Digital content theft part 2: Ransomware

Digital content theft part 2: Ransomware

In the fast-paced digital age, the methods of acquiring digital content have evolved drastically. As discussed in the first part of our series on digital content theft, we explored the nuances of piracy and copyright infringement. Now, in the second installment, we delve into a particularly menacing form of digital content theft – ransomware. Ransomware not only steals your data but holds it hostage, demanding a ransom for its release. This article sheds light on what ransomware is, how it works, and the steps you can take to protect yourself against this growing threat.

Understanding Ransomware

Ransomware is a malicious software that encrypts a victim’s files, rendering them inaccessible. Perpetrators demand a ransom, usually payable in cryptocurrency, in exchange for a decryption key. The goal of ransomware attacks is to extort money from victims, individuals or organizations, by holding their valuable data hostage. There are various forms of ransomware, with the two most common types being:

Encrypting Ransomware:

  • This type of ransomware encrypts the victim’s files, rendering them unreadable without a decryption key. The victim is then presented with a ransom demand in exchange for the key.

Locker Ransomware:

  • Locker ransomware, on the other hand, locks the victim out of their device entirely, preventing them from accessing their files or even the operating system. Victims are presented with a ransom demand to regain access.

How Ransomware Works

How Ransomware Works
How Ransomware Works

Infection:

  • Ransomware typically infiltrates a system through malicious email attachments, fake software downloads, or vulnerabilities in outdated software. Once it gains access, it quietly encrypts files.

Encryption:

  • The ransomware uses complex encryption algorithms to lock the victim’s files, rendering them inaccessible. This process is fast and can affect a wide range of file types.

Ransom Note:

  • Following encryption, the victim is presented with a ransom note on their screen, usually demanding payment in cryptocurrency like Bitcoin. The note provides instructions on how to pay the ransom and receive the decryption key.

Payment:

  • Victims, often faced with the loss of critical data, may choose to pay the ransom. However, there’s no guarantee that paying the ransom will result in the decryption of files. Additionally, it encourages criminal activity and funds the ransomware ecosystem.

Protecting Against Ransomware

While the threat of ransomware is ever-present, there are steps you can take to protect yourself and your digital content:

Regular Backups:

  • Frequently back up your files to an external drive or a cloud service. This ensures that even if your files are encrypted, you have clean copies that can be restored.

Software Updates:

  • Keep your operating system and software up-to-date. Ransomware often exploits known vulnerabilities in outdated software.

Email Vigilance:

  • Be cautious when opening email attachments or clicking on links, especially if the email is from an unknown sender. Phishing emails are a common method of ransomware distribution.

Security Software:

  • Invest in reputable antivirus and anti-malware software. These can help detect and prevent ransomware infections.

Avoid Paying Ransoms:

  • Cybersecurity experts advise against paying ransoms. Not only is there no guarantee of receiving the decryption key, but paying ransoms also fuels criminal activities.

The Legal and Ethical Implications

Ransomware attacks have severe legal and ethical implications. Perpetrators can face severe legal consequences, including imprisonment. Additionally, such attacks are widely condemned due to their malicious nature and the harm they cause to individuals and organizations.

Conclusion

Ransomware is a perilous form of digital content theft that preys on individuals and organizations alike. The extortionate nature of ransomware attacks not only jeopardizes the accessibility of valuable digital content but also finances criminal activity. By staying vigilant, employing security measures, and never succumbing to ransom demands, individuals and organizations can protect themselves against this growing threat, ultimately contributing to a safer digital landscape.

Digital content theft part 1: File Sharing and Peer-to-Peer (P2P) Networks

Digital content theft part 1: File Sharing and Peer-to-Peer (P2P) Networks

Peer-to-Peer Network Definition: A peer-to-peer (P2P) network is a computer network in which each computer in the network can act as a client or a server for the other computers in the network, allowing the sharing of resources without the need for a central server. 

In a Peer-to-Peer network, each computer has equal privileges and can communicate directly with any other computer in the network rather than going through a central server. This decentralized structure allows for more efficient resource sharing and can make the network more resilient to failure, as there is no single point of failure. However, it can also make it more difficult to control and secure the network, as no central authority manages it.

Here’s an image that shows the difference between a server-based network and a Peer-to-Peer network:

Examples of Peer-to-Peer Network 

Let’s go through some examples in order to understand the Peer-to-Peer network in a better way.

