{"id":109270,"date":"2023-08-08T06:46:54","date_gmt":"2023-08-08T06:46:54","guid":{"rendered":"https:\/\/alj.com\/?post_type=perspective&#038;p=109270"},"modified":"2024-03-26T10:15:30","modified_gmt":"2024-03-26T10:15:30","slug":"reducing-risk-in-a-digital-future","status":"publish","type":"perspective","link":"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/","title":{"rendered":"Reducing risk in a digital future"},"content":{"rendered":"<p>The vision of a fully connected, digitized world \u2013 an interlinked <em>ubernet<\/em> of everything spanning business, governance and leisure \u2013 comes laden with promises of innumerable societal benefits. \u00a0It doesn\u2019t matter who you are, we are told: A faster, more productive and more satisfying way of living is on the way.<\/p>\n<p>And hopefully that is indeed the case. \u00a0If you run a business, just as we do here at <a href=\"https:\/\/alj.com\/en\/\">Abdul Latif Jameel<\/a>, you can personalize products and services to target customers with unprecedented precision. \u00a0If you manage a public service, you can respond to live user data and assign resources accordingly for seamless operation. \u00a0If you are a patient, you can have your health monitored remotely and treatments prescribed instantly, like some of the healthtech innovations discussed in this <a href=\"https:\/\/aljhealth.com\/en\/insights\/investing-in-health-tech-and-digitizing-healthcare\/\">Abdul Latif Jameel Health<\/a> article. \u00a0And if you are, well, almost anyone, you can manage your shopping online and have goods appear on your doorstep with uncanny timeliness \u2013 almost as if the store had read your mind.<\/p>\n<p>Except, maybe the store <em>had<\/em> read your mind. \u00a0In a way. \u00a0Maybe it had trawled the web for your consumption habits, followed the telltale footprints of your data trail, and drawn conclusions about you even before you had arrived at them yourself.<\/p>\n<p>In which case, let\u2019s take the scenario further.<\/p>\n<p>What if one day the store\u2019s suffered a data breach and the knowledge they hold about you fell into the hands of less scrupulous parties?<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-109292\" src=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1396\" srcset=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-scaled.jpg 2560w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-300x164.jpg 300w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-1024x559.jpg 1024w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-150x82.jpg 150w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-768x419.jpg 768w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-1536x838.jpg 1536w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-2048x1117.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p>Let\u2019s take the scenario further still.<\/p>\n<p>You might expect \u2018the system\u2019 to come to your aid \u2013 banks, lawmakers, justice departments \u2013 but what if those systems have themselves been routinely weakened by cyber-attacks and rendered toothless?<\/p>\n<p>For some, the dream of a digital transition might suddenly be starting to sound a little eerie. \u00a0That eerie feeling is, perhaps, the sound of millions of people simultaneously awakening to the idea that our transformation into a digital society is not without danger. \u00a0Research shows the digital transition of our work, home and governance comes laden with risks and the potential for exploitation.<\/p>\n<p>Such anxiety seems unlikely to halt the transition. \u00a0The 2023 Digital Business Study, which quizzed almost 1,000 IT leaders in North America, APAC and EMEA, showed 93% of decisionmakers were now pursuing a digital-first business strategy.<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> \u00a0Moreover, they were actively investing in enabling technologies such as cloud-native platforms, cybersecurity mesh, decision intelligence and generative AI (artificial intelligence) to do so.<\/p>\n<p>If we wish to reap the extraordinary rewards of the digital journey on which we are embarking, we must identify the pitfalls ahead of time and, where possible, lay the groundwork for neutralizing risk. \u00a0Because the threat is real. \u00a0Some 85% of organizations reported falling victim to at least one successful cyberattack in 2021, with the average cost of a data breach reaching US$ 4.24 million.