background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Global Cybersecurity Outlook | Davos | #WEF22"

input logo icon
Video tags
|

Video tags

sustainable global goals
climate change
sustainability
davos agenda
World Economic Forum
Davos
politics
finance
economy
news
leadership
democracy
education
4IR
technology
tech
AI
automation
work
future
world news
economist
world
forum
economic
world news today
worldeconomicforum
recommended for you
globalization
robotics
bloomberg
documentary
cyber security
fairer economies
davos 2022
wef22
davos
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:00
hello everyone i'm karen cho anchor for
00:00:02
cnbc thank you so much for joining us
00:00:04
today for this important session we
00:00:07
welcome all west stakeholders as well as
00:00:09
we turn the spotlight on cyber security
00:00:12
cyber attacks as you know are not new
00:00:14
but the threat level has increased as we
00:00:16
think about a changing digital and
00:00:18
geopolitical landscape
00:00:20
a huge shift to remote working during
00:00:22
the pandemic more data moved to the
00:00:24
cloud a rise in e-commerce and financial
00:00:27
transactions online more and more
00:00:29
connected devices and an increased
00:00:32
geopolitical threat with the war in
00:00:34
ukraine
00:00:35
over the next 45 minutes of this session
00:00:37
we'll discuss how leaders can prepare
00:00:39
for future cyber attacks
00:00:41
just a quick housekeeping matter if you
00:00:43
do want to connect with this debate
00:00:45
hashtag wef22 is the one that you can
00:00:48
use we'll also open up the discussion in
00:00:51
about 20 minutes time so be ready with
00:00:53
some questions
00:00:54
let me introduce you to our panelists
00:00:56
today jurgen stock secretary general for
00:00:59
interpol france
00:01:00
josephine teo minister for
00:01:02
communications and information of
00:01:04
singapore
00:01:06
chandra prakesh gurnani who is managing
00:01:08
director ceo of tech mahindra and robert
00:01:11
lee ceo and founder dragos from the
00:01:14
states
00:01:15
well first up jurgen let me turn it to
00:01:17
you
00:01:18
the world economic forum global security
00:01:20
outlook report indicates that cyber
00:01:23
attacks over the past year we're up to
00:01:25
125 percent
00:01:28
how do you assess the cyber security
00:01:30
risk as we now also weigh up the threat
00:01:32
of state-sponsored attacks
00:01:35
yeah thank you very much i think there's
00:01:36
no reason to sound the all clear
00:01:40
the statistics are suffering from the
00:01:43
fact that of course still many of the
00:01:46
companies many of the victims are not
00:01:48
reporting the incidents to the police or
00:01:51
to national
00:01:52
agencies so we are still struggling that
00:01:54
all the information maybe comes from the
00:01:57
roughly between five and ten percent of
00:01:58
the cases that are reported um to law
00:02:00
enforcement i think there is no doubt
00:02:03
that the threat is increasing
00:02:05
we see criminal groups continuing
00:02:08
acting in a more sophisticated way
00:02:11
the way in which they organize it
00:02:12
themselves is very different from the
00:02:14
traditional mafia style you know where
00:02:16
people know each other maybe same family
00:02:18
same region
00:02:20
here it's like the yellow pages in the
00:02:22
internet where you offer your
00:02:23
specialization they connect for a
00:02:25
specific attack and then they they
00:02:28
change uh which also makes it for law
00:02:30
enforcement even more important on the
00:02:32
one hand so this is becoming more
00:02:35
sophisticated more difficult also
00:02:37
because it's global by nature and of
00:02:39
course law enforcement we still operate
00:02:41
mainly in our national jurisdictions on
00:02:44
the other hand i think the major risk is
00:02:46
still not that much it's security in a
00:02:49
way of
00:02:50
technical issues it's human failure that
00:02:53
opens the door for criminals to attack
00:02:55
the systems to take
00:02:57
data hostage
00:02:59
one victimization a second victimization
00:03:02
with the data and as the world is
00:03:05
becoming more connected we have been
00:03:07
discussing that here the web a number of
00:03:09
times the challenge is still how do we
00:03:12
connect the various dots that need to be
00:03:14
connected that allow us to share
00:03:16
information in real time to allow us to
00:03:18
be prepared for the next attack which
00:03:20
will come it's only a matter of time so
00:03:22
that that is primarily the challenge if
00:03:24
i can just follow quickly what is the
00:03:26
link between state-sponsored cyber
00:03:29
attacks and the criminal underworld
00:03:31
i mean first of all i have to say that
00:03:32
interpol is focusing on criminal
00:03:34
activity so those perhaps 80 percent
00:03:37
where criminals are behind that are
00:03:38
still interested in money in in data
00:03:41
the risk here is what we also see in
00:03:44
traditional crime areas that
00:03:46
weapons that are used today by
00:03:49
the military for instance maybe a couple
00:03:51
of years later will show up in the dark
00:03:53
net and will be used by by criminals for
00:03:56
even more sophisticated attacks that is
00:03:58
a major concern in the physical world
00:04:00
weapons that are used on the battlefield
00:04:02
and tomorrow will be used by organized
00:04:03
crime groups but the same applies for
00:04:06
the for the digital
00:04:08
weapons that maybe today are used by the
00:04:10
military developed by military and
00:04:12
tomorrow will be available
00:04:14
uh for criminals that's quite a warning
00:04:16
isn't it minister let me turn to you
00:04:18
late last year singapore updated its
00:04:20
cyber security strategy in particular to
00:04:22
take a more proactive stance to protect
00:04:25
critical infrastructure there's plenty
00:04:27
of reasons why singapore would be a
00:04:30
target with sanctions against russia
00:04:32
that you joined the city state is a
00:04:34
growing hub for international finance
00:04:36
and business attracting more and more
00:04:38
business away from hong kong for
00:04:40
instance it just gives a sense how you
00:04:42
perceive the threat over the next 12
00:04:44
months to singapore
00:04:46
right well first of all let me say that
00:04:48
it's an honor to be on this panel we
00:04:49
have a veteran in law enforcement and
00:04:52
we've got
00:04:53
very prominent business leaders that
00:04:55
provide a range of
00:04:57
you know cyber security and i.t services
00:04:59
to so many different businesses um let
00:05:02
me just share in a perspective you know
00:05:05
as a minister who really
00:05:07
would like to see in the short term
00:05:09
a more solid
00:05:11
recovery for
00:05:12
our economies and in the long term would
00:05:15
really like to prepare our people to
00:05:17
succeed in the digital age
