“In a world of complex and interconnected systems, feedback loops, threshold effects and cascading disruptions can lead to sudden and dramatic breakdowns.” — The World Economic Forum’s “Global Risks Report 2018”

First came the New Year’s Eve parties, followed by New Year’s resolutions and, finally, the annual meeting of global elites at the World Economic Forum (WEF) in Davos, Switzerland, on January 23–26. Just ahead of the event, the WEF released its “Global Risks Report 2018,” a compendium of data points and analysis about the state of economic health around the world.

The report, partly based on a survey of about 1,000 of its members conducted during the second half of 2017, covers all major categories of risk, including economic, environmental, geopolitical, societal and technological. The top four concerns include recurring themes, such as inequality and unfairness, political tensions within and between countries, the environment, and cyber vulnerabilities. It is across this spectrum of global risks that the report warns of “the increased dangers of systemic breakdown,” due in part to our increasing dependence on technology.

A Sharpened Focus on Cyber Risks

For the first time in the history of the “Global Risks Report,” two technological threats — cyberattacks and data fraud or theft — ranked in the top five risks by likelihood. Cyberattacks also figured high on the impact side, coming in sixth place. The report warned of the dangers that await if global leaders don’t take stock of the issues and become more engaged in improving policies, communication, coordination and risk decisions.

As many organizations have found out the hard way in 2017, cybercriminals have access to a target space that is growing at an exponential pace. The report noted that attacks against businesses have doubled in the span of five years and are now considered part of the cost of doing business. Not surprisingly, the report mentioned the prevalence of ransomware in 2017, including mentions of WannaCry and NotPetya, and the significant costs and disruptions created by those events.

The Internet of Things (IoT) is also spotlighted in the report, but not for the technological advancements it provides. Instead, WEF noted that there are now already more IoT devices than people on the planet, and these devices, with their lack of out-of-the-box-security, have already been used to launch distributed denial-of-service (DDoS) attacks at 100 gigabits per second. These events are part of a growing tally of cybercrime costs that could reach $8 trillion by 2022. The report also pointed to increasing evidence of disruptions to systems and services “that keep societies functioning,” including critical infrastructure, government agencies, banks, telecommunications and transportation.

How Cyberthreats Fit Into the Larger Picture

Cyber risks are just one of the many categories of threats that society faces today. However, the 2018 report dedicated more attention to this increasingly important issue, warning of the fragility and instability of technological systems and highlighting the uncertainty that could result from their widespread failure. WEF called out the possibility of “asymmetric economic warfare” as our modern economies increasingly rely on new technologies to drive everything from manufacturing systems to remote healthcare, and the financial infrastructure that powers our online banking and investment transactions.

Addressing the Need for Better Risk Assessment and Management

As a global barometer of economic health and a repository of top concerns, the WEF report also recommended solutions that can help us avoid the cliff. While it noted that global risks are growing in complexity and becoming pervasive with a strong potential for cascading failures, it also emphasized the need for reactions and responses to be determined and coordinated from both a local and global perspective. As 2017 has shown, knowing how best to respond to a cyber crisis is as important as all the work done prior to a breach.

While global economies have improved their ability to measure and mitigate conventional risks, they struggle to understand and address the complex risks that are found at the intersection of the various systems that make our modern world possible. The report section titled “Future Shocks” features stories that illustrate the potential impact of widespread complacency and demonstrate how rapidly risks can propagate between systems and geographic regions.

Toward the end of the “Global Risks Report,” two short essays discussed the need for resilience in complex organizations and the dangers of cognitive bias in risk management. The first essay urged businesses to consider supplementing traditional risk assessments with a “resilience lens” that considers how to improve the organization’s ability to respond to risks.

The second argued that our current understanding of why people react strongly to certain risks but not others is incomplete. It also illustrated the dangers of anchoring and confirmation bias, highlighting top leadership’s tendency to “approach risk analysis as a standalone activity to be ticked off a list, but then fall short on mitigating the risks that their analysis has identified.”

Starting the Conversation With the ‘Global Risks Report’

The “Global Risks Report,” with its focus on world-scale economic opportunities and risks, is written for enterprise leaders in plain, business-friendly language. This year, cyberthreats figure prominently along the various global risks found in our increasingly complex and interconnected world. It makes it a perfect New Year’s gift for chief information security officers (CISOs) to share with their business leaders as a way to examine common concerns and build trust through stronger communication and engagement on a topic that is critical to the survival of organizations around the world.

Listen to the podcast series: Take Back Control of Your Cybersecurity Now

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…