CAIRO - 27 January 2025: The Information and Decision Support Center (IDSC) of the Cabinet highlighted the report issued by the World Economic Forum entitled "Global Cybersecurity Outlook 2025", which addresses the increasing complexity of the cyber landscape and its profound impact on institutions and countries.
The report indicated that this complexity is not limited to technical aspects only, but also includes economic and social dimensions that require a comprehensive and integrated response.
The report also explained that the factors contributing to the complexity of the cyber landscape are geopolitical tensions, complex supply chains, emerging technologies, regulatory requirements, and a lack of skills, as international conflicts and tensions increase uncertainty and make cyber attacks a tool in these conflicts, as governments, vital infrastructure, and economies are targeted, while reliance on intertwined supply chains leads to the emergence of vulnerabilities that can be exploited, and the lack of transparency and oversight of supplier security increases these risks.
In addition, the rapid adoption of technologies such as artificial intelligence contributes to the emergence of new security vulnerabilities, which cybercriminals exploit to enhance their attack methods. As for regulatory requirements, the proliferation of different laws and regulations around the world may increase the burden on organizations that find it difficult to comply with them. The report added that the shortage of specialized skills in cybersecurity contributes to exacerbating the situation, as many organizations lack the necessary competencies to manage cyber risks.
The report indicated that the effects of this complexity are represented in several points, including:
- Exacerbating cyber disparities: The increasing complexity leads to an increase in the gap between large and small organizations, developed and developing countries, and small organizations struggle to secure themselves, while large organizations advance steadily.
- Evolution of cyber attacks: The number of cyber attacks is increasing and their methods are evolving, especially with the use of artificial intelligence by cybercriminals, making ransomware, fraud and phishing attacks more prevalent.
- Risks to critical infrastructure: Critical infrastructure has become an increasing target for cyber attacks, jeopardizing public safety and national security.
- Risks in biotechnology: Developments in these fields lead to the emergence of new risks that require advanced security measures, as attacks can disrupt research or compromise sensitive data.
The Information and Decision Support Center confirmed that the report stated that in response to these challenges, artificial intelligence can be exploited in defense, as the security of artificial intelligence tools must be assessed before they are deployed, and artificial intelligence can enhance defense capabilities by quickly detecting and responding to risks.
The Information Center reviewed a number of recommendations resulting from the forum to enhance the quality of cybersecurity and avoid the resulting risks, through:
- Investing in cybersecurity: Cybersecurity should be considered a strategic investment and not just an expense, with the necessary resources allocated to enhance defense capabilities.
- Skills development: Focus should be placed on developing skills in the field of cybersecurity, especially skills related to artificial intelligence.
- Raising awareness: Awareness of the importance of cybersecurity should be raised throughout society, with all employees understanding cyber risks and participating in promoting a culture of security.
- Preparing for the future: Prepare for future threats by initiating risk assessments and implementing preventive measures.
The report concluded that the cyber landscape is complex and constantly changing, requiring a rapid and integrated response from all stakeholders. It added that institutions and countries must work together to enhance cyber resilience, protect critical infrastructure, and ensure data and information security.
Comments
Leave a Comment