00:05:20
it's probably
00:05:22
right for us to not try and think of
00:05:24
cyber risk in very discreet terms
00:05:26
because they are interconnected with a
00:05:29
whole
00:05:30
range of risks geopolitical risks
00:05:33
technology bifurcation
00:05:35
the russian
00:05:37
ukraine conflict
00:05:38
which has as a result created economic
00:05:41
turmoil questions about
00:05:44
energy security
00:05:46
and even you know just plain old supply
00:05:49
chain disruptions
00:05:50
all of these i think have got the
00:05:52
potential to spill over into cyber space
00:05:56
now one key trend that we have been
00:05:58
watching out for is exactly as jurgen
00:06:00
talked about which is that cyber
00:06:03
criminals in terms of their level of
00:06:04
sophistication they seem to be catching
00:06:07
up with state-sponsored apt actors
00:06:10
and we are observing that actually even
00:06:13
this has become a natural national
00:06:16
security question because critical
00:06:17
informa information infrastructure can
00:06:20
come under threat
00:06:21
and i think one problem that we face is
00:06:24
that this is growing at a very fast
00:06:27
speed
00:06:28
this underground ecosystem that jurgen
00:06:31
you know outlined is extremely lucrative
00:06:34
and it is self-funding
00:06:36
so anytime that you have capabilities
00:06:39
that are existing in a system that is
00:06:41
self-funding and makes a lot of money
00:06:43
you can expect it to grow
00:06:45
and i think this is an area that really
00:06:46
demands urgent attention a lot of
00:06:50
international cooperation to reign in
00:06:52
a second area of risk i would talk about
00:06:54
is that
00:06:56
you know there has been just rampant
00:06:58
exploitation of supply chain
00:07:01
as well as um
00:07:03
you know all kinds of software
00:07:05
vulnerabilities a third party
00:07:07
um that are coming through you know to a
00:07:10
lot of businesses no business
00:07:12
you know can can operate without using
00:07:15
some
00:07:16
third-party software
00:07:18
and there used to be a relationship of
00:07:20
trust that existed between the clients
00:07:23
and the managed services provider and
00:07:26
this trust is being undermined and when
00:07:29
you have an absence of trust you know
00:07:30
how can you continue to digitalize your
00:07:32
businesses at the rate that would bring
00:07:35
about great benefits so this i think is
00:07:38
a long-standing problem that
00:07:40
isn't going away quite so soon and
00:07:43
let me just close off by saying that
00:07:45
there are two associated risks that
00:07:48
we would you know characterize not
00:07:50
necessarily a cyber risk one has to do
00:07:53
with the fact that the threat surfaces
00:07:55
are expanding so quickly
00:07:56
and there is a real danger that we don't
00:07:58
have enough talent don't have enough
00:08:00
capabilities to deal with them
00:08:02
a second is really the problem of what i
00:08:06
call distractedness
00:08:07
there are so many problems that business
00:08:09
leaders are dealing with
00:08:11
and
00:08:12
if you know it comes at the cost of
00:08:14
de-prioritizing cyber security then i
00:08:17
think this is going to have um you know
00:08:20
a lot of long-term consequences that we
00:08:22
will have to pay for and they will hurt
00:08:24
us so i would just pause right there
00:08:26
minister thank you and i'm glad you
00:08:27
brought up the supply chain because one
00:08:29
of the reports in recent days was about
00:08:32
connected farm devices being hacked and
00:08:35
if we think about the food shortage we
00:08:36
have at this stage how it's proving
00:08:38
inflationary across populations you can
00:08:40
see why cyber attacks and this
00:08:42
particular area could be a major issue
00:08:45
on that note chandra if i can ask you
00:08:47
about the business community and the
00:08:49
reaction here because we know that
00:08:50
there's been a huge digital acceleration
00:08:52
during the pandemic there's reputational
00:08:54
risk from cyber security financial risk
00:08:57
as well we've also witnessed on the back
00:08:58
of several attacks how do you perceive
00:09:01
the threat for the next year or so
00:09:05
i
00:09:06
think when you step back
00:09:10
first is
00:09:13
you know
00:09:14
the dependence of technology
00:09:17
on
00:09:19
some industries
00:09:21
is lot more evident
00:09:24
you know you saw the
00:09:27
power sector the utility sector the
00:09:29
telecom
00:09:30
healthcare now with the during the
00:09:33
pandemic even online education
00:09:36
and
00:09:37
in a lot of ways i mean
00:09:39
i'm sure the honourable minister would
00:09:41
agree
00:09:42
the e-government services
00:09:44
the dependence on technology is so high
00:09:47
that
00:09:48
we need to be cautious that
00:09:51
if that is the dependence then you treat
00:09:53
it as an infrastructure
00:09:55
and if it is an infrastructure you need
00:09:57
to
00:09:58
budget
00:09:59
time money and energy for maintaining
00:10:02
that infrastructure
00:10:04
i think when i look out
00:10:07
i think
00:10:08
many corporates
00:10:11
have taken
00:10:14
a responsibility
00:10:16
to look out for the country
00:10:18
attacks they look to look out for the
00:10:20
dark web
00:10:22
attacks they look at
00:10:23
individual attacks
00:10:25
but the question is
00:10:27
how often do you maintain
00:10:31
my personal
00:10:33
read is that the board rooms become very
00:10:36
very active
00:10:38
whenever there is a similar industry
00:10:41
attack
00:10:42
so if a colonial pipeline is attacked
00:10:45
suddenly the all the oil companies
00:10:47
around the world will become active
00:10:49
because they all want to know what
00:10:51
happened in that case study and are we
00:10:53
safe
00:10:56
similarly
00:10:58
the scope of audit the scope of audit
00:11:03
many companies only assume
00:11:06
saving their servers or networks
00:11:09
or the end user devices in their
00:11:12
premises are good enough
00:11:14
but the reality is the ecosystem is much
00:11:18
bigger
00:11:19
so one of the banks that we work with
00:11:23
we were
00:11:24
engaged to audit but the audit was very
00:11:27
specific like banks like to be very
00:11:29
specific
00:11:30
it was the server network and their
00:11:32
premises
00:11:34
and we said no that's not enough
00:11:36
and we had to prove it to them through
00:11:38
the law firm that they engaged
00:11:40
that on a friday evening
00:11:43
one human
00:11:44
this is the point uh
00:11:46
jurgen was making
00:11:48
that it is mainly the human failure
00:11:51
one human
00:11:53
you know picking up a phishing email
00:11:55
brought the whole the system down
00:11:58
so i think we need to be cautious that
00:12:01
our vulnerabilities are now outside the
00:12:04
system also
00:12:06
and when we do ethical hacking a we
00:12:09
should do it more frequently and number
00:12:11