Example 1:

One example of a pure Peer-to-Peer network is the BitTorrent file-sharing network. In the BitTorrent network, users can download and share files directly without needing a central server.

When a user wants to download a file, they connect to the network and request the file from other users who have already downloaded it. These users, known as “seeds,” send small pieces of the file to the requesting user, who assembles these pieces to create the complete file. The requesting user can also become a seed and share the file with other users who request it.

Example 2:

Another example of a Peer-to-Peer network is Skype, a popular communication platform that allows users to make voice and video calls and send messages to each other over the internet. In Skype, each user’s computer acts as a client and a server, allowing users to communicate directly.

However, Skype also uses central servers to help users find, connect, and handle tasks such as authentication and security. This makes Skype a hybrid P2P network.

Types of Peer-to-Peer Networks 

There are several types of Peer-to-Peer networks, such as:

  1. Pure P2P networks: These are networks in which all computers are both clients and servers, and there is no central server. Examples include BitTorrent and Gnutella.
  2. Hybrid P2P networks: These are networks that combine the characteristics of both P2P and client-server networks. In a hybrid P2P network, some computers may act as servers and provide resources to other computers, while others may act as clients and request server resources. Examples include Skype and eMule.
  3. Collaborative P2P networks: These are networks in which computers work together to perform a task, such as solving a complex problem or analyzing data. Examples include SETI@home and Folding@home.
  4. Mobile P2P networks: These are P2P networks composed of mobile devices, such as smartphones and tablets, which can connect over a wireless network. Examples include FireChat and Bleep.
  5. Cryptocurrency P2P networks: These are Peer-to-Peer networks that are used to validate and record transactions made with cryptocurrencies, such as Bitcoin and Ethereum.

Peer-to-Peer Network Architecture 

The architecture of a Peer-to-Peer network is decentralized, meaning that there is no central server or authority that controls the network. Instead, each computer in the network is connected to one or more other computers and can communicate with them directly.

In a Peer-to-Peer network, each computer is called a “node,” and each node has equal privileges and responsibilities. Nodes can communicate with each other by sending messages over the network using a set of rules called a “protocol.” The protocol defines how nodes should communicate with each other and what actions they can take, such as requesting or sending resources.

In some Peer-to-Peer networks, nodes may also be organized into “clusters” or “supernodes,” which can help improve the network’s efficiency and scalability. The remaining nodes can still share and communicate resources if one node goes offline or becomes inaccessible.

How Does Peer-to-Peer Network Work? 

Peer-to-Peer networks allow computers to communicate and share resources directly rather than through a central server.

Let’s go through an example in order to understand the working of a Peer-to-Peer network:

  1. Two computers, Alice and Bob, want to connect to a Peer-to-Peer network and share a file.
  2. Both computers open a P2P client program, which allows them to connect to the network and search for the file they want to share.
  3. Alice and Bob’s computers discover each other on the network and establish a direct connection.
  4. Alice and Bob’s computers exchange messages using the P2P protocol to request and send the file to each other.
  5. Once the file has been transferred, Alice and Bob’s computers can continue to share other files or disconnect from the network.

Finding, sharing, and connecting to other computers may be more complex in a more extensive Peer-to-Peer network. Some Peer-to-Peer networks use specialized software or servers to help nodes find and connect. At the same time, others rely on nodes to communicate directly with each other using a decentralized search algorithm.

Regardless of the specific method used, the key characteristic of a Peer-to-Peer network is that it allows computers to communicate and share resources directly without the need for a central server.

Advantages of P2P Network

Peer-to-Peer networks have several advantages, such as:

  1. Decentralized: Peer-to-Peer networks are decentralized, meaning no central server or authority controls the network. This makes them more resilient to failure, as there is no single point of failure.
  2. Efficient resource sharing: In a Peer-to-Peer network, each computer can act as a client and a server, allowing for more efficient resource sharing. This can reduce the burden on any single computer or server and make the network more scalable.
  3. Lower costs: Peer-to-Peer networks can reduce the cost of maintaining and updating resources, as there is no need for a central server or infrastructure. This can make Peer-to-Peer network more cost-effective for specific applications.
  4. Greater privacy: Peer-to-Peer networks can provide greater privacy for users, as no central server can collect or store user data.