<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a><\/p>\n<p>Foresight can help ensure the coming digital transformation is democratic, safe, and for the benefit of the many rather than the few. \u00a0Only then can we enjoy the efficiencies of our new plugged-in, switched-on, joined-up reality.<\/p>\n<h2>Quantifying the risk matrix<\/h2>\n<p>No journey towards digitalization should be embarked upon without a thorough understanding of associated risks, along with strategies to minimize their impacts.<\/p>\n<p>Global business advisory firm Deloitte has identified a series of key risk areas that organizations are destined to encounter on the digital transformation.<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a><\/p>\n<ul>\n<li><strong>Technology<\/strong><em>:<\/em> How to future proof tech which is inherently vulnerable to failures and rapid obsolescence. Risks include problems with compatibility, scalability, and accuracy.<\/li>\n<li><strong>Cyber protection:<\/strong> Fortifying digital properties against unauthorized access and maintaining confidentiality throughout an integrated system.<\/li>\n<li><strong>Data leakage<\/strong><em>:<\/em> The complexity of ensuring data integrity across an entire ecosystem, whether data is being used, transferred, or stored.<\/li>\n<li><strong>Third parties:<\/strong> Any organization which works with third-party partners is exposed to external risks around data sharing and technology integration.<\/li>\n<li><strong>Privacy<\/strong><em>:<\/em> Sensitive personal data concerning employees and customers must be handled with utmost care and include key controls around choice and consent.<\/li>\n<li><strong>Forensics<\/strong><em>:<\/em> Systems and data must be open to scrutiny in the event of frauds or security breaches \u2013 and evidence gathered must be robust enough to be used in court.<\/li>\n<li><strong>Regulatory adherence:<\/strong> In-house expertise must be sufficient to ensure operations remain within national laws and any industry-specific regulations.<\/li>\n<li><strong>Resilience:<\/strong> Closely intertwined technologies are the bedrock of many modern enterprises, yet failures within one part of the system can quickly spread and render entire services unavailable.<\/li>\n<\/ul>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-109285\" src=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-scaled.jpg\" alt=\"\" width=\"2445\" height=\"2560\" srcset=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-scaled.jpg 2445w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-287x300.jpg 287w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-978x1024.jpg 978w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-143x150.jpg 143w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-768x804.jpg 768w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-1467x1536.jpg 1467w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte%CE%93COs-digital-risk-framework-v2-1956x2048.jpg 1956w\" sizes=\"(max-width: 2445px) 100vw, 2445px\" \/><\/p>\n<p>Despite these evident dangers, one survey showed just 29% of respondents considered their organizations to possess a \u2018completed\u2019 data security strategy, with 41% describing theirs as \u2018in development\u2019, and 23% merely at the \u2018planning\u2019 stage.<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-109278\" src=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2.jpg\" alt=\"\" width=\"1256\" height=\"1939\" srcset=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2.jpg 1256w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2-194x300.jpg 194w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2-663x1024.jpg 663w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2-97x150.jpg 97w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2-768x1186.jpg 768w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2-995x1536.jpg 995w\" sizes=\"(max-width: 1256px) 100vw, 1256px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Some of these risk areas, particularly those clustered around digital dependencies and cyber vulnerabilities, indicate potential pathways to more sustainable resilience, and so are worth exploring in finer detail.