two is we need to take into account the
00:12:13
ecosystem
00:12:15
that's a good point that you make there
00:12:16
are red flags when it's an external
00:12:18
contact but when it's somebody you work
00:12:20
with day in day out who sends that email
00:12:23
it does provide a different level of
00:12:25
rest doesn't it robert i want to turn to
00:12:27
you i think most of us bill is always
00:12:28
someone who has greater i.t experience
00:12:30
than us in the room you're the exception
00:12:32
you're probably the resident tech expert
00:12:35
very interesting background as well you
00:12:36
won the first or the first to
00:12:38
investigate the 2015-2016
00:12:40
attacks on critical infrastructure in
00:12:42
ukraine now as we have a physical war
00:12:45
playing out on the ground with
00:12:46
devastating consequences just draw the
00:12:48
links for us to what could start as
00:12:51
something that looks like it's just an
00:12:52
attack on the global community but it's
00:12:54
very much focused on a specific area how
00:12:57
do you look at that now in hindsight and
00:12:59
look forward to the risk yeah absolutely
00:13:01
and i think
00:13:03
most business leaders most executives
00:13:04
most board members they have these cyber
00:13:06
security conversations
00:13:08
the awareness as we were talking about
00:13:09
before is very very high
00:13:11
but we still very much have a focus on
00:13:13
i.t even when like my skill set as an
00:13:15
example i really don't know anything
00:13:17
about your i.t i know a lot about your
00:13:18
operations technology the control
00:13:20
systems how a power system works how a
00:13:22
manufacturing system works um but most
00:13:24
companies when they talk about cyber
00:13:26
security spend more time on the website
00:13:27
than they do on the gas turbine system
00:13:29
but the stuff that actually generates
00:13:30
you revenue the things that actually
00:13:31
have national security impact the things
00:13:32
that have safety impact the things that
00:13:34
have environmental impact it's the
00:13:35
operations side it's all the control
00:13:37
systems those were never really
00:13:38
connected before
00:13:40
they started getting connected in mass
00:13:41
probably about 15 years ago people still
00:13:43
think that they're disconnected now
00:13:44
they're not save yourself the audit
00:13:45
they're connected
00:13:47
but because they're getting connected at
00:13:49
the same time the digital economy is
00:13:50
going the direction that it's going and
00:13:52
at the same time that our systems are
00:13:54
ongoing a massive massive change
00:13:55
especially as we move towards a more
00:13:57
sustainable and equitable like energy
00:13:58
system as an example
00:14:00
we are operating on a little bit of a
00:14:02
knife's edge and so we've got
00:14:03
adversaries that know how to target
00:14:05
operation systems they've included
00:14:07
engineers with their cyber security
00:14:08
people we've got systems that are more
00:14:10
connected than ever and something like a
00:14:12
disruption on an electric system years
00:14:14
ago it would probably have been okay
00:14:16
more fear than actual impact in some
00:14:18
cases you can design the big ones but we
00:14:21
make safe and reliable infrastructure in
00:14:23
the industrial community all the time
00:14:24
but take for example the the sort of
00:14:27
green energy change an electric system
00:14:29
as an example now
00:14:30
is operating in such a way that power is
00:14:32
on demand in real time for the lowest
00:14:34
kilowatt hour
00:14:36
so
00:14:37
previously if you caused one company to
00:14:39
go down i could have enough backup
00:14:41
energy on the system and we have the
00:14:43
concept of inertia you have big spinning
00:14:45
equipment big spinning equipment and
00:14:47
inertia sort of slows down the effects
00:14:49
of things and you can respond but now
00:14:51
that we're going towards wind energy
00:14:52
solar etc it's all inverter based
00:14:55
resource it's direct current i don't
00:14:57
have big spinning equipment much anymore
00:14:59
now i don't have that inertia in the
00:15:00
system now if i have an impact on an
00:15:02
electric system i don't have the backup
00:15:04
power and i don't have the time to
00:15:05
respond and it's more connected and
00:15:06
there's more adversaries that understand
00:15:08
it that's not a good place to be so when
00:15:10
we look at cyber security
00:15:12
of critical infrastructure it's
00:15:13
important for everybody to take away the
00:15:15
fact that the critical part of critical
00:15:17
infrastructure are those operations
00:15:19
technology systems of course we want you
00:15:20
to do the iet stuff as well um but if
00:15:22
we're going to talk national security
00:15:23
especially we really got to put a focus
00:15:25
there and i would say probably the sort
00:15:28
of the closing comment on that one is
00:15:30
governments do have to be very aware of
00:15:31
the difference between business risk and
00:15:33
national security risk if it's business
00:15:35
risk companies should be paying for
00:15:36
themselves and doing that work but if
00:15:38
it's a national security risk there's
00:15:39
got to be support and potentially even
00:15:41
resourcing from the federal government
00:15:42
so that entity actually takes it and
00:15:44
does something with it if i can just
00:15:45
follow up on the point of whether there
00:15:47
is a a pre-ukraine versus post-ukraine
00:15:50
moment for the industry here and whether
00:15:52
companies countries that have joined
00:15:54
sanctions or taking a move to exit
00:15:56
russia and doing operations there are
00:15:57
they at a greater level of risk now
00:16:00
versus before for sure we've absolutely
00:16:02
seen
00:16:03
countries that have come out with
00:16:04
sanctions countries that have been
00:16:06
public in discussion uh
00:16:08
countries that are connected to that
00:16:09
system we see them getting targeted much
00:16:11
more and so there's absolutely a
00:16:12
geopolitical overlay of any time you're
00:16:14
talking about critical infrastructure
00:16:15
cyber attacks and the other thing that
00:16:17
we just need to be really really mindful
00:16:18
of and i think this is a suggestion as
00:16:20
well to the audience as you think about
00:16:21
those challenges
00:16:23
is if if you're an executive in your
00:16:24
next board meeting in your next
00:16:26
executive discussion there's really two
00:16:27
questions that i would focus you on
00:16:28
number one when you get all your metrics
00:16:30
and your stats and your cyber heat maps
00:16:32
that you barely understand we all love
00:16:33
the colors
00:16:35
ask the question is that the enterprise
00:16:36
i.t or is that the enterprise
00:16:39
because very often you're doing far less
00:16:40
on the side of the business that you
