July 11, 2017 By Shane Schick 2 min read

Critical U.S. infrastructure will be hit by a major cyberattack in the next two years, according to a survey of experts who attended the annual Black Hat security conference in the last two years.

Published just a few weeks before this year’s Black Hat event in Las Vegas, the survey, titled “Portrait of an Imminent Cyberthreat,” showed that only 26 percent of respondents believe U.S. infrastructure will be adequately protected by government and defense forces.

The nearly 600 security experts polled also reported concerns about the vulnerability of their own organizations. Two-thirds said they expect to be hit by a data breach in the next year, and 70 percent reported that staffing limitations will make it difficult to respond to a security incident. Meanwhile, 60 percent said their budgets aren’t keeping pace with the increasing sophistication of attacks.

US Infrastructure Vulnerable to Classic Scams

While it’s impossible to predict precisely how threat actors might strike U.S. infrastructure, 50 percent of those surveyed indicated that they were most concerned about social engineering and phishing schemes that dupe users into handing over access credentials. While the recent WannaCry and NotPetya attacks have made huge headlines recently, Black Hat attendees had already pegged ransomware as the fastest-rising threat.

Of course, there are plenty of established products and services to fend off cyberattacks, but the survey participants recognized the need for greater customization in their threat mitigation strategies. Sixty-one percent said corporations should fend off fraudsters with their own specialized online defenses. That’s probably because 45 percent reported that attacks are becoming more targeted at specific firms and pieces of U.S. infrastructure than ever before.

Conventional Wisdom Confirmed

Some of the report’s findings confirmed conventional wisdom about enterprise security. For example, 38 percent cited their own employees as a major weak spot in protecting information, while 39 percent suggested that insider threats may be more dangerous than third parties targeting U.S. infrastructure.

Perhaps the biggest worry, according to SDxCentral, is the gap between IT and management when it comes to the potential severity of cyberattacks. While compliance issues may remain top of mind for boards and CEOs, for instance, technology professionals want them to pay greater attention to data breaches.

You can be sure that topic, as well as other data points included in this survey, will generate at lot of buzz at the upcoming Black Hat conference.

More from

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

How red teaming helps safeguard the infrastructure behind AI models

4 min read - Artificial intelligence (AI) is now squarely on the frontlines of information security. However, as is often the case when the pace of technological innovation is very rapid, security often ends up being a secondary consideration. This is increasingly evident from the ad-hoc nature of many implementations, where organizations lack a clear strategy for responsible AI use.Attack surfaces aren’t just expanding due to risks and vulnerabilities in AI models themselves but also in the underlying infrastructure that supports them. Many foundation…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today