Cybersecurity

The dark side of the Fourth Industrial Revolution

A drone is used for filming as the Australian frigate HMAS Anzac arrives in Valletta's Grand Harbour, Malta, May 11, 2015.

A drone is used for filming as the Australian frigate HMAS Anzac arrives in Valletta's Grand Harbour Image: REUTERS/Darrin Zammit Lupi

André Kudelski
Chairman of the Board and Chief Executive Officer, Kudelski Group
Share:
Our Impact
What's the World Economic Forum doing to accelerate action on Cybersecurity?
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

Cybersecurity

Together with incredible opportunities come new risks, as the virtual and real world become one in the fourth industrial revolution.

The asymmetry of risks that we are starting to face reinforces the need for an integrated and holistic view of security issues, and a strong synchronization between business and political action.

The disappearance of frontiers between the virtual and real world brings new fragilities

The dream of the connected car could actually quite soon become a nightmare; we have recently had proof that any skilled engineer could take control remotely of any connected “thing”. This new reality changes the traditional rules of warfare, both for defense strategists and in business.

Society has not yet caught onto the incredible amount of scenarios that such innovations allow. In 1940, the French army was still arguing about whether or not to industrialize tank production, while the Germans already had V1 rockets in mind, and the Americans were conceiving the atomic bomb. We know the outcome of the Second World War.

Today, we are in the same position of underestimating the risks of a connected world, while unaware of the nature and diversity of threats.

Given the asymmetry of risks, we cannot afford to be security illiterate

To succeed in this digital revolution we need to learn to deal with asymmetric nature of conflict and business. There is a need broader security sensitivity, for sufficient skills to secure assets beforehand, and for capabilities to monitor, analyze and react to threats in real time.

We recently conducted a study which found that most companies’ digital infrastructures were already under attack by pirates. These advanced, persistent threats are silent and unnoticeable, but with potential to cause extreme damage in a split second. Preparing for this unprecedented situation requires mobilization of minds and resources, not only at a management or infrastructure level, but also at the level of every employee or citizen. A lost smartphone, a connected production line or a connected plane could all become powerful weapons.

Appropriate solutions will come from both political and business initiatives

Companies need to understand that on top of device and software-based security solutions, only a holistic approach that includes real-time intelligence will create an effective hedge. This type of response has a name: guerilla.

The media industry already understood this a few years ago. In order to protect their annual 200 billion revenue from content distribution, they realized they didn’t just need hardware and software protection to prevent real-time sharing of content for free on the Internet. They set up security labs to fight pirates continuously.

But, to be successful, collaboration between regulatory, political and business environments needs to strengthened. The defensive mindset evident in current responses such as closing economic borders and avoiding addressing pertinent economic issues will only lead talent being held back. Diversity, sense of purpose and respect for the roots of each nation along with a strong confidence in the future are the only ingredients that will spark a proper political response that will reduce volatility.

As technology becomes smarter and smarter, security becomes an open challenge - for us all.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Related topics:
CybersecurityDavos Agenda
Share:
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

'Pig-butchering’ scams on the rise as technology amplifies financial fraud, INTERPOL warns

Spencer Feingold and Johnny Wood

April 10, 2024

About Us

Events

Media

Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum