Last Updated on May 24, 2015

Cyber Incident
Cyber incidents by defense spending type, 2013. Source: Deloitte Global Defense Outlook 2014

Deloitte has just released the Global Defense Outlook 2014. This independently developed report examines policies, practices, and trends affecting the defense ministries of 50 nations, and has been developed with publicly available information along with interviews with officials in government and industry, and analyses by Deloitte’s global network of defense professionals.

A section of the report is dedicated to Cyber Operations, and, as one of their publicly available data sources, Deloitte used data from my blog.

The structured analysis of the data confirms a trend: Cyber-operations are nowadays considered a national security threat across the globe.

  • The global threat to computer systems and information networks is earning more attention and policy response from defense ministries worldwide.
  • More than 60 percent of cyberattacks are directed against other Top 50 nations and that more than 20 percent of cyberattacks are directed against non-Top 50 nations. Developing economy status does not protect a nation against the prospect of a cyberattack.
  • Among the higher-income nations in the Top 50, industrial targets account for one-half to two-thirds of cyberattacks, while among the lower-income nations in the Top 50, most cyberattacks are directed against government targets. This difference may reflect the relatively high level of security and defensive capability around government systems in higher-income nations and the availability of potentially lucrative industrial targets. The difference may also reflect the relatively higher number of state-owned enterprises in the lower-income nations.
  • Cyber Operations are no longer the domain of higher-income Top 50 nations.
Cyber Incidents Target
Cyber incidents by target and defense spending type, 2013. Source: Deloitte Global Defense Outlook 2014

A really interesting reading, and not only for its implications in Cyber Space. The complete report can be found at this link.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.