How AI will change your life - a Futurist's Guide to a Super-Smart World - Patrick Dixon is a Global Keynote Speaker on AI, Author of 18 BOOKS, Europe's Leading Futurist with 25 year track record advising large multinationals - CALL NOW +44 7768 511390

How AI Will Change Your Life - A Futurist's Guide to a Super-Smart World - Patrick Dixon signs books and talks about key messages - future of AI, how AI will change us all, how to respond to AI in business, personal life, government. CALL +44 7768 511390

Future of Sales and Marketing in 2030: physical audience of 800 + 300 virtual at hybrid event. Digital marketing / AI, location marketing. How to create MAGIC in new marketing campaigns. Future of Marketing Keynote Speaker

TRUST is the most important thing you sell. Even more TRUE for every business because of AI. How to BUILD TRUST, win market share, retain contracts, gain customers. Future logistics and supply chain management. Futurist Keynote Speaker

Future of Artificial intelligence - discussion on AI opportunities and Artificial Intelligence threats. From AI predictions to Artificial Intelligence control of our world. What is the risk of AI destroying our world? Truth about Artificial Intelligence

How to make virtual keynotes more real and engaging - how I appeared as an "avatar" on stage when I broke my ankle and could not fly to give opening keynote on innovation in aviation for. ZAL event in Hamburg

"I'm doing a new book" - 60 seconds to make you smile. Most people care about making a difference, achieving great things, in a great team but are not interested in growth targets. Over 270,000 views of full leadership keynote for over 4000 executives

Futurist Keynote Speakers - how Futurist Keynotes transform events, change thinking, enlarge vision, sharpen strategic thinking, identify opportunities and risks. Patrick Dixon is one of the world's best known Futurist Keynote Speaker

Futurist Keynote Speaker: Colonies on Mars, space travel and how digital / Artificial Intelligence / AI will help us live decades longer - comment before Futurist keynote for 1400 at Avnet Silica event. Futurist Keynote Speaker on AI

Future of Travel and Tourism post COVID. Boom for live experiences beyond AI. What hunger for "experience" means for future aviation, airlines, hotels, restaurants, concerts halls, trends in leisure events, theme parks. Travel Industry Keynote Speaker

Quiet Quitters: 50% US workforce wish they were working elsewhere. How engage Quiet Quitters and transform to highly engaged team members. Why AI / Artificial Intelligence is not answer. How to tackle the Great Resignation. Human Resources Keynote Speaker

The Great Resignation. 50% of US workers are Quiet Quitters. They have left in their hearts, don't believe any longer in your strategy. 40% want to leave in 12 months. Connect with PURPOSE to win Quiet Quitters. Human Resources Keynote Speaker

Future of Human Resources. Virtual working, motivating hybrid teams, management, future of motivation and career development. How to develop high performance teams. HR Keynote Speaker

Speed of change often slower than people expect! I have successfully forecast major trends for global companies for over 25 years. Focus on factors driving long term changes, with agile strategies for inevitable disruptive events. Futurist Keynote Speaker

Agile leadership for Better Risk Management. Inflation spike in 2022-3 - what next? Expect more disruptive events, while megatrends will continue relentlessly to shape longer term future globally in relatively predictable ways. Futurist Keynote Speaker

Crazy customers! Changing customer expectations. Why many decisions are irrational. Amusing stories. Lessons for Leadership, Management and Marketing - Futurist Keynote Speaker VIDEO

Chances of 2 people in 70 having same birthday? Managing Risk in Banking and Financial Services. Why the greatest risks are combinations of very unlikely events, which happen far more often than you expect. Keynote speaker on risk management

Compliance is Dead. How to build trust. Reputation of banks and financial services. Compliance Risks. Why 100% compliance with regulations, ESG requirements etc is often not enough to prevent reputational damage

Life's too short to do things you don't believe in! Why passionate belief in the true value of what you are selling or doing is the number one key to success. Secret of all leadership and marketing - keynote for 1100 people in Vilnius October 2021

Future Manufacturing 5.0. Lessons from personal life for all manufacturers - why most manufacturing lags 10-15 years behind client expectations in their day to day life. Manufacturing 4.0 --> Manufacturing 5.0. Future of Manufacturing Keynote

How a single hack could destroy your company. With 3bn accounts hacked in just one company, cyberattacks are greatest risk to large business, nations and wider world. Truth about Cybersecurity and AI. What to do about it. Futurist keynote speaker - POST

Futurist Keynote Speaker: Posts, Slides, Videos - AI Artificial Intelligence Robotics Cybersecurity

What happens when you combine Robotics, Artificial Intelligence /AI, the Internet of Things, Big Data and Cloud Computing, to the world of banking, telcos, mobile devices and personal computers? 

The answer is the you get the biggest target for criminals that the world has ever seen - all waiting online to be attached and exploited in a billion different ways using little more than a couple of computers, owned by very smart geeks.  

Never in human history has it been possible for one person, sitting in a bedroom at home in a distant land, to create such havoc and chaos, to seize such power. 

Cyber-crime will therefore be one of the greatest threats to our world over the next 50 years, and far beyond, into centuries to come. 

