This document outlines key questions to understanding why the cyber security perimeter has expanded, its connection with other risks, the greatest threats, the costs of a cyberattack and what can help to mitigate it.
The question is not whether there will be attacks, but when. We need to be prepared.