Cybersecurity in 2022, Predictions for digital ecosystem dealing with extra challenges and complicated threats
10 mins read

Cybersecurity in 2022, Predictions for digital ecosystem dealing with extra challenges and complicated threats

This weblog was written by an unbiased visitor blogger.

In 2020, I printed an AT&T weblog referred to as “High Cybersecurity Tendencies & Predictions for 2020’” 2021 Cybersecurity Tendencies and Insights | AT&T Cybersecurity (  Within the article I had forecasted that cybersecurity would grow to be much more of a strategic precedence for corporations as the fee, sophistication, and lethality of breaches would proceed to rise. Additionally, that menace actors, particularly state-sponsored, and legal enterprises would make the most of the increasing cyber-attack floor through the use of their sources to make use of extra subtle means for locating goal vulnerabilities, automating phishing, and discovering new misleading paths for infiltrating malware.

The rash of high-profile breaches resembling Photo voltaic Winds, Colonial Pipeline, Kaseya, and others proved these 2021 predictions to be correct. The truth is, “the variety of publicly reported knowledge compromises within the U.S. via September of 2021 has already surpassed the entire variety of compromises in 2020 by 17%, based on the Id Theft Useful resource Middle (ITRC).” Knowledge Breaches Are on Tempo to Break a New Report Excessive in 2021 | Cash Please see my article in FORBES for extra of 2021’s alarming cybersecurity statistics. MORE Alarming Cybersecurity Stats For 2021 ! (

As we close to 2022, the cyber menace panorama stays simply as ominous. Together with the continued challenges of defending vital infrastructure, the availability chain, and the ever-present activity of discovering certified cybersecurity employees to fill scores of vacant roles in companies and authorities that I forecasted nonetheless points for the approaching yr.

I’ve divided my 2022 predictions into two classes. Strategic, and Tactical. Strategic views present a glimpse of what cyber-trends shall be pervasive, and tactical is focuses on what technical and coverage treatments will should be prioritized by CISOs, CIOs, and their IT outlets.



In 2022, ransomware assaults will proceed at an alarming tempo and shall be extra focused. For hackers’ comfortable targets for ransomware extortion are plentiful, particularly within the healthcare, monetary, and manufacturing industries. We are able to count on to see extra such assaults as a result of the vulnerabilities to many networks stay open and accessible to hackers and since many victimized corporations are nonetheless paying ransomware.

Ransomware will not be new, and it has been round for many years. .A variant of ransomware referred to as “WannaCry” unfold swiftly in 2017 and 2018, reaching over 100 international locations and infecting over 200,000 computer systems.  Ransomware is extra favored by hackers these days as a result of they’ll receives a commission in cryptocurrencies which might be exhausting to hint. Due to the prevalence of ransomware assaults, the U.S. authorities created a Ransomware and Digital Extortion Job Drive  created run by the Division of Justice (DOJ) to assist observe cyberattacks and digital extortion schemes and fight them. Division Of Justice Creates New Job Drive To Take On Ransomware Assaults (

OT/IT and IoT convergence

The dimensions and frequency of cyber-attacks towards vital infrastructure continues to develop. 2022 shall be extra of the identical. Digital connectivity pushed by the adoption of commercial web of issues and operational know-how (OT) has additional expanded the assault floor. IT/OT/ICS provide chains in CI will be notably susceptible as they cross pollinate and provide attackers many factors of entry and older Legacy OT techniques weren’t designed to guard towards cyber-attacks.

In recent times, hackers and nation state adversaries have gained a deeper data of commercial management techniques and the way they are often attacked and the way weaponized malware will be deployed. Weaponized malware is a genuinely regarding and actual menace to vital infrastructure. The agency Gartner Inc., projected deaths as a result of a cybersecurity menace weaponizing industrial amenities by 2025. The agency sees the price of assaults that trigger fatalities reaching $50 billion per yr. DHS Secretary: “Killware,” Malware Designed To Do Actual-World Hurt, Poised To Be World’s Subsequent Breakout Cybersecurity Menace – CPO Journal

Additionally, in previewing the vulnerabilities of each {hardware} and software program networks, Web of Issues (IoT) units additionally will proceed current particular safety challenges to CISOs because the variety of related units to networks expands in Malthusian methods. “By 2025, it’s anticipated that there shall be greater than 30 billion IoT connections, nearly 4 IoT units per particular person on common and that additionally quantities to trillions of sensors connecting and interacting on these units. State of the IoT 2020: 12 billion IoT connections ( IoT complexity magnifies cyber danger and the shortage of visibility to find out if a tool has been compromised is difficult and can current extra assault vectors for hackers.