<\/p>\n<h2>Hack to the future: From malware to ransomware<\/h2>\n<p>Multiple technology platforms converging within a decentralized \u2018Web 3.0\u2019 (a new iteration of the internet incorporating concepts such as blockchain technology and token-based economics) threaten \u201ca more complex cyber threat landscape and a growing number of critical failure points\u201d.<a href=\"#_ftn5\" name=\"_ftnref5\"><sup>[5]<\/sup><\/a><\/p>\n<p>The dangers are not just financial. \u00a0They also pose challenges for fundamental pillars such as vital infrastructure and societal cohesion. \u00a0And there is no simple solution. \u00a0The World Economic Forum (WEF) warns how \u201cgrowing cyberthreats are outpacing societies\u2019 ability to effectively prevent and manage them\u201d.<\/p>\n<p>It highlights the example of software library Log4j, which in late 2021 was experiencing more than 100 hack attempts per minute within days of a critical security flaw being exposed. \u00a0The attacks demonstrated the contagious vulnerability of free access coding. \u00a0The previous year, the SolarWinds Orion attack targeted IT monitoring and management software, shattering the defenses of global cybersecurity supply chains \u2013 and hundreds of thousands of businesses \u2013 in its wake<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a>.<\/p>\n<p>Malicious activity online is spiraling, with perpetrators facing few barriers to entry and little chance of prosecution. \u00a0In 2020, reports of malware increased by 358%, while cases of ransomware increased by 435%.<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a> \u00a0The same period recorded a four-fold rise in the total amount of cryptocurrency snared by ransomware.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-109306\" src=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2.jpg\" alt=\"\" width=\"2169\" height=\"1412\" srcset=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2.jpg 2169w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2-300x195.jpg 300w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2-1024x667.jpg 1024w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2-150x98.jpg 150w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2-768x500.jpg 768w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2-1536x1000.jpg 1536w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2-2048x1333.jpg 2048w\" sizes=\"(max-width: 2169px) 100vw, 2169px\" \/><\/p>\n<p>Hackers are also able to blackmail targets via data leaks and distributed denial-of-service (DDoS) attacks, using resources from multiple remote locations to attack an organization&#8217;s online operations.<\/p>\n<p>Victims of digital exploitation to date have included public utilities, healthcare systems and data-rich companies \u2013 which these days includes most corporations of any scale.<\/p>\n<p>The problem will not resolve itself. \u00a0Looming AI-driven malware could potentially see extorted sums grow exponentially, heralding greater reputational as well as financial threats. \u00a0Little wonder that, as explored in our previous Abdul Latif Jameel <a href=\"https:\/\/alj.com\/en\/perspective\/order-from-chaos-can-we-de-risk-our-precarious-planet\/\">Perspectives article<\/a>, the Global Risks Perception Survey (GRPS) ranks \u2018cybersecurity failure\u2019 among the top 10 growing risks, or that 85% of the WEF\u2019s Cybersecurity Leadership Community believe it presents a major concern for public safety.<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a> \u00a0Regionally, \u2018cybersecurity failure\u2019 ranks as a top five risk across East Asia, the Pacific and Europe, with four countries (the UK, Ireland, Australia and New Zealand) declaring it risk number one.<\/p>\n<p>Future technological trajectories are causing concern. \u00a0Quantum computing could soon become powerful enough to break encryption keys, shattering this longstanding firewall protecting financial and personal data. \u00a0<a href=\"https:\/\/alj.com\/en\/perspective\/mastering-the-metaverse-a-beginners-guide\/\">The metaverse<\/a>, meanwhile, will provide more access points for hacks and data breaches. \u00a0With metaverse-based digital commerce tipped to exceed US$ 800 billion by 2024, these attacks will inevitably become more aggressive.