00:16:41
care most about the second thing i would
00:16:43
suggest is the scenarios and this goes
00:16:45
back to your training discussion very
00:16:46
often especially the technical community
00:16:48
it's all about technical controls
00:16:49
already enough patching what about
00:16:51
vulnerability management what about
00:16:52
antivirus what about firewalls what
00:16:53
about this that the others
00:16:54
our problem is not needing next-gen ai
00:16:56
blockchain or whatever else our problem
00:16:58
usually is just about rolling out the
00:17:00
things that we've already invested in
00:17:01
doing something but don't focus on the
00:17:02
technical controls we don't treat our
00:17:03
business in any way like that anywhere
00:17:05
else instead focus on scenarios should a
00:17:08
power company anywhere in the world be
00:17:10
able to prevent detect and respond to
00:17:12
ukraine 2015 and 2016 scenario yeah of
00:17:15
course we've seen it you should
00:17:17
should they theorize about what happens
00:17:19
when china iran russia u.s or whatever
00:17:21
superpowers team up against you no it
00:17:23
hasn't happened don't don't focus on the
00:17:25
theoretical right but if something's
00:17:26
actually happened in your industry you
00:17:28
owe it to the community to actually have
00:17:29
that scenario covered not a single
00:17:31
technical control minister can i get a
00:17:33
quick response from you i mean robert
00:17:35
just mentioned that if it's a national
00:17:37
security threat that a company is facing
00:17:39
there is a role for funding for the
00:17:41
state how do you feel about that would
00:17:42
singapore step in and provide funding
00:17:44
for companies that are under increased
00:17:45
threat because of national security well
00:17:47
i think in the first place um as a
00:17:50
you know state
00:17:52
we have to look at our own
00:17:54
um
00:17:55
you know provision of services and
00:17:57
ensure that we set standards at a high
00:17:59
enough level
00:18:00
actually if you look at some of the
00:18:02
critical information infrastructure
00:18:05
quite a lot of it is operated by the
00:18:07
state so say for example you know even
00:18:09
if our power grid is
00:18:11
is privatized to a very large extent the
00:18:14
cyber security measures that we impose
00:18:16
on the power generation companies
00:18:19
is one way of ensuring that the
00:18:21
standards are met but there are also
00:18:23
other ways in which we can help for
00:18:25
example understanding where the risks
00:18:26
are i think this is where government can
00:18:28
play an active part but i also want to
00:18:30
add to what you know robert was saying
00:18:33
which is that i think it makes sense for
00:18:35
us you know when we think about
00:18:37
scenarios not to think that we have not
00:18:40
yet been breached and in fact in
00:18:42
singapore
00:18:43
the way we think about it is that the
00:18:45
cyber attack is not a question of if but
00:18:48
when
00:18:49
and so
00:18:50
we have to move from preventive measures
00:18:53
to being able to recover from an attack
00:18:55
and so cyber resilience building it into
00:18:58
enterprise risk management
00:19:00
is is really important and it has to be
00:19:04
at a very high level of
00:19:06
leadership that demands that these steps
00:19:09
be taken minister you've taken us neatly
00:19:11
into the next area i want to talk about
00:19:12
perception gaps because the world
00:19:14
economic forum has identified that there
00:19:16
is a perception gap when it comes to
00:19:18
just how prepared businesses are on
00:19:19
cyber security versus cyber leaders now
00:19:22
92 percent of business executives agree
00:19:24
that cyber resilience is integrated into
00:19:27
enterprise risk management strategies
00:19:29
only 55 percent of cyber executives
00:19:32
agree so the experts in the house think
00:19:35
that the
00:19:36
level of planning is just not adequate
00:19:37
at this stage
00:19:38
can i come to you on that point because
00:19:40
you've seen the level of uh preparedness
00:19:42
when it comes to locking down facilities
00:19:45
stopping criminals from entering the
00:19:47
premises what do you make of that
00:19:49
perception gap and whether business
00:19:51
leaders are ready for the task of
00:19:53
averting cyber security attacks
00:19:55
i mean from my experience and talking to
00:19:58
a number of senior leaders in companies
00:20:01
there is definitely
00:20:02
the level of awareness has been rising
00:20:05
it's it's much better
00:20:07
but that does not necessarily mean that
00:20:09
there is a comprehensive understanding
00:20:11
of the
00:20:12
cyber security risk in a company
00:20:14
including what you said the the supply
00:20:16
chain your partners you are you are
00:20:18
connected with and again this
00:20:20
comprehensive understanding and
00:20:22
translating that into implementing the
00:20:24
necessary measures doing it often enough
00:20:27
because what we need actually is
00:20:29
information exchange in real time
00:20:33
because the situation is so dynamic
00:20:35
crime patterns are changing sometimes
00:20:38
within hours slightly or within a
00:20:40
couple of weeks at least
00:20:42
and and being a part of an ecosystem
00:20:45
nationally regionally and
00:20:47
internationally that allows these
00:20:49
real-time information exchange so for me
00:20:52
it's not a surprise that there is still
00:20:53
a gap between the senior management that
00:20:55
they are there is a general awareness
00:20:58
but again investing in specific
00:21:00
measures including your your teams your
00:21:03
staff
00:21:04
to reduce human failure in in these
00:21:06
procedures and to understand that this
00:21:09
is something you cannot just do once a
00:21:11
year like a like a medical check um you
00:21:14
have to do it as something permanent
00:21:16
there is still obviously a lot for us to
00:21:18
do and to increase the dialogue for
00:21:21
instance between law enforcement because
00:21:23
we on the one hand we are aware what's
00:21:25
going on on the other hand we need the
00:21:26
data which are in the private sector so
00:21:28
we need your reports without your
00:21:30
reports we are blind
00:21:32
and and and that is something i
00:21:34
mentioned this this huge number of
00:21:36
unreported crime that is a gap that we
00:21:38
need to close together not just law
00:21:40
enforcement that requires that we build
00:21:42
bridges between our silos the islands of
00:21:45
information and in a more strongly way
00:21:47
institutionalize the cooperation that
00:21:49
already exists and for us the world
00:21:51
economic forum is an important player on
00:21:53
the global
00:21:54
on the global level europe is going down
00:21:56
the pathway of requiring some sort of
00:21:58
reporting within 24 hours which is to
00:22:00
your point that often we see this just
