2018 CybeR Predictions: Reality Check

 

2018 Cyber Predictions:
Reality Check

Using real time insights to deliver better protection

In 2018, cyber risk has advanced and cyber risk management must keep up. The goal remains the same: to protect business continuity and your organization’s information.

For National Cybersecurity Awareness month, Aon’s Cyber Solutions has updated our 2018 predictions to reflect what really happened over the course of the year.

Based on our team’s first-hand experiences in the field working with companies across multiple industries and sizes, we’ve shared actionable recommendations, strategies and techniques to enable you to continue to manage cyber risk as an enterprise risk.

2018 Predictions

  • Criminals harness IoT devices as botnets to attack infrastructure.
    Businesses adopt standalone cyber insurance policies as boards and executives wake up to cyber liability.
    1
    1
  • 2
    2
    Industry first-movers embrace pre-M&A cybersecurity due diligence.
    As the physical and cyber worlds collide, chief risk officers take center stage to manage cyber as an enterprise risk.
  • Data integrity attacks rise.
    Regulatory spotlight widens and becomes more complex, provoking calls for harmonization. The EU holds global company to account over GDPR violation; big data aggregators come under scrutiny in the US.
    3
    3
  • Nation state cyber espionage and information war influences global politics and policy.
    Criminals look to attack businesses embracing the IoT, in particular targeting a small to mid-sized company providing services to a global organization.
    4
    4
  • Spear-phishing and social engineering tactics become more crafty, more targeted and more advanced.
    As passwords continue to be hacked, and attackers circumvent physical biometrics, multi-factor authentication becomes more important than ever before.
    5
    5
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    Criminals will target transactions that use points as currency, spurring mainstream adoption of bug bounty programs.
    6
    6
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    Ransomware attackers get targeted; Cryptocurrencies help ransomware industry flourish.
    7
    7
  • 8
    8
    Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    Insider risks plague organizations as they underestimate their critical vulnerability and liability, and major attacks continue to fly under the radar.

2018 Cybersecurity Predictions

  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    1
    Businesses adopt standalone cyber insurance policies as boards and executives wake up to cyber liability.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    2
    As the physical and cyber worlds collide, chief risk officers take center stage to manage cyber as an enterprise risk.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    3
    Regulatory spotlight widens and becomes more complex, provoking calls for harmonization. The EU holds global company to account over GDPR violation; big data aggregators come under scrutiny in the US.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    4
    Criminals look to attack businesses embracing the IoT, in particular targeting a small to mid-sized company providing services to a global organization.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    5
    As passwords continue to be hacked, and attackers circumvent physical biometrics, multi-factor authentication becomes more important than ever before.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    6
    Criminals will target transactions that use points as currency, spurring mainstream adoption of bug bounty programs.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    7
    Ransomware attackers get targeted; Cryptocurrencies help ransomware industry flourish.
  • Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge.
    8
    Insider risks plague organizations as they underestimate their critical vulnerability and liability, and major attacks continue to fly under the radar.

Download the updated report