Essential infrastructure and house: The brand new frontier

As Elon Musk, Jeff Bezos and William Shatner can attest, house is certainly the brand new frontier. A big a part of our communication capability as a civilization is turning into more and more depending on satellite tv for pc relays and monitoring. With that comes cyber-risk. The nationwide safety neighborhood believes that satellites may very well be focused by cyber-attacks to disrupt communications or info streams very important for commerce and safety.

Many networks are actually altering from terrestrial (land) based mostly communications to the cloud, benefiting from satellites to maneuver knowledge over giant, worldwide distances. There are extra satellites circling in low earth than ever as launch prices have considerably lowered, which has created extra targets and thus a wider assault floor for hackers to doubtlessly assault each in house and at land-based management facilities.

I agree with Samuel Visner, technical fellow at MITRE who says that “house techniques ought to be a delegated vital infrastructure. That would come with launch techniques, manufacturing crops, on orbit satellites and ground-based communication techniques.” Trade panel: U.S. house techniques want safety towards cyber assaults – SpaceNews  There are a lot of succesful nation state menace actors who’ve the capability to do injury to house infrastructure and it might occur very quickly. For a deeper dive on the cyber house menace see: Defending Area-Primarily based Property from Cyber Threats – HS As we speak


  • Trade and organizations will proceed to maneuver to Cloud, Hybrid Cloud and Edge Platforms to raised optimize and securing knowledge. It is a course of that has been occurring over the previous a number of years. It’ll nonetheless be a serious focus of finances spend for 2022.
  • Updating of legacy techniques and assimilation of rising applied sciences resembling 5G and synthetic intelligence into safety platforms shall be prioritized. There are a lot of shiny new toys and instruments for cybersecurity operators. The problem shall be figuring out how you can finest orchestrate these instruments and understanding what is accessible to finest mitigate industry-specific threats.
  • OT and IT convergence and vulnerabilities will should be addressed. Safety by Design: OT and IT networks for industrial techniques will should be designed, up to date, and hardened to fulfill rising cybersecurity threats. Safety by design would require constructing agile techniques with operational cyber-fusion between OT and IT to have the ability to monitor, acknowledge, and reply to rising threats.
  • Extra consideration shall be utilized to Zero Belief danger administration methods. There shall be extra of a give attention to vulnerability assessments and securing code from manufacturing all through the life cycle. Zero belief will grow to be extra of a prevailing theme for presidency company cybersecurity too.
  • Defending provide chains remains to be an space of key focus for CISOs. Subtle ransomware teams like REvil and Darkside had been notably lively in 2021 towards such targets. In response to Microsoft, the SolarWinds hackers are already attacking extra IT provide chain targets. SolarWinds hackers attacking extra IT provide chain targets ( The safety problem comes all the way down to understanding what’s related within the provide chain panorama, figuring out how you can finest shield crucial property, and successfully implementing methods for mitigating and remediating a safety incidents and breaches.
  • Extra automation and visibility instruments shall be deployed for increasing safety of distant worker places of work, and for assuaging workforce shortages. The automation instruments are being bolstered in capabilities by synthetic intelligence and machine studying algorithms.
  • Cybersecurity will see elevated operational budgets due to extra subtle threats and penalties of breaches (and particularly ransomware) to the underside line. Cybersecurity turns into extra of a C-Suite concern with each passing yr as breaches will be disruptive and devastating for enterprise.

There are dozens of different predictions I might add to the forecast, and I solely highlighted a number of of probably the most pertinent ones. There are information gadgets on cyber-threats and incidents printed each week. As a society on the verge of unparalleled exponential connectivity, we’re getting into unchartered digital territory in 2022. New dangers and unexpected points will little question confront us. Definitely, safety groups may have many obligations and duties at hand to handle within the coming yr.

Chuck Brooks

Concerning the Creator: Chuck Brooks

Chuck Brooks is a globally acknowledged thought chief and evangelist for Cybersecurity and Rising Applied sciences. LinkedIn named Chuck as one among “The High 5 Tech Folks to Comply with on LinkedIn”. He was named by Thompson Reuters as a “High 50 World Influencer in Danger, Compliance,” and by IFSEC because the “#2 World Cybersecurity Influencer” in 2018. He’s additionally a Cybersecurity Professional for “The Community” on the Washington Submit, Visiting Editor at Homeland Safety As we speak, and a Contributor to FORBES.

Learn extra posts from Chuck Brooks ›

Leave a Reply

Your email address will not be published. Required fields are marked *