00:22:02
brushed under the carpet that people
00:22:03
don't want to disclose that there has
00:22:05
been some sort of cyber breach because
00:22:06
of reputation or risk for whatever
00:22:08
reason yeah right chad let me come to
00:22:10
you because you did touch on the
00:22:11
perception gap a moment ago and one of
00:22:12
the conversations i had with the cyber
00:22:14
security expert this week was that
00:22:15
nothing has changed in 20 years that
00:22:18
people still perceive there is a risk
00:22:19
they're trying to protect absolutely
00:22:21
everything in the organization rather
00:22:23
than most critical information
00:22:25
just touch on what the strategy should
00:22:27
be for business from here given that
00:22:29
there is such a wide gap in how the
00:22:31
industry experts feel the preparation
00:22:33
should be
00:22:35
so
00:22:36
i mean i'm surprised that you think
00:22:38
nothing has changed in 20 years that's
00:22:39
not me that's not right
00:22:41
so
00:22:42
i can only say that
00:22:44
you know when i was walking up here i
00:22:46
accidentally met the chairman of ibm
00:22:49
and
00:22:51
uh he said where are you going this is
00:22:53
arvind krishna who's the chairman of ibm
00:22:55
and i said i'm going for the cyber
00:22:57
security
00:22:59
you know at the forum
00:23:01
and he said
00:23:02
oh that's the threat of the decade
00:23:05
and it will remain
00:23:07
the threat for the next decade
00:23:09
so
00:23:10
so one part is very very clear
00:23:13
that most of us do realize
00:23:16
that it is a threat
00:23:18
the second part is
00:23:20
that most of us also realize
00:23:22
that
00:23:23
while we know hundred ways to secure our
00:23:27
i.t systems or the network or the end
00:23:30
user or the supply chain
00:23:33
but the attacker has to succeed only
00:23:35
once
00:23:37
so
00:23:38
clearly
00:23:39
for us whether it is technology
00:23:43
it needs to be refreshed
00:23:45
whether it is the processes
00:23:47
they need to be
00:23:48
you know you know talking about those
00:23:50
viruses
00:23:51
i mean all the healthcare as you put at
00:23:53
your gun i mean it is very very clear
00:23:56
that our processes have to be current
00:23:58
and number third is
00:24:00
people also it is not only that
00:24:04
they need to know
00:24:06
how to protect but they also need to
00:24:08
know how to anticipate
00:24:10
so i think
00:24:12
the world over we need to realize
00:24:15
that the various studies have shown
00:24:18
there is a skill shortage in cyber
00:24:20
security
00:24:21
and i don't think that all of us are
00:24:24
putting enough attention to
00:24:27
creating that
00:24:29
lateral skill force of 2.7 million
00:24:33
people that are required by 2025.
00:24:36
so i think it's a bigger challenge of
00:24:38
people process and technology so
00:24:42
catherine maybe just you know building
00:24:43
on what chandra has said i suspect that
00:24:46
the perception gap it comes about
00:24:48
because one group
00:24:49
is looking at all the known unknowns and
00:24:53
saying that we've
00:24:54
got this
00:24:55
and then there is another group that is
00:24:57
thinking about all the unknown unknowns
00:24:59
and say no we haven't really got it and
00:25:02
that's why you know you have this very
00:25:04
big difference in perception
00:25:06
in cybersecurity exactly as chandra says
00:25:09
you don't know what you don't know and
00:25:11
you have to
00:25:12
believe that you know these are very
00:25:14
serious vulnerabilities and you have to
00:25:16
be on the lookout and trying to exchange
00:25:19
information with each other try and get
00:25:20
better to understanding the problem
00:25:22
i'm glad i think many many companies
00:25:24
still start seriously working on that
00:25:26
when they first have been hit
00:25:28
and and the data are blocked this is
00:25:30
where the action starts oh who am i my
00:25:32
points of contact where are my data who
00:25:35
can help that's my experience in talking
00:25:37
to a lot of senior leaders who called
00:25:40
i've been attacked what am i going to do
00:25:43
too late sorry
00:25:45
you can see how engaged the paddle is
00:25:46
but i know there are some questions out
00:25:48
here on the floor so we have promised
00:25:50
opened up for the conversation with our
00:25:52
uh audience so if you would like to put
00:25:54
your question please stand up and we
00:25:56
will bring a microphone to you uh we
00:25:58
have a question
00:25:59
here first we have a microphone
00:26:02
ready
00:26:06
if you could state where you're from too
00:26:07
please yes my name is wolfgang glenvist
00:26:09
i'm a professor emeritus from the
00:26:11
university of aarhus
00:26:12
the united nations have started
00:26:15
negotiations on a convention on cyber
00:26:17
crime
00:26:19
what do you expect and the question goes
00:26:21
in particular to mr stock and madame
00:26:24
taylor
00:26:27
yes um thank you for that good question
00:26:30
i mean it's a it's a global problem
00:26:32
right and it requires a global solution
00:26:35
as many other threats that the world is
00:26:37
facing you cannot deal with that in just
00:26:40
on a national level or on a regional
00:26:42
level or in isolation that doesn't work
00:26:44
it requires global coordination
00:26:47
that the the challenge for interpol to
00:26:49
connect 195 member countries what we
00:26:51
expect is that that law enforcement is
00:26:53
mentioned because hopefully we all agree
00:26:55
that investigation prosecuting
00:26:58
prosecution and getting the actors
00:27:00
behind bars is an important part of
00:27:02
protecting our systems so we we are part
00:27:05
of these negotiations we hope that we
00:27:08
can
00:27:09
uh we can make sure that the interests
00:27:11
of global law enforcement are
00:27:13
represented in in this u.n approach
00:27:15
which we consider to be important
00:27:17
can i just add to what jurgen has said i
00:27:20
fully agree with him there is a great
00:27:22
need for international cooperation and
00:27:25
that's why i think singapore makes an
00:27:27
effort to participate in all of these
00:27:30
even though you know in comparison to
00:27:32
the threats faced by many other
00:27:34
countries i i think ours is of just a
00:27:36
different scale
00:27:38
but i would say that apart from having a
00:27:40
convention
00:27:42
there is another area that i think is
00:27:43
also very important and that has to do
00:27:45
with capacity building you can have a
00:27:47
convention but ultimately it is the
00:27:49
individuals that are operating each of
00:27:51
the countries cyber security systems
00:27:54
that have to
00:27:55
intervene at the appropriate times and
00:27:57
what we have done is to work with our
00:27:59
international counterparts
00:28:01
to try and create
00:28:03
programs as well as training
00:28:05
opportunities in our part of the world
