Cybersecurity is no longer a niche IT risk in the more connected, more mobile, and more digital world; it is at the centre stage in risk management, compliance, and national security. Cyber threats have presented new, advanced challenges to organisations across all sectors, most significantly on the fronts of artificial intelligence (AI), cyber war, and the increasingly advanced array of connected devices and cloud-based services. They view and tackle these advances as the number one priority for compliance professionals and regulatory lawyers whose job it is to provide data integrity and regulatory compliance.
The Future Threat of AI-Driven Cyberattacks
Artificial intelligence is redefining the threat scenario, and cyber-attackers are now able to scale and automate cyber-attacks more quickly and effectively than before. AI-powered phishing emails, deepfakes, and malware cloning are on the rise and threatening organisations' information, business operations, and reputation. For instance, AI technology can be used to generate very sophisticated emails targeted at a specific recipient and thus make conventional phishing filters obsolete. Similarly, AI voice and video can be used to avoid identity checks and deceive banks, like in the case of using a 2021 deepfake voice to authenticate a forged €200,000 payment. The effects of abuse of AI on compliance are mindboggling. AI identity fraud also has the potential to result in non-compliance with global data protection regulations like the EU General Data Protection Regulation (GDPR) and California Privacy Rights Act (CPRA) based on unauthorised access to personal information.
Organisations will also have to factor third-party service provider AI technology into their total vendor risk management strategy. Prevention through the use of AI-based behaviour analytics, employee education to identify social engineering tactics, and cooperation with the government regulators in governance of AI is required to fight this emerging threat (Brundage et al., 2018).
Cyber Warfare and Geopolitics
State weaponisation of cyberspace is a new geopolitical frontier. Cyberattacks have emerged as a strategic choice exercised to annihilate key infrastructure, intrude into political processes, and plunder intellectual property. Russia and Ukraine's power grid and satellite communications cyberattack is a classic example where cyberattacks and traditional military actions were employed. North Korea's Lazarus Group and Iran's APT33 have also been linked with ransomware attacks and intellectual property theft on banks and public infrastructure globally.
Legally and from a compliance perspective, cyber war poses a host of challenges. Companies must watch out for potential violations of international sanctions law, such as that of the U.S. OFAC and the European Union, if they unknowingly do business with individuals associated with enemy cyber operations. In addition, incident-reporting obligation-triggering regimes, such as the EU's NIS2 Directive and the U.S. SEC cybersecurity disclosure regulation, require organisations to disclose in a rush a state-sponsored attack. Effective mitigations include overlaying cybersecurity controls on the MITRE ATT&CK framework, simultaneous threat intelligence to keep pace with geopolitical actions, and having procedures in place to interact with law enforcement and regulators (Carnegie Endowment for International Peace, 2023).
IoT and Cloud Infrastructure: Expanding Attack Surface
Exponential increases in the adoption of cloud and Internet of Things (IoT) devices have increased the digital attack surface exponentially. IoTs - ranging from smart home automation devices to industrial sensors - lack security controls like firmware patching and encryption. This vulnerability came starkly to the fore with the 2016 Mirai botnet attack when tens of thousands of exposed IoT devices were infected, millions of, and turned against large internet infrastructure providers.
Cloud platforms themselves will come under threat from the same risks of misconfigured storage, overly permissive user privileges, and poor segregation of sensitive data. Gartner states that in the overwhelming majority of cloud security breaches up to and through 2025, user misconfigurations will be to blame for the breaches, not something having gone amiss with the cloud provider's infrastructure. Additionally, the requirements of compliance with data sovereignty and residency in countries like Brazil, China, and India require strict oversight of where and how the cloud data is processed and stored.
Organisations have to put in place technical and governance controls at the same time in order to neutralise these exposures. These include putting in place Zero Trust models of security, performing regular security scans, cloud configurations according to CIS guidelines, and the selection of IoT devices that comply with standard cybersecurity specifications like ETSI EN 303 645 or NIST SP 800-213 (Sicari et al., 2018). Such oversight, apart from elevating the exposure to data breaches, leaves organisations open to regulatory penalties and damage to reputation.
Strategic Governance and Compliance Imperatives
In order to address the convergence of these emerging cybersecurity threats, organisations must integrate cybersecurity into enterprise risk management and compliance programs. Positioning cyber risk assessments in broader registers of risk, particularly within the financial services sector, healthcare, and energy sectors, puts legal and compliance groups one step ahead and not in catch-up mode. This includes policy updates with controls for the prevention of misuse of AI, improving geopolitical threats capability, and harmonising cloud and IoT governance procedures.
The high-level mandate is also a regulatory interaction. With the soon-to-be EU AI Act, revisions of the US cybersecurity disclosure regulation, and more enforcement action expected to come from the data protection regulators, chief compliance officers have much to keep up with in international legal development. Interaction with industry groups, public-private partnerships, and border-hopping compliance platforms will prepare the organisations to advise and track the evolution of regulatory requirements. These prudent steps involve cross-functional collaboration mainly between the compliance, information security, procurement, and executive management.
Conclusion
These new cyber threats are no longer abstract but already a reality, reshaping compliance demands, risk profiles, and regulatory priorities. With AI being a dual-use technology, cyber war driving geopolitical tensions, and the cyber realm increasingly interconnected through IoT and cloud infrastructure, organisations need to shift from tactical to strategic cyber risk management.
To compliance professionals and attorneys, it would mean more than check-the-box security compliance reviews and a promise to an intelligence-driven, balanced approach. It is only by injecting technical foresight and well-founded legal and governance precepts that firms can safeguard not just their business processes, but their legal standing and stakeholder confidence in a changing digital landscape.
What's Your Reaction?
CRCGS