There is no way back from such a future, except by dismantling all the global e-systems that link us increasingly together.

As I predicted many years ago, and have spoken about since in many keynotes on cybersecurity and related issues, every large company in the world is now experiencing frequent cyber-attacks, on their own systems or in the cloud, whether they realize or not.

(This article is an extract from Patrick Dixon's Futurist book "The Future of Almost Everything"

Cyberattacks already cost business over $300 billion a year

The Centre for Strategic and International Studies has estimated total cost to business to be around $300bn a year. 

Losses are likely to be more than $1 trillion a year by 2025, especially if we see wide-scale attacks, sponsored by hostile governments. 

We are not just talking about attacks on traditional targets like bank websites, but also commercial aggression like the blackmail of Sony, after the company released a controversial film about North Korea.

There is nothing new about web abuse. At least 80% of the 247 billion emails sent every day are spam, many of them so-called phishing attacks, pretending to be from a bank, encouraging people to enter passwords.

Expect 10 billion separate attacks a year

Macafee is already detecting over 600 million new and different computer viruses, malware or Trojan horses every year – several a second.

Pharma, chemicals, mining, electronics and agricultural companies are seeing increases of 600% a year in malware attacks.

Energy, oil and gas attacks are growing by 400%.  Attempts to steal data from retailers are doubling every 12 months. 

In many cases, tens of millions of credit card details have been stolen.  Target lost data on 70 million people in a single attack. 

A single contractor in South Korea managed to steal personal information on 20 million credit card users, more than half the country’s working population.

Two years previously, personal data on 35 million South Koreans was stolen from Cyworld, a popular social network. 

3 billion people’s personal details have been stolen

Similar attacks have happened across the world.  Hackers recently stole personal details of 213 million eBay users.  Sony lost 100 million client’s details to a hacker.  The Heartbleed bug caused huge damage in 2014 as it swept globally, invading websites of many multinationals, retailers, banks and email companies.

Another example was a major attack on JP Morgan Chase – following a sustained assault with tens of thousands of separate attacks each day over many months, mostly traced to Russia.   76 million names, addresses, telephone numbers and email addresses were stolen – affecting two thirds of all households in America. 

Most attacks are reported very late, some not at all, and many are never noticed of course.

Yahoo admitted in 2017 that 3 billion accounts were hacked back in 2013, triple the previous estimate they had given.

Why hackers will often escape prosecution if caught

I have met bankers who don’t prosecute or even sack staff who hack into their own bank systems.

“Just thought you should know…. Of course I should probably leak the news or publish the account names.” 

Terrified of bad publicity, they pay them off, give them a wonderful reference, and let them go and work for a competitor – where exactly the same thing is likely to happen again. 

There is no legal requirement in most countries for any bank to report when they have been hacked and data lost, which means that most attacks will never be known, and the true scale is far larger than most people think.

Even the most basic bank security can be pitifully weak. 

I remember shortly before spending a day advising the board of a Swiss bank, I decided to carry out a test of my own. Without being challenged, I managed to walk right into a high-security area using the oldest tricks in the book: distracting reception staff, and gently pulling apart sliding security doors with my fingers.

Large corporations will be forced to encrypt stored data

All IT and smartphone companies will step up personal security with end to end encryption during data transmission, and encryption of all data “at rest” stored on servers. 

It is really shocking that most banks in some nations still do not encrypt data on their servers, so once a hacker gains entry, which they do in every large bank several times a year, they usually have no trouble at all reading files.

It was very careless of Sony to allow hackers to so easily read all their archived emails, contracts and other documents.  Best practice will mean universal encryption.

Customers will be urged to set up two step authentication, with confirmation of passwords using codes sent to mobile devices.  As a result, expect dramatic growth in attacks on telco companies and all mobile devices, to try to hack into SMS and intercept these codes.  In 2014, such attacks grew more than a hundred times over the previous year.

Cyberwar  - a new kind of Cold War

Expect many more significant large-scale cyber attacks against nations and groups of enterprises over the next two decades, often directed by criminal gangs rather than government staff, paid for by secret agents of other countries. 

The largest of these attacks are likely to form part of next-generation conflicts / disputes between nations, paralysing entire government agencies for days, causing major disruption to banking and telecommunications, damaging utilities such as power stations or parts of the national grid. 

It is already happening:  for example, a blast furnace in a steel mill was hit by hackers in Germany recently, causing parts of the plant to fail.  But for understandable reasons, most successful attacks on major installations will be kept strictly secret, in the national interest.

Cyberattacks on international data cables, people, companies and nations

Cyber-attacks are easy to carry out on physical web infrastructure too. 

For example, most bandwidth in the world is carried on a few, very vulnerable, fibre-optic cables.  Cutting them is very easy – all you have to do is drag a ship’s anchor along a sea bed to snag them.  And it is very hard to detect what ship did it, especially in relatively busy shipping areas. 

Recent cable damage reduced web access in India by 70%, Egypt by 60%, with many other nations affected in the Middle East.  In another episode, divers were arrested off the coast of Egypt in the act of sabotage.