00:28:07
in asean for example
00:28:09
we've worked together to set up a cyber
00:28:11
security center of excellence it's very
00:28:14
well received
00:28:15
whether it is the u.s whether it's
00:28:16
interpol whether it's the uk
00:28:19
so many countries have decided to come
00:28:21
on board to try and share knowledge
00:28:23
because in cyber security we fully
00:28:25
recognize that it is a team sport
00:28:27
and the better we are able you know to
00:28:30
make every player a competent player
00:28:33
the stronger the team is going to be so
00:28:35
that's that's how we are approaching it
00:28:37
and of course you need a full team as
00:28:38
well to play the game properly robert
00:28:40
before we move on can i just ask you
00:28:42
because you're charged with a clean up
00:28:43
when these security attacks happen do
00:28:45
you think would make a difference if
00:28:46
they were global coordination or some
00:28:48
form of a un resolution i think it's a
00:28:51
really nice idea and i wish you all the
00:28:52
best of it uh thank you but no i don't
00:28:55
think it will actually help anything you
00:28:57
have always had agreements between
00:28:59
states on things even to the point of
00:29:01
like critical infrastructure attacks
00:29:02
most of us agree that you shouldn't
00:29:04
target civilians
00:29:05
and in the moment that a government
00:29:06
wants to they do
00:29:08
when it's in their necessity they do
00:29:10
and so i just think
00:29:12
global discussions and so forth really
00:29:14
really important the awareness really
00:29:16
really important thinking that a tree to
00:29:17
see or similar is going to fix it i
00:29:19
think is not necessary but i do want to
00:29:21
look at the things that work if you look
00:29:23
at the cyber security agency in
00:29:24
singapore if you look at the cyber
00:29:26
security from infrastructure security
00:29:27
agency in the u.s you look at the
00:29:29
australian government their acsc program
00:29:31
these different government agencies have
00:29:32
come out and raised the discussion
00:29:34
completely on their own like it's not
00:29:36
vendors everybody else it's government
00:29:37
agencies having international
00:29:39
cooperation and making sure that board
00:29:41
members down to practitioners know what
00:29:42
to do that type of stuff works go repeat
00:29:45
what works and scale what works and if
00:29:47
you want to do some other ideas too
00:29:48
that's fine but do them parallel don't
00:29:50
do one or the other
00:29:52
let's get some more questions in there
00:29:53
is one down the front here
00:29:54
thank you thank you
00:29:56
um hello uh my name is natalia and i'm
00:29:59
here as a global shaper as a curator of
00:30:01
the leaf hub
00:30:02
when the war started
00:30:04
the headquarters they
00:30:06
took out all information from the
00:30:07
website information about all ukrainian
00:30:10
hubs meeting about all ukrainian shapers
00:30:14
in the meantime we do have our facebook
00:30:17
instagram linkedin profiles
00:30:20
the question is what would you do on our
00:30:22
place
00:30:23
should we hide
00:30:24
all information about ourselves thank
00:30:27
you
00:30:28
chandra do you want to take that one
00:30:32
you know
00:30:35
honestly the sources
00:30:37
of information
00:30:40
are so many
00:30:42
that
00:30:43
i don't know whether you can be a
00:30:45
universal policing
00:30:47
so for example when we were talking
00:30:49
about this
00:30:50
you know
00:30:51
central competency
00:30:54
regarding
00:30:55
the repository of let us say malware
00:30:58
i mean the reality is
00:31:00
people in the cso community and the
00:31:02
people in the hacking community
00:31:04
they have all the repositories available
00:31:07
and that's why the tool companies have
00:31:10
created
00:31:11
some of the controls
00:31:14
so i personally believe
00:31:16
that we have to assume
00:31:19
that the information would be available
00:31:23
we do should while we can try policing
00:31:26
but that information will be available
00:31:29
whether it is through facebook or
00:31:30
whether it is through any other
00:31:32
social media
00:31:34
and
00:31:35
i think our strategy has to be
00:31:38
with an assumption that
00:31:40
people know what the tools are available
00:31:42
people know what malware is available
00:31:45
people know what kind of security
00:31:46
measures are there and within that how
00:31:50
to evolve and encrypt or
00:31:52
protect yourselves
00:31:54
yeah if if i could take a spin at that i
00:31:56
would say especially talking about
00:31:57
conflict and shooting wars and not just
00:31:59
espionage
00:32:01
i think the topic of personal safety is
00:32:03
something you should think a lot about
00:32:04
and i think those type of actions are
00:32:05
really important i agree that that
00:32:07
information is available somewhere but a
00:32:09
lot of these state actors we view them
00:32:10
as if they're one big state after the us
00:32:12
russia iran big country level but the
00:32:15
reality is there's a bunch of different
00:32:16
agencies a bunch of different teams and
00:32:19
the person coming after you is not
00:32:21
russia china iran u.s it's five to ten
00:32:24
people on a subset of a subset of a
00:32:25
subset of teams so maybe somewhere in
00:32:27
the government they have the information
00:32:29
but that team might not and so when
00:32:31
you're talking about personal safety i
00:32:33
do think limiting your exposure
00:32:34
especially in those type of environments
00:32:36
is a very wise thing to do there's also
00:32:38
an information war that comes up i mean
00:32:39
we saw one specific example where i
00:32:42
think there was a makeup artist in
00:32:43
ukraine who was a part of one of the the
00:32:45
areas of conflict and her profile was
00:32:47
used against her in the information war
00:32:48
by the russians so it's obviously
00:32:50
another area to think about but let's
00:32:52
get some more questions and i know that
00:32:53
there's a little bit of interest here
00:32:58
so thank you very much can you hear me
00:33:00
yeah so just on the cyber war we don't
00:33:03
have rules of engagement uh for like
00:33:05
multilateral system to just uh i
00:33:07
understand your point robert in terms of
00:33:09
like we need uh solutions but i also
00:33:11
believe that we need multilateral
00:33:13
solutions for that so do you have ideas
00:33:15
for engagement in cyber war like rules
00:33:17
of engagement at geneva convention for
00:33:19
cyber war
00:33:20
actions any i sit on a panel of the u.n
00:33:24
secretary general and effective
00:33:25
multilateralism and we're thinking we're
00:33:26
thinking about this right now so that's
00:33:28
why i'm just also consulting you thank
00:33:30
you
00:33:31
i think a number of countries are trying
00:33:33
very hard to develop rules of the road
00:33:35