<a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a><\/p>\n<h2>Priced out of protection<\/h2>\n<p>Whether one operates within the public or private sector, digital transformation risk mitigation comes at a price, and will be felt disproportionately by those who can least afford it. \u00a0Small or medium-sized businesses face having to spend 4%+ of their budgets on cybersecurity, while larger competitors exploiting economies of scale plan for investments of around 1-2%. \u00a0With ransomware so frequently in the headlines, cyber-insurance threatens to become cripplingly expensive or downright unaffordable to some. \u00a0In Q3 2021, cyber-insurance costs rose 96% in the US and 73% in the UK.<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a><\/p>\n<p>So, what strategies can businesses and governments put in place to soften the risks of the digital transformation while still extracting maximum value from its myriad opportunities?<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-109271\" src=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1588\" srcset=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-scaled.jpg 2560w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-300x186.jpg 300w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-1024x635.jpg 1024w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-150x93.jpg 150w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-768x476.jpg 768w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-1536x953.jpg 1536w, https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-2048x1271.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<h2>Hardening defenses against digital dilemma<\/h2>\n<p>It is important to safeguard the integrity of your systems. \u00a0In other words, keep those out who have no business being there, and prevent unwanted interference from parties with bad intentions.<\/p>\n<p>Here, several strategies are emerging as reliable defenses. \u00a0Chief among them is a process known as \u2018platform hardening\u2019, which encompasses several techniques for reducing vulnerability across servers and computers:<\/p>\n<ul>\n<li><strong>Network hardening<\/strong><em>:<\/em> Protecting digital infrastructure with hardware and software-based firewalls, featuring intruder prevention and alert controls.<\/li>\n<li><strong>Operating system hardening:<\/strong> Deleting obsolete services and erasing nonessential accounts, while ensuring security settings meet industry standards.<\/li>\n<li><strong>Remote systems hardening:<\/strong> Ensuring remote systems and devices have access protocols as robust as their in-house equivalents, and that these are frequently examined for emerging threats.<\/li>\n<li><strong>Database hardening:<\/strong> Employing access controls, encryption and advanced security settings to make critical databases less prone to malicious infiltration.<\/li>\n<li><strong>Application hardening:<\/strong> Adjusting the settings of third-party apps to guard against scripting attacks such as macros.<\/li>\n<\/ul>\n<p>All these protocols need frequent vulnerability testing to ensure ongoing protection against digital risks. \u00a0The benefits are many: stronger security, better performing systems, even streamlined compliance and auditing.<\/p>\n<p>Figures demonstrate the value of security prioritization. \u00a0One study shows more than half of organizations have suffered a data leak via external sources with remote access, while 61% of security breaches exploited a known vulnerability for which a patch was available but not deployed.<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a><\/p>\n<p>What would a secure digital policy look like? \u00a0According to experts like Dick Schrader, an IT security specialist at US software firm, Netwrix, a secure digital regime would be one where:<\/p>\n<ul>\n<li>old, under-used technology is regularly removed from servers<\/li>\n<li>platforms, networks and apps are individually shielded against unauthorized access<\/li>\n<li>cloud computing is protected with multi-factor authentication (MFA) for every user regardless of time\/productivity costs<\/li>\n<li>data is protected throughout an entire ecosystem, focusing on classification, retention, processing and encryption<\/li>\n<li>third-party technology integration, operations dependency and vendor resiliency are considered as part of a holistic digital transformation package<\/li>\n<li>privacy is paramount and personal data adheres to principles of consent, notice, choice and accuracy<\/li>\n<li>regulatory frameworks are respected, and breaches are evidenced forensically<\/li>\n<li>resilience is ensured by adequate planning for business continuity, crisis management and IT disaster recovery.