Disadvantages of a Peer-to-Peer Network 

Peer-to-Peer networks also have some disadvantages, such as:

  1. Security: P2P networks can be more challenging to secure, as no central authority manages the network. This can make them more vulnerable to cyber-attacks and other security threats.
  2. Quality of service: The quality of service in a Peer-to-Peer network may vary, as it depends on the availability and reliability of other computers in the network.
  3. Control: P2P networks can be more challenging to control and manage, as no central authority regulates the network.
  4. Legal issues: P2P networks may raise legal issues, as people can use these networks to share copyrighted or illegal materials.

How to Use a Peer-to-Peer Network Efficiently?

Here are some tips for using a Peer-to-Peer network efficiently:

  1. Use a fast and reliable internet connection: A fast and reliable internet connection can improve the speed and performance of a P2P network.
  2. Keep your P2P client software up to date: Make sure to keep your P2P client software up to date with the latest version, as this can help improve the network’s performance and security.
  3. Connecting to a large number of seeds: In a file-sharing P2P network, connecting to a large number of seeds can help increase the network’s download speed and reliability.
  4. Use a P2P client with built-in bandwidth management: Some P2P clients have built-in bandwidth management tools that can help optimize the use of your internet connection and improve the network’s performance.
  5. Don’t download or share illegal or copyrighted materials: Downloading or sharing illegal or copyrighted materials on a P2P network can lead to legal issues and harm the network’s performance.
  6. Consider using a VPN: Using a virtual private network (VPN) can help improve the security and privacy of your P2P connection and may also improve the network’s performance.

o abide by the University’s computing policies and the laws referenced in these policies. Users are responsible for all activities conducted through their computing accounts and the devices registered under their name.

How to Protect the OTT Content Using DRM?

How to Protect the OTT Content Using DRM?

In today’s digital age, Over-The-Top (OTT) content delivery has revolutionized the way we consume video and audio content. OTT platforms like Netflix, Hulu, and Disney+ have become household names, offering a vast array of entertainment at our fingertips. However, with the increasing popularity of OTT content, protecting intellectual property and ensuring content security has become paramount. This is where Digital Rights Management (DRM) comes into play. In this article, we’ll explore what DRM is and how it can be used to safeguard your OTT content.

What is DRM?

Digital Rights Management, or DRM, is a technology used to protect digital content from unauthorized access, copying, and distribution. It achieves this by encrypting the content and controlling access through a licensing system. DRM serves as a digital lock that ensures only authorized users can access and enjoy the content. For OTT platforms, DRM is crucial in safeguarding valuable content and maintaining the revenue generated from it.

Protecting OTT Content with DRM

Here are some key strategies for protecting your OTT content using DRM:

1. Encryption

The foundation of DRM is encryption. Content is encrypted at the source and only decrypted for playback on authorized devices. This ensures that even if the content is intercepted during transmission, it remains secure and inaccessible to unauthorized users.

2. License Management

DRM relies on licenses to grant access to content. These licenses can be time-limited, device-specific, or even tied to a specific user’s credentials. OTT platforms can manage these licenses to ensure that only legitimate users can view the content.

3. Watermarking

Watermarking is another essential feature of DRM. It involves embedding hidden information in the video or audio content. This information can identify the source of the leak if the content is pirated, acting as a deterrent to unauthorized distribution.

4. Secure Players

OTT platforms should use secure player applications that are equipped to handle DRM-protected content. These players ensure that content can only be played on authorized devices and that the decryption process is secure.

5. Regular Updates

As technology evolves, so do the methods used by pirates to circumvent DRM. Regular updates to your DRM system are necessary to stay ahead of potential threats. This involves updating encryption algorithms and licensing systems to counter emerging threats.

6. Compliance with Industry Standards

It’s essential to adhere to industry standards for DRM implementation. This ensures that your content is compatible with various devices and platforms while maintaining robust security.

Benefits of Using DRM for OTT Content

How to Protect the OTT Content Using DRM?
How to Protect the OTT Content Using DRM?
  1. Protection of Intellectual Property: DRM helps content creators and distributors protect their valuable intellectual property, preventing unauthorized access and distribution.
  2. Revenue Protection: By securing your content, you can maintain your revenue streams and ensure that only paying customers have access.
  3. Enhanced User Experience: DRM ensures a seamless and secure experience for legitimate users, which is essential for building and retaining a loyal user base.
  4. Compliance and Reporting: DRM systems can track user behavior and help with reporting and compliance requirements, which is particularly important in the media industry.
  5. Deterrent for Pirates: The visible presence of DRM measures like watermarks acts as a deterrent to potential pirates.