that could you know be subscribed to by
00:33:38
everyone
00:33:40
the united nations has a open-ended
00:33:42
working group for example where many
00:33:44
countries have been engaged in
00:33:46
multi-year
00:33:47
conversations but as robert has also
00:33:50
intimated it's not an easy conversation
00:33:53
obviously there are very diverse
00:33:55
interests
00:33:56
and but i think we are making progress
00:33:59
as it turns out singapore is the chair
00:34:01
of this current
00:34:03
edition of the open-ended working group
00:34:05
and at the very least i think you know
00:34:08
when the swiss chaired it the last time
00:34:10
around
00:34:11
you know there was at least a document
00:34:13
that they could agreed you know what
00:34:14
were some of the baseline provisions
00:34:16
that everyone you know should be able to
00:34:18
provide
00:34:19
um kind of in can this conversation be
00:34:22
taken deeper and can we develop you know
00:34:25
more
00:34:26
um
00:34:27
you know robust um sort of understanding
00:34:30
of how we would operate with each other
00:34:31
the answer is yes will we get there any
00:34:34
time soon i would say we will have to
00:34:36
work very hard at it
00:34:37
jurgen can i get you on this i mean
00:34:39
you're used to working across borders
00:34:41
we also have a situation there where we
00:34:42
know that global cooperation has broken
00:34:44
down china is a great example where
00:34:47
there's been trade wars there's been
00:34:49
concerns about the level of information
00:34:51
shared between the chinese and the west
00:34:52
and how do you get around some of these
00:34:54
issues as we talk about global
00:34:55
cooperation
00:34:57
yeah i mean we
00:34:58
try to be the platform where all these
00:35:01
countries to some extent are coming
00:35:03
together despite all the differences in
00:35:06
in legal systems and put in political
00:35:08
systems
00:35:09
because one thing is quite clear any gap
00:35:12
we are leaving will be exploited by
00:35:14
criminals and we have seen that also
00:35:16
during the the pandemic during covet how
00:35:18
quickly criminals shifted their
00:35:21
narrative to the new vulnerabilities of
00:35:23
our society so so any crisis that occurs
00:35:26
will be exploited by by criminals we
00:35:29
spoke about metaverse earlier today here
00:35:32
i'm sure as we speak here criminals are
00:35:34
already preparing to use that as a
00:35:36
platform for criminal activity and again
00:35:39
there is no other choice and this is why
00:35:40
interpol exists to provide that platform
00:35:43
is it perfect no of course it's not but
00:35:46
on the other hand are we successful here
00:35:48
and there by by bringing the players
00:35:51
together even those who have diplomatic
00:35:54
problems too i mean difficult to say in
00:35:56
these times yes we are there is i think
00:35:59
there is no alternative to that the
00:36:01
internet is global and you need a kind
00:36:04
of global
00:36:05
kind of police force or at least we we
00:36:08
try to bring the national forces at
00:36:11
least in some cases
00:36:12
together that that's our mandate let's
00:36:14
take some more questions i believe we
00:36:16
have
00:36:17
one down the front here we will take one
00:36:18
from the other side of the room if we
00:36:20
can in a moment
00:36:24
okay hi i'm inon kostika i'm a co-founder for
00:36:27
a cloud security company named wiz and
00:36:30
we're working with multiple fortune 500
00:36:33
companies and what we've realized that
00:36:35
the key to actually initiate something
00:36:38
an improvement is working with the
00:36:40
engineers that build the cloud
00:36:42
applications you mentioned that humans
00:36:44
are the biggest failure you mentioned
00:36:47
that we need to train more and just now
00:36:49
we're seeing questions from
00:36:51
people personal people saying okay
00:36:53
expose the information i didn't know
00:36:54
what would be the outcomes in the long
00:36:57
run so my question to you question to
00:36:59
you is basically how can we enable
00:37:01
more global education on or awareness on
00:37:05
cyber one that can provide everyone with
00:37:09
tools to assess their risk my my parents
00:37:12
for instance they got an email saying we
00:37:14
have a
00:37:15
pictures of you pay one thousand dollars
00:37:17
to this address and i'm like that's
00:37:19
nonsense it's just extortion ignore it
00:37:21
but they didn't know they were scared
00:37:23
for two days they had nowhere to go to
00:37:25
to ask that question so my question to
00:37:27
how can we create a global community to
00:37:29
train and we raise awareness china do
00:37:31
you want to talk about that
00:37:33
so
00:37:34
you know
00:37:35
i would agree
00:37:37
that
00:37:39
nipping the problem in the bud is the
00:37:41
right way
00:37:43
because if you write a code which is
00:37:45
secure
00:37:47
and which has got enough firewalls in it
00:37:50
i think you're making it difficult for
00:37:52
anybody to break into the code
00:37:54
so i think that's a fundamentally just
00:37:56
the right way
00:37:58
number two
00:37:59
[Music]
00:38:00
i think we covered this point about
00:38:02
education
00:38:07
there is no
00:38:09
immediate resolution to that part
00:38:11
that whether that education can be
00:38:15
in a given to
00:38:18
tens of millions of users now because as
00:38:21
we all know
00:38:22
the vulnerability is not only
00:38:25
by one operating system
00:38:28
or one piece of code or one tool the
00:38:32
vulnerabilities can come in from a smart
00:38:34
city
00:38:35
a smart factory
00:38:37
or from a smart metering i mean
00:38:40
whichever way you want to look at it
00:38:42
and
00:38:43
to prevent it
00:38:45
i mean if you were to say there are two
00:38:47
ways to prevent it one is become
00:38:49
good citizen so there is no crime or you
00:38:52
put put in enough police people
00:38:54
so that there is no crime because people
00:38:56
are what you know afraid of the police i
00:38:59
think both of them is required you need
00:39:01
to educate but it will take time until
00:39:04
that time i think some of us
00:39:07
have to act as a catalyst and i
00:39:10
definitely would agree
00:39:12
that people like you when you write your
00:39:15
code try and make it secure and the more
00:39:19
we start
00:39:21
as a community start paying you premium
00:39:24
because you deliver a secure code i
00:39:26
think that is the right way because
00:39:28
people will learn
00:39:29
that there is an economic benefit to
00:39:32
secure code so again can i just add to
00:39:34
that to two perspectives one i
00:39:36
completely agree security by design
00:39:38
should become a competitive advantage
00:39:40
for you if you are able to offer a
00:39:42
product to the market that has got more
00:39:44
security features built in and then it
00:39:46
should command a premium and people over