<\/li>\n<\/ul>\n<p>A closeted, isolationist approach is unlikely to inspire the widespread changes needed. \u00a0Cooperation between companies and nations can reveal solutions applicable to almost every organization, with emerging tech such as blockchain and quantum computing providing particular promise.<\/p>\n<p>Within the business community, leaders must be trained in issues surrounding cybersecurity, while debates on cyber-resilience must become routine at board level.<\/p>\n<p>Above all, no digital transformation should be embarked upon without buy-in from the most important segment of any organization: its clients and customers. \u00a0If they are not ready for the transition, or if they are corralled into systems and services damaging to their experience, they are likely to find another option that meets their needs.<\/p>\n<p>Perhaps one of the unheralded threats of the digital changeover is simply getting it wrong, and alienating previously satisfied partners in the process.<\/p>\n<h2>Safeguarding a dynamic era of human progress<\/h2>\n<p>The accelerated shift to home working has advanced a trend which has been under way for the past two decades. \u00a0It is distinguished by a growing reliance on digital systems and an explosion in the number of enabling intermediary technologies including cloud servers, application programming interfaces (APIs) and others, each of which carries unique risks and susceptibilities. \u00a0Simultaneously, the demand for interconnected technologies continues to expand.<\/p>\n<p>External and seemingly uncontrollable factors serve to exacerbate the potential perils. \u00a0At government level, widening geopolitical rifts neuter the kind of coordinated international efforts that could safeguard future digital security. \u00a0Cross-border cyberattacks and ongoing misinformation campaigns are growing, with inadequate checks and balances to counter their spread. \u00a0Inconsistent laws and enforcement mechanisms across competing nations are notably failing to deter cybercrime.<\/p>\n<p>In a world which is increasingly \u2018VUCA\u2019 (volatile, uncertain, complex and ambiguous), private enterprises are too often having to \u2018read the tea leaves\u2019 to anticipate shifting international allegiances. \u00a0Businesses should remain open to the possibility of moving data processing to jurisdictions with a better grip on data privacy.<\/p>\n<p>Inaction against digital transformation risks could carry consequences far beyond the fate of individual organizations. \u00a0What if a devastating Trojan horse crypto virus, self-replicating and ever-mutating to avoid remedies, began commandeering major government or commercial servers, effectively reversing the digital progress of recent years? \u00a0What if the trend towards private IT infrastructure and cryptocurrency stymies regulatory efforts to protect financial systems and private data? \u00a0And what if cyber-espionage ultimately discourages R&amp;D investment, leaving society stuck in middle gear through lack of commercial confidence?<\/p>\n<p>The digital transition will eventually encompass every public body and every business, regardless of sector or size, yet certain industries must be mindful of the extra responsibilities they incur. \u00a0If one works in a business where an intimate knowledge of customers is salient to success \u2013 retailing or marketing, for instance \u2013 our pathway to a digitally-driven world carries both risk and reward. \u00a0Never before has there been such an abundance of opportunity for gathering monetizable data \u2013 nor so much pressure to keep those personal insights out of the wrong hands.<\/p>\n<blockquote><p><em>\u201cIn our ever more deeply connected society, digital trust is vital for long-term innovation and prosperity,\u201d <\/em>says Mo Chaara, Chief Information Digital Officer at Abdul Latif Jameel.