Intelligent CIO APAC Issue 43 | Page 34

EDITOR ’ S QUESTION
MARK BOWLING , CHIEF INFORMATION
SECURITY AND RISK OFFICER ( CISRO ), EXTRAHOP
More legal responsibility falling on the shoulders of CIOs and cyber leaders .

We are entering the cyber whistleblower era . With more legal responsibility falling on the shoulders of CIOs and cyber leaders , whistleblowers have 10 times the reason to report unsafe cyber conditions or disreputable behavior to federal regulators .

Resource-constrained organisations cutting corners will find themselves in hot water as their practices come to light .
As an additional twist to complications , ransomware actors will also become involved in the ‘ whistleblowing ’ process , as a way to compel publicly traded victim companies to pay their demanded ransom .
Attacks by nation-state threat actors on the cyber supply chain will increase . Nation-state threat actors will engage in increased attacks on the national / federal supply chains which support the governments of Ukraine , Israel , Saudi Arabia , Japan , Taiwan and all members of the Five Eyes ( U . S ., U . K ., Canada , Australia , and New Zealand ).
They will use sophisticated social engineering and zero-day exploits to gain access to administrative and design engineer credentials for creators of support software critical to the government and defence supply chains for those nations .
Once inside critical government and defence systems , the attacking nation-states will use advanced persistence strategies to maintain access . This access will be used only for strategic purposes and may only be exploited in the event of hostilities .
Attacks by hostile nation-state actors on critical infrastructures will increase .
Hostile nation-states will engage in a more vigorous and aggressive campaign to develop persistence in US critical infrastructures , specifically electric power , natural gas and petroleum , water , manufacturing , transportation and others necessary to sustain military operations .
Generative AI will be used to develop advanced attacks in less common industrial protocols and industrial control systems that are used in support of those critical infrastructures .
34 INTELLIGENTCIO APAC www . intelligentcio . com