9 - 11 October 2018 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2017
Zoom product LOGO_Threat Horizon 2019

Threat Horizon 2019

LOGO_Threat Horizon 2019

Threat Horizon 2019

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitor Database.

An error has occurred.

Threat Horizon 2019: Disruption. Distortion. Deterioration

Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma: should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors? Organisations that are well-informed about emerging technologies and corresponding threats will be best placed to make winning decisions.

Threat Horizon reports, produced annually by the ISF, are intended for business leaders who want to understand cyber risks and their potential impacts, in order to make critical decisions about the future success of their organisation. Threat Horizon 2019 presents nine major threats organisations can expect to face over the next two to three years and groups them under three key themes:

1 – DISRUPTION: from an over reliance on fragile connectivity
1.1 Premeditated internet outages bring trade to its knees
1.2 Ransomware hijacks the Internet of Things
1.3 Privileged insiders coerced into giving up their crown jewels

2 – DISTORTION: as trust in the integrity of information is lost
2.1 Automated misinformation gains instant credibility
2.2 Falsified information compromises performance
2.3 Subverted blockchains shatter trust

3 – DETERIORATION: when controls are eroded by regulations and technology
3.1 Surveillance laws expose corporate secrets
3.2 Privacy regulations impede the monitoring of insider threats
3.3 A headlong rush to deploy AI leads to unexpected outcomes.

ISF Consultancy Services

LOGO_ISF Consultancy Services



Standard of Good Practice for Information

LOGO_Standard of Good Practice for Information

Preparing for the General Data Protection Regulation Digest

LOGO_Preparing for the General Data Protection Regulation Digest

Threat Horizon 2019 is assigned to following product groups:

Order your it-sa ticket online in our TicketShop. Save your ticket now!


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.