<em> \u00a0\u201cAnd trustworthy technologies are the foundation on which we can build a fairer, more transparent, and more cohesive society. \u00a0Unless we keep working to strengthen digital trust and reduce the inherent risks of digital transformation, the promise and potential of one of the most exciting and dynamic eras of human progress could be lost.\u201d<\/em><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> <a href=\"https:\/\/resources.foundryco.com\/download\/digital-business-executive-summary\">https:\/\/resources.foundryco.com\/download\/digital-business-executive-summary<\/a><\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> <a href=\"https:\/\/blog.netwrix.com\/2023\/02\/22\/system-hardening\/\">https:\/\/blog.netwrix.com\/2023\/02\/22\/system-hardening\/<\/a><\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/risk\/in-ra-managing-risk-digital-transformation-1-noexp.pdf\">https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/risk\/in-ra-managing-risk-digital-transformation-1-noexp.pdf<\/a><\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> <a href=\"https:\/\/resources.foundryco.com\/download\/digital-business-executive-summary\">https:\/\/resources.foundryco.com\/download\/digital-business-executive-summary<\/a><\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> <a href=\"https:\/\/www.weforum.org\/reports\/global-risks-report-2022\/in-full\/chapter-3-digital-dependencies-and-cyber-vulnerabilities\/\">https:\/\/www.weforum.org\/reports\/global-risks-report-2022\/in-full\/chapter-3-digital-dependencies-and-cyber-vulnerabilities\/<\/a><\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\">https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know<\/a><\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> <a href=\"https:\/\/www.weforum.org\/reports\/global-risks-report-2022\/in-full\/chapter-3-digital-dependencies-and-cyber-vulnerabilities\/\">https:\/\/www.weforum.org\/reports\/global-risks-report-2022\/in-full\/chapter-3-digital-dependencies-and-cyber-vulnerabilities\/<\/a><\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> <a href=\"https:\/\/www.weforum.org\/reports\/global-risks-report-2023\/\">https:\/\/www.weforum.org\/reports\/global-risks-report-2023\/<\/a><\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> <a href=\"https:\/\/www.bloomberg.com\/professional\/blog\/metaverse-may-be-800-billion-market-next-tech-platform\/\">https:\/\/www.bloomberg.com\/professional\/blog\/metaverse-may-be-800-billion-market-next-tech-platform\/<\/a><\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> <a href=\"https:\/\/www.marsh.com\/bg\/en\/services\/insurance-market-and-placement\/insights\/global_insurance_market_index.html\">https:\/\/www.marsh.com\/bg\/en\/services\/insurance-market-and-placement\/insights\/global_insurance_market_index.html<\/a><\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> <a href=\"https:\/\/blog.netwrix.com\/2023\/02\/22\/system-hardening\/\">https:\/\/blog.netwrix.com\/2023\/02\/22\/system-hardening\/<\/a><\/p>\n","protected":false},"author":18,"featured_media":109299,"template":"","tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Reducing Risk in a Digital Future | Abdul Latif Jameel\u00ae<\/title>\n<meta name=\"description\" content=\"Explore strategies to reduce risks in digital transformation while maximizing opportunities, ensuring secure &amp; sustainable progress for society. Read more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reducing Risk in a Digital Future | Abdul Latif Jameel\u00ae\" \/>\n<meta property=\"og:description\" content=\"Explore strategies to reduce risks in digital transformation while maximizing opportunities, ensuring secure &amp; sustainable progress for society. Read more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/\" \/>\n<meta property=\"og:site_name\" content=\"Abdul Latif Jameel\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Abdul.Latif.Jameel.Official\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-26T10:15:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Digital-Risks-LI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/\",\"url\":\"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/\",\"name\":\"Reducing Risk in a Digital Future | Abdul Latif Jameel\u00ae\",\"isPartOf\":{\"@id\":\"https:\/\/alj.com\/en\/#website\"},\"datePublished\":\"2023-08-08T06:46:54+00:00\",\"dateModified\":\"2024-03-26T10:15:30+00:00\",\"description\":\"Explore strategies to reduce risks in digital transformation while maximizing opportunities, ensuring secure & sustainable progress for society. Read more.