Submitted:
21 September 2024
Posted:
24 September 2024
You are already at the latest version
Abstract
Keywords:
Introduction
The Rise and Impact of Increased Cyber Threats on U.S. National Security and the Economy
Reasons For Increased Threats
Emerging Technologies
Risks Associated with Emerging Technolgies
The Need for Advanced Risk Mitigation Tools
Cybersecurity Skills Gap
The Growing Need for Cybersecurity Professional
The Critical Shortage of Cybersecurity Professionals
Corporate Strategists' Role in Attracting Cybersecurity Talent
Conclusions
Recommendations
Enhancing cybersecurity education and Workforce development
Enforcing Stronger Cybersecurity Regulations
Improving Incident Response and Recovery Planning
Promoting International Cooperation on cybersecurity
References
- Accenture. (2023). 2023 Cyber threat intelligence report. https://www.accenture.com/us-en/insights/security/cyber-threat-intelligence.
- AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. [CrossRef]
- Balasundaram, A., Routray, S., Prabu, A. V., Krishnan, P., Malla, P. P., & Maiti, M. (2023). Internet of things (IoT)-based smart healthcare system for efficient diagnostics of health parameters of patients in emergency care. IEEE Internet of Things Journal, 10(21), 18563–18570. [CrossRef]
- Burgett H. Michael. (2023). Special Report: The Cost of a Data Breach in 2023. The National CIO Review. https://nationalcioreview.com/articles-insights/information-security/special-report-the-cost-of-a-data-breach-in-2023/.
- Capraro, V., Lentsch, A., Acemoglu, D., Akgun, S., Akhmedova, A., Bilancini, E., Bonnefon, J.-F., Brañas-Garza, P., Butera, L., Douglas, K. M., Everett, J., Gigerenzer, G., Greenhow, C., Hashimoto, D., Holt-Lunstad, J., Jetten, J., Johnson, S., Kunz, W. H., Longoni, C., … Viale, R. (2024, January 18). The impact of generative artificial intelligence on Socioeconomic Inequalities and policy making. SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4666103. [CrossRef]
- Cisco. (2023). Cybersecurity trends and emerging threats for 2023.
- Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165. [CrossRef]
- CSIS. (2024). Significant cyber incidents: Strategic technologies program. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents.
- CyberSeek. (2023). Cybersecurity Supply/Demand Heat Map. Retrieved from https://www.cyberseek.org/heatmap.html.
- Deloitte. (2023). Future of cyber survey 2023.
- Dey, S., & Hossain, A. (2023). Cybersecurity in the era of Industry 4.0: A review on emerging threats, vulnerabilities, and countermeasures. IEEE Access, 11, 31317-31337.
- Dhirani, L. L., Mukhtiar, N., Chowdhry, B. S., & Newe, T. (2023). Ethical dilemmas and privacy issues in emerging technologies: A Review. Sensors, 23(3), 1151. [CrossRef]
- Fuentes-Peñailillo, F., Gutter, K., Vega, R., & Silva, G. C. (2024). Transformative technologies in digital agriculture: Leveraging Internet of Things, remote sensing, and artificial intelligence for smart crop management. Journal of Sensor and Actuator Networks, 13(4), 39. [CrossRef]
- Gartner. (2023). Cybersecurity Strategy: An Ultimate Guide for CISOs. Retrieved from https://www.gartner.com/en/cybersecurity.
- Gartner. (2023). Top cybersecurity trends for 2023-2024.
- Gupta, P., Ding, B., Guan, C., & Ding, D. (2024, February 15). Generative AI: A systematic review using topic modelling techniques. Data and Information Management. https://www.sciencedirect.com/science/article/pii/S2543925124000020. [CrossRef]
- Hollis, D. B., & Waxman, M. C. (2018). Promoting international cybersecurity cooperation: lessons from the proliferation security initiative. Temp. Int'l & Comp. LJ, 32, 147.
- IBM Security. (2023). Cost of a Data Breach Report 2023. Retrieved from https://www.ibm.com/security/data-breach.
- IBM. (2022). Quantum safe cryptography and security.
- ISC². (2022). 2022 Cybersecurity Workforce Study. https://www.isc2.org/Research/Workforce-Study.
- ISC². (2022). Cybersecurity Workforce Study. International Information System Security Certification Consortium. Retrieved from https://www.isc2.org/Research/Workforce-Study.
- Jaiswal, A., Kandpal, M., Shukla, A. K., Mohan, S., & Vijayakumar, P. (2022). Zero trust architecture: A new era approach to mitigate advanced persistent threats. Security and Communication Networks, 2022, 1-14.
- Kaswan, K. S., Dhatterwal, J. S., Baliyan, A., & Rani, S. (2023). Quantum Computing. [CrossRef]
- KPMG. (2021). Shape the Future Cyber Security Workforce. Retrieved from https://home.kpmg/xx/en/home/insights/2021/08/shape-the-future-cyber-security-workforce.html.
