Information security forum predicts cyber threats that will disrupt businesses by 2024

Future threats include unintended consequences resulting from legislation, diminished control resulting from technology choices, and business disruption resulting from dirty data.

LONDON – May 26, 2022 – (


The Information Security Forum (ISF), the leading independent, not-for-profit cybersecurity association with nearly 500 member companies, today announced the release of its annual Threat Horizons 2024 report citing foreseeable cyber threats and suggesting remediation strategies. forward-looking cyber resilience to mitigate them.

“ISF analysts have observed that control is becoming increasingly complex to achieve and maintain,” said Steve Durbin, Managing Director of EWB. “That’s why organizations, in an effort to stay agile and competitive, are increasingly turning to trust as a substitute for control. However, by 2024, we believe this trust will disintegrate, exposing organizations to an ever-expanding array of threats.”

Well-intentioned regulations have unintended consequences

Political, diplomatic, and legal actions against ransomware actors and the underground financial systems that support them will force this crime to evolve, leading to impacts beyond the victim organization. Regulations can also inhibit innovation. Organizations considering leveraging AI-based algorithms will be disrupted by the changing regulatory landscape. Recommended mitigations:

  • Maintain the Board’s understanding of the evolving threat and regulatory landscape, support the ongoing development and maintenance of response plans, and improve the organization’s cyber hygiene in accordance with changing trends.
  • Identify algorithms used, develop assurance policies and processes to govern development, usage and fairness.
  • Obtain subject matter expertise to audit existing systems for cryptocurrency readiness, ensuring crypto platforms are hardened and regulatory requirements are met.

Technological choices diminish control

Short-term technological choices will inflict longer-term suffering. Organizations that have rushed to the cloud will find that their flexibility and freedom of choice are lost. The rise of Internet-exposed operational technologies will prompt an increasing number of activists to turn to cyberspace. Unrestrained use of low-code tools by non-developers will undermine structured approaches to application development, creating new vulnerabilities and risks. Recommended mitigations:

  • Be clear on architectural strategy and control cloud adoption growth.
  • Leverage threat intelligence, purple team, and resiliency testing to prepare for and detect potential attacks.
  • Clarify existing use of no-code and low-code tools; specifying where, when and how they should be used or not; maintain ongoing vendor assurances on their security posture.

Dirty data disrupts business

The scale at which data capital is generated will be difficult to ensure data integrity, turning data into a dangerous weapon. Attackers will compromise data to discredit, mislead or alter business results. They will leverage misinformation and misdirection to attack cyber fusion centers, disrupting the very businesses they serve to protect. Using “digital twins” that organizations will deploy to emulate threat activity will actually help double the attack surface. Recommended mitigations:

  • Review all data sources to establish current levels of quality assurance.
  • Establish methods to respond to any degradation in the quality of fusion center intelligence and signal inputs.
  • Proactively identify potential weaknesses in the links between digital twins and their real-world counterparts.

About the Information Security Forum

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organizations from around the world. The ISF is dedicated to the study, clarification and resolution of key issues in the field of cybersecurity, information security and risk management, as well as the development of methodologies, best practice processes and solutions that meet the business needs of its members.

Media Contact:
June Rooms
PR and Corporate Communication Manager
+44 (0)7825 187778
[email protected]

Press Release Service by

Primary source:

Information security forum predicts cyber threats that will disrupt businesses by 2024

Melvin B. Baillie