\",\"breadcrumb\":{\"@id\":\"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alj.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Perspectives\",\"item\":\"https:\/\/alj.com\/ja\/perspective\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Reducing risk in a digital future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alj.com\/en\/#website\",\"url\":\"https:\/\/alj.com\/en\/\",\"name\":\"Abdul Latif Jameel\",\"description\":\"Abdul Latif Jameel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alj.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reducing Risk in a Digital Future | Abdul Latif Jameel\u00ae","description":"Explore strategies to reduce risks in digital transformation while maximizing opportunities, ensuring secure & sustainable progress for society. Read more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/","og_locale":"en_US","og_type":"article","og_title":"Reducing Risk in a Digital Future | Abdul Latif Jameel\u00ae","og_description":"Explore strategies to reduce risks in digital transformation while maximizing opportunities, ensuring secure & sustainable progress for society. Read more.","og_url":"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/","og_site_name":"Abdul Latif Jameel","article_publisher":"https:\/\/www.facebook.com\/Abdul.Latif.Jameel.Official","article_modified_time":"2024-03-26T10:15:30+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Digital-Risks-LI.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/","url":"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/","name":"Reducing Risk in a Digital Future | Abdul Latif Jameel\u00ae","isPartOf":{"@id":"https:\/\/alj.com\/en\/#website"},"datePublished":"2023-08-08T06:46:54+00:00","dateModified":"2024-03-26T10:15:30+00:00","description":"Explore strategies to reduce risks in digital transformation while maximizing opportunities, ensuring secure & sustainable progress for society. Read more.","breadcrumb":{"@id":"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/alj.com\/en\/perspective\/reducing-risk-in-a-digital-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alj.com\/en\/"},{"@type":"ListItem","position":2,"name":"Perspectives","item":"https:\/\/alj.com\/ja\/perspective\/"},{"@type":"ListItem","position":3,"name":"Reducing risk in a digital future"}]},{"@type":"WebSite","@id":"https:\/\/alj.com\/en\/#website","url":"https:\/\/alj.com\/en\/","name":"Abdul Latif Jameel","description":"Abdul Latif Jameel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alj.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"post-meta-fields":{"push_notification":["no"],"_push_notification":["field_5c3b1fb67034d"],"_wpml_word_count":["{\"total\":2404,\"to_translate\":{\"ar\":2404,\"zh-hans\":2404,\"fr\":2404,\"ja\":2404,\"es\":2404,\"tr\":2404}}"],"_edit_lock":["1773930894:22"],"_edit_last":["25"],"_wpml_media_featured":["1"],"_wpml_media_duplicate":["1"],"_thumbnail_id":["109299"],"perspective_short_title":["Reducing risk in a digital future"],"perspective_summury":["<p>The vision of a fully connected, digitized world \u2013 an interlinked <em>ubernet<\/em> of everything spanning business, governance and leisure \u2013 comes laden with promises of innumerable societal benefits.<\/p>\n"],"perspective_location":["Dubai, UAE"],"wpcf-featured-news":["0"],"is_latest_news":["0"],"wpcf-show-news-at-homepage":["1"],"publish_mobile":["a:1:{i:0;s:3:\"yes\";}"],"_publish_mobile":["field_5bfa8eb2e65cf"],"mobile_featured_image":["https:\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_2083390783-scaled.jpg"],"_mobile_featured_image":["field_5c3b204983dea"],"featured_on_listing_page":["0"],"_featured_on_listing_page":["field_62458ea7383c3"],"content_series_applied":[""],"_content_series_applied":["field_60f3d3faf82ac"],"wpcf-perspective-downloadable_file":[""],"wpcf-perspective-published-date":["1691452800"],"wpcf-projecttitle":[""],"wpcf-projectdescription":[""],"wpcf-projectimage-video1":["image"],"wpcf-projectimage-1":[""],"wpcf-projectvideo-1":[""],"wpcf-projectdescription-1":[""],"wpcf-projectimage-video2":["image"],"wpcf-projectimage-2":[