Across
- 3. Computing Data breaches, third party vendor risks, data sovereignty risk and service outages
- 5. Security vulnerabilities in faster networks, increased dependency on connected devices and data interception
- 6. Automation errors, lack of human oversight, cyber vulnerabilities
- 9. Increased attack surface linked to bio-technologies, device vulnerabilities, data security and privacy concerns
Down
- 1. Regulatory uncertainty, scalability challenges, smart contract vulnerabilities.
- 2. Security of virtual environments, fraud in immersive platforms, and privacy issues
- 4. Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
- 7. Privacy concerns, data theft, spoofing attacks and regulatory scrutiny
- 8. Potential to break current cryptographic systems which may lead to data breaches and fraud