- Kumar, T., Bhushan, S., Sharma, P., & Garg, V. (2024). Examining the vulnerabilities of biometric systems. Leveraging Computer Vision to Biometric Applications, 34–67. [CrossRef]
- Maity, S., Bera, P., & Ghosh, S. K. (2022). A comprehensive survey of cyberattack and defense strategies in IoT-enabled smart city applications. IEEE Transactions on Industry Applications, 58(6), 7326-7343.
- Mishra, R., Mishra, P. S., Mazumder, R., Mazumder, A., & Varshney, S. (2024). Quantum computing and its promise in Drug Discovery. Drug Delivery Systems Using Quantum Computing, 57–92. [CrossRef]
- Muro, M., Maxim, R., & Whiton, J. (2022). The cybersecurity workforce gap. Brookings Institution.
- NIST. (2022). Zero trust architecture. https://www.nist.gov/publications/zero-trust-architecture.
- Oguta, G. C. (2024). Securing the Virtual Marketplace: Navigating the landscape of security and privacy challenges in e-commerce. GSC Advanced Research and Reviews, 18(1), 084–117. [CrossRef]
- Prevalent’s 2024 third-Party Risk Management Study. Prevalent. (2024). https://www.prevalent.net/news/prevalents-2024-third-party-risk-management-study/.
- Roslan, F. A. B. M., & Ahmad, N. B. (2023). The Rise of AI-Powered Voice Assistants: Analyzing Their Transformative Impact on Modern Customer Service Paradigms and Consumer Expectations. Quarterly Journal of Emerging Technologies and Innovations, 8(3), 33–64. Retrieved from https://vectoral.org/index.php/QJETI/article/view/19.
- Saeed, M. M., Ali, E. S., & Saeed, R. A. (2023). Data-driven techniques and security issues in wireless networks. Data-Driven Intelligence in Wireless Networks, 107–154. [CrossRef]
- Sharma, P. (2024). Enforcing Network Security Policies in the Context of the NIST Cybersecurity Framework and Its Legal Implications. Network Security, 2024(7), 22-27.
- Singh, D. (2023). Internet of Things. Factories of the Future, 195–227. [CrossRef]
- Sonko, S., Ibekwe, K. I., Ilojianya, V. I., Etukudoh, E. A., & Fabuyide, A. (2024). Quantum cryptography and U.S. Digital Security: A comprehensive review: Investigating the potential of quantum technologies in creating unbreakable encryption and their future in national security. Computer Science & IT Research Journal. https://www.fepbl.com/index.php/csitrj/article/view/790. [CrossRef]
- St. John, M., & Chatterjee, A. (2024, April 17). Cybersecurity stats: Facts and figures you should know. Forbes. https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/.
- Staves, A., Anderson, T., Balderstone, H., Green, B., Gouglidis, A., & Hutchison, D. (2022). A cyber incident response and recovery framework to support operators of industrial control systems. International Journal of Critical Infrastructure Protection, 37, 100505. [CrossRef]
- Strategic cybersecurity talent framework. World Economic Forum. (2024). https://www.weforum.org/publications/strategic-cybersecurity-talent-framework/.
- Talamantes, J. (2023). The cybersecurity skills gap: Addressing the talent shortage in 2023. Dark Reading.
- Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2023). A comprehensive survey of the Internet of Things (IoT) cybersecurity: Attacks, countermeasures, and challenges. Sensors, 23(2), 874.
- Thakur, M. (2024). Cyber security threats and countermeasures in Digital age. Journal of Applied Science and Education (JASE). https://jase.a2zjournals.com/index.php/ase/article/view/42. [CrossRef]
- Towfighi, J. (2024, April 12). Roku says 576,000 accounts breached in Cyberattack CNN business. CNN. https://www.cnn.com/2024/04/12/business/roku-security-breach-user-accounts/index.html.
- Vajjhala, N., & Strang, K. D. (2023). Cybersecurity for Decision Makers. CRC Press.
- Wade, T. J. (2024, June 1). Transformers and tradition: Using generative AI and Deep Learning for Financial Markets Prediction. LSE Theses Online. https://etheses.lse.ac.uk/4657/.
- World Economic Forum. (2023). Global cybersecurity outlook 2023. https://www.weforum.org/reports/global-cybersecurity-outlook-2023/.
- Yigit, Y., Buchanan, W. J., Tehrani, M. G., & Maglaras, L. (2024, March 19). Review of generative AI methods in Cybersecurity. arXiv.org. https://arxiv.org/abs/2403.08701.
- Zammitti, A., Imbrogliera, C., Russo, A., & Zarbo, R. (2023). The cybersecurity skills gap: A systematic review. Future Internet, 15(3), 95.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).