""],"wpcf-projectvideo-2":[""],"wpcf-projectdescription-2":[""],"wpcf-projectimage-video3":["image"],"wpcf-projectimage-3":[""],"wpcf-projectvideo-3":[""],"wpcf-projectdescription-3":[""],"wpcf-projectimage-video4":["image"],"wpcf-projectimage-4":[""],"wpcf-projectvideo-4":[""],"wpcf-projectdescription-4":[""],"wpcf-video-description":[""],"wpcf-layoutvideourl":[""],"wpcf-video-thumb":[""],"wpcf-social4-svg":[""],"wpcf-social4-background-image":[""],"wpcf-social4-text":[""],"wpcf-social4-url":[""],"wpcf-social3-svg":[""],"wpcf-social3-background-image":[""],"wpcf-social3-text":[""],"wpcf-social3-url":[""],"wpcf-social-text-svg-square":[""],"wpcf-social-text-image-square":[""],"wpcf-social-text-text-square":[""],"wpcf-social-text-url-square":[""],"wpcf-social2-svg":[""],"wpcf-social2-background-image":[""],"wpcf-social2-text":[""],"wpcf-social2-url":[""],"wpcf-social-svg-square":[""],"wpcf-social-image-square":[""],"wpcf-social-text-square":[""],"wpcf-social-url-square":[""],"wpcf-social1-svg":[""],"wpcf-social1-background-image":[""],"wpcf-social1-text":[""],"wpcf-social1-url":[""],"wpcf-quotes-with-auther-text-1":[""],"wpcf-card_article_with_title_content":[""],"wpcf-card_article_content":["write your content"],"wpcf-quotes-with-auther-text":[""],"_bsf_post_type":["0"],"_bsf_item_review_type":["none"],"_yoast_wpseo_title":["Reducing Risk in a Digital Future | Abdul Latif Jameel\u00ae"],"_yoast_wpseo_metadesc":["Explore strategies to reduce risks in digital transformation while maximizing opportunities, ensuring secure & sustainable progress for society. Read more."],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_estimated-reading-time-minutes":[""],"_yoast_wpseo_wordproof_timestamp":[""],"_wp_old_date":["2023-08-07"],"_yoast_wpseo_opengraph-image":["https:\/\/media.alj.com\/app\/uploads\/2023\/08\/Digital-Risks-LI-1024x535.jpg"],"_yoast_wpseo_opengraph-image-id":["109333"],"perspective_business_sector":["Corporate"],"wpcf-card-image":[""],"_wpcf-card-image-sort-order":["a:1:{i:0;i:1731945;}"],"amazonS3_cache":["a:10:{s:64:\"\/\/alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-scaled.jpg\";a:2:{s:2:\"id\";i:109292;s:11:\"source_type\";s:13:\"media-library\";}s:70:\"\/\/media.alj.com\/app\/uploads\/2023\/08\/shutterstock_1536079445-scaled.jpg\";a:2:{s:2:\"id\";i:109292;s:11:\"source_type\";s:13:\"media-library\";}s:80:\"\/\/alj.com\/app\/uploads\/2023\/08\/Deloitte\u0393COs-digital-risk-framework-v2-scaled.jpg\";a:2:{s:2:\"id\";i:109285;s:11:\"source_type\";s:13:\"media-library\";}s:86:\"\/\/media.alj.com\/app\/uploads\/2023\/08\/Deloitte\u0393COs-digital-risk-framework-v2-scaled.jpg\";a:2:{s:2:\"id\";i:109285;s:11:\"source_type\";s:13:\"media-library\";}s:59:\"\/\/alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2.jpg\";a:2:{s:2:\"id\";i:109278;s:11:\"source_type\";s:13:\"media-library\";}s:65:\"\/\/media.alj.com\/app\/uploads\/2023\/08\/Data-security-strategy-v2.jpg\";a:2:{s:2:\"id\";i:109278;s:11:\"source_type\";s:13:\"media-library\";}s:72:\"\/\/alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2.jpg\";a:2:{s:2:\"id\";i:109306;s:11:\"source_type\";s:13:\"media-library\";}s:78:\"\/\/media.alj.com\/app\/uploads\/2023\/08\/Total-Cryptocurrency-Value-Received-v2.jpg\";a:2:{s:2:\"id\";i:109306;s:11:\"source_type\";s:13:\"media-library\";}s:105:\"\/\/alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-scaled.jpg\";a:2:{s:2:\"id\";i:109271;s:11:\"source_type\";s:13:\"media-library\";}s:111:\"\/\/media.alj.com\/app\/uploads\/2023\/08\/Cyber-security-digitalization-creates-opportunities-and-risks-v2-scaled.jpg\";a:2:{s:2:\"id\";i:109271;s:11:\"source_type\";s:13:\"media-library\";}}"]},"_links":{"self":[{"href":"https:\/\/alj.com\/en\/wp-json\/wp\/v2\/perspective\/109270"}],"collection":[{"href":"https:\/\/alj.com\/en\/wp-json\/wp\/v2\/perspective"}],"about":[{"href":"https:\/\/alj.com\/en\/wp-json\/wp\/v2\/types\/perspective"}],"author":[{"embeddable":true,"href":"https:\/\/alj.com\/en\/wp-json\/wp\/v2\/users\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alj.com\/en\/wp-json\/wp\/v2\/media\/109299"}],"wp:attachment":[{"href":"https:\/\/alj.com\/en\/wp-json\/wp\/v2\/media?parent=109270"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alj.com\/en\/wp-json\/wp\/v2\/tags?post=109270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}