Trends Identified

Cyber security
Shopping media, and publishing, but also democratic processes such as elections, are moving online. This can only work with a high level of trust. Furthermore, the same holds for many future sectorial infrastructures, processes, and resources, like sewage systems or smart buildings, that will be adaptive, distributed, collaborative, and efficiently controlled. They will depend on ICT and cloud infrastructure and services that must be reliable, predictable and always available, ensuring confidentiality and protection of privacy and being capable to react to cyber threats in real time.
2015
Preparing the Commission for future opportunities - Foresight network fiches 2030
European Strategy and Policy Analysis System (ESPAS)
Cyber security
Resilience in the age of rising cyber breaches
2017
Top 50 Emerging Technologies 2017
Frost & Sullivan
Cyber threats
40% of responding CEOs answered that they were 'extremely concerned'
2018
Global CEO survey
PWC
Cyber-security
Moving from background technology to a priority business discipline With intellectual property now fully convertible to ones and zeros, it was only a matter of time before defending enterprise information assets became a key concern. For too many years, security has been relegated to the technology agenda and accorded only marginal attention and budget by many organizations. Most perceived the threat to be containable, where a protect-the-perimeter approach was deemed sufficient. Responses were reactive, both to incidents and compliance requirements.
2010
Depth perception A dozen technology trends shaping business and IT in 2010
Deloitte
Cybersecurity
With the increased connectivity and use of standard communications protocols that come with Industry 4.0, the need to protect critical industrial systems and manufacturing lines from cybersecurity threats increases dramatically. As a result, secure, reliable communications as well as sophisticated identity and access management of machines and users are essential.
2015
Nine Technologies Transforming Industrial Production
Boston Consulting Group (BCG)
Cybersecurity
The increase in connectivity between companies and consumers as well as within organizations, production facilities, transportation systems, defense systems, etc. means that cybersecurity is critically important. Once closed systems are now open, increas­ing vulnerability and placing ever higher-value assets and processes at risk, leading to an annual growth in the market for cybersecurity of 5 to 10 percent until 2025 (see Exhibit 4). Our survey revealed widespread and growing concern on this topic, and many companies are starting to bring in the skills they need for tackling cybersecurity concerns. Some even see cybersecurity as a battleground for competitive advantage and differentiation.
2018
Disruptive forces in the industrial sectors - Global executive survey
McKinsey
Cybersecurity technologies and processes are helping to combat unabated threats
Advances in technology reduce the risk of a bad actor penetrating systems, but the threat is still there, and is not going away. To this end, cybersecurity remains in the limelight, and with newer regulatory disclosure requirements, 2019 could be a tumultuous year. Over the past few years, several high-profile events caused by cyberattacks and geopolitical tensions have elevated the threat of cyber warfare. Significantly, public perspective has shifted from identity theft to general privacy and the misuse of personal information obtainable on social media. With increased public awareness, there is also concern about breach fatigue: people could become so accustomed to cybersecurity events that they lower their defense against them. Training, engaging and testing employees is the cornerstone of any cybersecurity strategy. This helps to breed a culture of security so people do not fall victim to phishing or violate policies by clicking on links embedded by hackers. From a technology perspective, employees are being empowered to operate securely without impacting their productivity. Newer authentication technologies such as YubiKey, one-touch single sign on and one-touch multifactor authentication are driving down the poor user experience associated with legacy security products. With YubiKey, the user inserts a USB device into a port and presses a button to send a code to the service that the user is authenticating. Some apps on iOS and Android offer a similar experience where the user receives prompts during the authentication process. The user clicks allow, and if that device is trusted, the authentication succeeds. Another notable trend is security feature development being moved toward the beginning of the development lifecycle instead of tacking it on at the end, known as “shift left”. This is being driven partially by the adoption of the development and operations (DevOps) model, in which there is an agile relationship between product development and IT operations. Another driver is the use of application containers and container automation, which provides isolated environments for running software services and the means to maintain security governance with fewer costly and time consuming manual reviews. Ultimately, the time to remediation for vulnerabilities is being reduced dramatically, making it easier for organizations to maintain a secure posture on their network perimeter.
2019
NASDAQ DECODES: TECH TRENDS 2019 -The technology trends that are driving the world of markets forward
Nasdaq
Cyberspace
From a national defence perspective, a number of underlying themes emerge. Offensive cyberspace capabilities will be used to penetrate and attack electronic-rich systems, networks and infrastructure. Recognition of malign intent and attribution will often be difficult. As civilian and military environments become increasingly dependent on integrated networks, and with space-based assets exclusively relying on the electromagnetic spectrum to receive or transmit data, the impact of cyber-attacks is likely to range from incremental to catastrophic.
2010
Global strategic trends - out to 2040
UK, Ministry of Defence
Dark analytics - Illuminating opportunities hidden within unstructured data
Across enterprises, ever-expanding stores of data remain unstructured and unanalyzed. Few organizations have been able to explore nontraditional data sources such as image, audio, and video files; the torrent of machine and sensor information generated by the Internet of Things; and the enormous troves of raw data found in the unexplored recesses of the “deep web.” However, recent advances in computer vision, pattern recognition, and cognitive analytics are making it possible for companies to shine a light on these untapped sources and derive insights that lead to better experiences and decision making across the business.
2017
Tech trends 2017 - the kinetic enterprise
Deloitte
DARQ Power
Understanding the DNA of DARQ.New technologies are catalysts for change, offering businesses extraordinary new capabilities. Distributed ledger technology, artificial intelligence, extended reality, and quantum computing will be the next set of new technologies to spark a step change, letting businesses reimagine entire industries.
2019
Accenture Technology Vision 2019- The Post-Digital Era is Upon Us ARE YOU READY FOR WHAT’S NEXT?
Accenture