasize the need for transformative investment and greater participation to generate cybersecurity talent.

In conclusion, the analysis covers various dimensions of cybersecurity, including the importance of foreseeing future developments, the use of scenarios to anticipate challenges and opportunities, the role of AI in enhancing presentations, securing global supply chains, focusing on AI safety and security, addressing the potential misuse of gene therapy-related DNA data, the importance of trust, tempo, and talent, the struggles faced by SMEs and small critical infrastructure providers, the need to transform the talent equation, and the benefits of community-driven cybersecurity training. These insights provide a comprehensive understanding of the current and future challenges and opportunities in the field of cybersecurity.

Audience

The analysis provides a comprehensive examination of the challenges and possible solutions for connecting the 1.3 billion people who are currently not online by 2030. It emphasizes the need to address the unique requirements of these communities, including support for languages that are not traditionally used online. The analysis highlights that bridging the digital divide and ensuring equal access to digital opportunities is vital.

In terms of cybersecurity, the analysis asserts that the global cybersecurity community must prioritize the challenges associated with bringing these offline communities online. It argues that considering the specific needs of this forthcoming online populace is crucial for ensuring their safety and security in the digital space. This aligns with SDG 10 and SDG 9, which focus on reducing inequalities and promoting industry innovation and infrastructure.

The analysis also points out the vulnerability of small businesses due to the lack of resources and funding. This raises concerns as inadequate protection leaves them susceptible to cyber threats. However, the analysis envisions a future where small businesses have access to more tools and resources for protection. This positive perspective aligns with SDG 9, which emphasizes the importance of industry, innovation, and infrastructure in fostering decent work and economic growth.

Additionally, the analysis highlights the potential of artificial intelligence (AI) in cybersecurity defense. It suggests that AI can help companies, including small and medium enterprises, effectively defend against cyber attacks. This aligns with SDG 9 and underscores the significance of leveraging technological advancements to strengthen cybersecurity measures. Despite potential threats, there is a positive sentiment towards the application of AI in cybersecurity defense.

In conclusion, the analysis examines the challenges of connecting the offline population, emphasizing unique needs and the importance of cybersecurity. It underscores the vulnerabilities of small businesses and the potential of AI in addressing these challenges. By considering these insights and recommendations, policymakers and stakeholders can work towards creating a more inclusive and secure digital landscape, contributing to the achievement of multiple SDGs, including SDG 9, SDG 10, and SDG 16.

A

Ann Cleaveland

Speech speed

155 words per minute

Speech length

2245 words

Speech time

868 secs

A

Audience

Speech speed

193 words per minute

Speech length

216 words

Speech time

67 secs

KX

Ken Xie

Speech speed

165 words per minute

Speech length

2064 words

Speech time

750 secs

PV

Promotional video

Speech speed

164 words per minute

Speech length

284 words

Speech time

104 secs