For all these reasons, Nato includes cyberattacks as one of the events which could trigger a joint response by the Alliance.

Nations like the UK are very vulnerable since the exact points are well known on maps, where huge data cables run from shallow sea water into the shoreline.

Using mini-submersibles like those the BBC hired to film Blue Oceans II, it is easy to track all data cables into deep ocean, and a work of minutes to cut such them.

However, it will be almost impossible to prove who is really behind such attacks, and therefore impossible to retaliate effectively.

The US Navy is being hit on a routine basis by over 100,000 separate online attacks every hour, according to Hewlett Packard. But from where and by whom and for what purpose?

Sometimes digital debris is left by accident which gives clues about origin – for example naming a piece of code, deeply encrypted inside a complex virus, after a popular TV comedian in a particular country.  But subtle clue-dropping can also be a deliberate decoy, used by secret services or gangs to cast blame on an innocent nation.

Viruses designed to control entire countries

Energetic Bear is a cyber-espionage weapon which infected vital parts of Europe’s energy infrastructure during the Ukraine – Russia – EU crisis. 

It targeted a wide range of industrial control systems, national grids, power stations, wind turbines, biomass fuel plants. 

It was designed to monitor energy use in real time and to disable systems on command – but on whose command? 

Future energy viruses will target smart grids and smart homes – imagine the impact for example, if a hacker from a hostile state or group could turn on 15 million air conditioners simultaneously, causing instant power cuts.

A few weeks after discover of Energetic Bear, Russian telecom and health companies, utilities and government agencies discovered that they too had been hit by one of the most deadly and sophisticated clusters of viruses ever created, called Regin. 

The cluster was designed with multiple Apps, to steal passwords, extract information on a huge range of systems, and take total control of many different types of industrial equipment.

“Digital bombs” inside large organisations

Targets were also hit in Saudi Arabia, Mexico, Ireland, India, Iran, Belgium, Australia and Pakistan. 

In many cases, it turned out that the viruses had been working away for up to 6 years without detection, despite every check. The viruses were constantly listening online for a single command to detonate tens of thousands of digital “bombs” across every part of the nation. 

It has been reported that Russia is now so anxious about American penetration, that security agencies are using printed paper for ultra-sensitive communications.  The Chinese meanwhile are building a quantum computing link between Beijing and Shanghai, which they hope will lock out foreign surveillance.

In 2007, Estonia banks, Government agencies, Parliament, broadcasters and newspapers were also hit by three weeks of cyber-attacks which completely paralysed their web capabiliites.  These followed a disagreement with Russia, though responsibility was never proven.

So we will see huge investment in cyber-resilience, by governments, banks, stock exchanges and utility companies in particular, in the wealthiest nations, but smaller nations will remain very vulnerable. 

At least a quarter of all attacks will be espionage – directed at stealing state secrets or corporate research which has yet to be patent protected. 

Hackers will be recruited by spies and gangs

Expect growing numbers of full-time professional hackers, operating as independent consultants to criminal gangs and secret services, offering services in combination with others to plan major attacks.

In many cases, these hacking geniuses will never realize who the end client really is.  They may think they are working for MI6 in the UK for example, but are actually working for a Bulgarian gang, which is assisting Russian Federal Security Services, or for the CIA or Mossad.

Many attacks will be multidimensional in future. So a large scale identity theft takes place a couple of hours before a vital payment channel is hacked, to create new PIN numbers. Minutes later, two hundred people with cloned cash cards start withdrawing cash from ATMs in over 50 cities.

Hackers will be turned against other hackers

Expect a radical rethink about what on earth to do with convicted hackers:  people with proven genius in cracking open systems, who may well be the best people in the world to test your own security, and help improve it. 

Do we really want to waste their lives locked up in prison?

Some hackers will be offered rewards by governments to attack and destroy the dark web.

The aim will be to identify many millions of users of Tor web browsers (these are like normal web browsers, but prevent ANYONE monitoring your web activity), and users of other “secret” tools: people who want to keep their activities and payments 100% secret. 

Over 400 dark websites were closed in 2014 alone, including sites which sell illegal drugs, illegal arms deals, assassinations of spouses or politicians, and every kind of depravity. 

However, many dark web users in future will simply be trying to evade “oppressive” state snooping – particularly in countries like Russia or China where web controls have become severe.  Use of Tor in Russia leapt from 60,000 to over 200,000 people in just a couple of months following the seizure of Crimea.

Looking for a cybersecurity keynote speaker?  Patrick Dixon has given keynotes for over 400 of the world's largest corporations and to governments on a wide range of digital issues including cybersecurity, how to prevent cyberattacks, how to detect cyberattacks and related matters.


Related news items:
Newer news items:
Older news items:


Thanks for promoting with Facebook LIKE or Tweet. Really interested to read your views. Post below.

Join the Debate! What are your own views?


?

 

Our cookie policy

We use cookies for statistical purposes. To comply with the e-Privacy Directive we need to ask your consent to place these cookies on your computer.

Your use of this site indicates acceptance of these terms. I accept I Decline