00:39:48
time will learn that it is in their
00:39:50
interest to pay for it
00:39:53
but i would also say that i don't know
00:39:54
that you need a global effort to get
00:39:57
this going i think as national
00:39:59
governments we all owe our citizens a
00:40:02
duty of care
00:40:03
and
00:40:04
it is in our interest to help educate
00:40:06
our our citizens to understand the risk
00:40:10
that they are exposed to when they
00:40:11
engage in in the cyber domain um it
00:40:14
starts from you know children in school
00:40:17
um helping them to understand you know
00:40:20
that they can be exposed to online harms
00:40:22
and how to deal with it
00:40:24
it can be for example in collaboration
00:40:26
with corporates in singapore for example
00:40:29
google has a very good program
00:40:32
they help teach our school going kids
00:40:34
how to
00:40:36
do simple things like uh have strong
00:40:38
passwords right but there are also
00:40:41
different segments of the population
00:40:42
that are vulnerable seniors you know who
00:40:44
are
00:40:45
targets for scammers
00:40:48
and
00:40:49
apart from strengthening our defenses
00:40:51
against scammers there is also a lot of
00:40:53
education that can be done by the
00:40:54
government
00:40:55
this is sometimes police
00:40:58
you know collaborating with people
00:41:00
sector organizations civic civil society
00:41:03
i think these are all efforts that can
00:41:05
be taken at the national level and it
00:41:06
should be in our own interest to do so
00:41:08
right and in one second i mean we need
00:41:10
law enforcement needs the industry to
00:41:12
help us
00:41:13
getting the tools to investigate cyber
00:41:16
crime in that new
00:41:17
virtual
00:41:18
environment we have a champions league
00:41:20
of law enforcement agencies who are well
00:41:22
trained and well equipped but let's say
00:41:25
195 member countries police services
00:41:28
let's say maybe 70
00:41:29
are not well equipped and not trained
00:41:31
and very often they have nothing so we
00:41:33
also need the the support from the
00:41:35
private sector to develop easy handle
00:41:37
easy to handle solutions to investigate
00:41:39
that type of crime robert
00:41:41
well yeah i would i would agree with
00:41:42
everything that was said i would just
00:41:43
add again sorry the scenarios and
00:41:45
requirements discussion i think the
00:41:46
minister was talking earlier about
00:41:48
distraction uh should your parents be
00:41:50
worrying about a cyber attack that take
00:41:52
down transformers and electric system
00:41:54
probably not until they're operating
00:41:56
them right so
00:41:57
we come out all the time we do all these
00:41:59
cyber security things i think as as
00:42:01
leaders we sometimes fail our
00:42:03
communities and setting the requirements
00:42:04
to start with even at a business level
00:42:06
what do you need to worry about at this
00:42:07
company set the two or three scenarios
00:42:10
the requirements you have etc that you
00:42:11
need to care about that company doesn't
00:42:13
need to be prepared for every possible
00:42:14
cyber security thing and we talk about
00:42:16
education where do you start these days
00:42:18
with cyber security it's so broad you
00:42:20
cannot be a generalist in cybersecurity
00:42:21
anymore 20 years ago absolutely today no
00:42:24
cloud specialists industrial specialists
00:42:25
whatever and we just say industrial and
00:42:27
that's different from being a specialist
00:42:28
in electric power versus pharmaceuticals
00:42:30
so i think the setting the requirements
00:42:32
setting those scenarios and figuring out
00:42:34
what do we actually want out of our
00:42:36
communities other than cyber safe cyber
00:42:38
hygiene or whatever else you want to
00:42:39
throw out that ultimately just gets this
00:42:41
large peanut butter spread instead of
00:42:43
actually doing things
00:42:45
we are out of time for questions i'm so
00:42:46
sorry i know that there's plenty of
00:42:47
interest still but just 10 seconds each
00:42:50
what do you want to see happen in the
00:42:51
next 12 months robert i would like to
00:42:53
see at an executive level a better
00:42:55
understanding of the operation
00:42:56
technology risk that exists in companies
00:42:58
and put some effort towards it pick a
00:43:00
path doesn't matter but pick a path but
00:43:02
realize that you cannot copy and paste
00:43:04
your i.t strategy into your power plant
00:43:08
from my perspective including the policy
00:43:10
makers here uh
00:43:13
10 seconds focus on education focus on
00:43:16
people
00:43:17
focus on skills minister
00:43:20
cyber security is a wicked problem you
00:43:22
never get to solve it once and for all
00:43:24
it should never be an afterthought it
00:43:26
should always be a priority
00:43:28
again stronger more institutionalized
00:43:30
public-private partnership
00:43:32
that was very snappy thank you so much
00:43:34
jurgen minister chanda and robert we
00:43:35
appreciate your time
00:43:49
you

Description:

The World Economic Forum's Global Cybersecurity Outlook report indicates that cyberattacks increased 125% globally in 2021, with evidence suggesting a continued uptick through 2022. In this fast-changing landscape it is vital for leaders to take a strategic approach to cyber risks. How can leaders better prepare for future cyber shocks? What individual and collective actions will foster a more secure and resilient digital ecosystem? The World Economic Forum is the International Organization for Public-Private Cooperation. The Forum engages the foremost political, business, cultural and other leaders of society to shape global, regional and industry agendas. We believe that progress happens by bringing together people from all walks of life who have the drive and the influence to make positive change. World Economic Forum Website ► http://www.weforum.org/ Facebook ► https://www.facebook.com/unsupportedbrowser YouTube ► https://www.youtube.com/wef Instagram ► https://www.facebook.com/unsupportedbrowser  Twitter ► https://twitter.com/wef LinkedIn ► https://www.linkedin.com/company/world-economic-forum TikTok ► https://www.tiktok.com/@worldeconomicforum Flipboard ► https://flipboard.com/@WEF

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Global Cybersecurity Outlook | Davos | #WEF22" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Global Cybersecurity Outlook | Davos | #WEF22" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Global Cybersecurity Outlook | Davos | #WEF22" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Global Cybersecurity Outlook | Davos | #WEF22" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Global Cybersecurity Outlook | Davos | #WEF22"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Global Cybersecurity Outlook | Davos | #WEF22"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.