Conclusion

Protecting OTT content using DRM is a necessity in today’s digital landscape. With the rise of piracy and unauthorized access, content owners and distributors must take proactive measures to secure their investments. By implementing DRM technology, you not only protect your content but also enhance the user experience and ensure compliance with industry standards. As OTT continues to shape the way we consume content, DRM remains an indispensable tool for content security and long-term success.

How Dynamic Ad Insertion in VoD Works

How Dynamic Ad Insertion in VoD Works

How do you insert ads into your content if you’re streaming video in a VoD environment? The answer is dynamic ad insertion, which lets you serve different ads to different audiences. How does dynamic ad insertion work for VoD? It’s a simple concept that relies on some sophisticated technology.

Quick Takeaways:

  • Dynamic ad insertion enables the insertion of different ads for different users into streaming video content.
  • Dynamic ad insertion uses server-side ad insertion (SSAI) technology to inject ads into existing streaming content.
  • Dynamic ad insertion lets advertisers target personalized ads to specific viewers.
  • Viewers benefit from seeing more relevant ads in VoD programming and experience a “seamless” stream akin to broadcast viewing.
  • Advertisers benefit from a more targeted audience and more efficient ad spending.

What Is Dynamic Ad Insertion?

Advertisers have long been able to insert ads into streaming video content, both live streams and video on demand (VoD). Dynamic Ad Insertion (DAI) expands on that concept by enabling advertisers to insert different ads for different viewers.

Lower revenue, poor advertiser quality, and lack of standardized measurement are top advertising concerns today.

Lower revenue, poor advertiser quality, and lack of standardized measurement are top advertising concerns today.

Dynamic ad insertion in VOD content.

With the continuing growth of advertising-based video on demand (AVoD) services, advertising has become a critical part of the streaming video landscape. By using DAI, advertisers can target specific types of viewers based on viewer insights and their own campaign goals. DAI even lets OTT services deliver more ads to specific viewers of VOD content or different ads based on the viewing device. It’s all about delivering seamless insertion and personalization of the ad experience for each viewer.

The primary benefit of DAI is that, unlike traditional broadcast advertising, it doesn’t serve the same ads to everybody. DAI allows the microtargeting and mass personalization that viewers demand and that advertisers benefit from. Viewers get ads targeted to their interests and behaviors, while advertisers don’t waste their ad dollars on consumers who have little or no interest in what they’re selling.

How Does Dynamic Ad Insertion in VoD Work?

To deliver microtargeted ads in OTT programming, DAI uses server-side ad insertion (SSAI) technology. Unlike client-side ad insertion (CSAI), which embeds ads at the device and requires two players (an ad player and content player), SSAI intercepts content from the OTT provider and inserts selected ads into the existing stream. This provides a seamless transition between content and advertising and enables the insertion of dynamically selected ads. (in 2020, Pixelate estimated that 40% of streaming ads are delivered via SSAI. Today that number is significantly larger.)

This all works because streaming video assets aren’t usually single files, but rather a flood of small chunks of video. The chunks are sent over the internet from the OTT provider and then reassembled on the viewer’s computer, phone, or media streaming device. A streaming manifest describes the correct sequence for these video chunks, which also plays a key role in dynamic ad insertion.

Dynamically inserting streaming ads with SSAI is a multi-step process that involves several different entities. It looks like this:

4ccef3 08b93fdd4ffa427ca0afe5ba1a31e080~mv2

How server-side ad insertion works.

  1. The viewer selects a VoD program to watch.
  2. The viewer’s media player sends a request for the VoD program to the OTT service’s content distribution network (CDN). The request includes information about the viewer to enable advertising targeting.
  3. The CDN is configured to use an ad insertion service for its manifests rather than the content originator. It relays the viewer request to the ad insertion service.
  4. The ad insertion service pulls the template manifest, including ad markers, from the content origin server. The ad markers tell the ad insertion service where to insert ads in the program.
  5. The ad insertion service sends a request to the ad decision server. This request includes information about the viewer such as the viewer’s player, the number and length of each ad break, available demographic info, and so on.
  6. The ad decision server uses the provided information to determine what ad(s) to serve for each ad break, then transmits the URLs for those ads to the ad insertion service.
  7. The ad insertion service adds the URLs for the ads to the manifest and sends what is now a complete manifest (content + advertising) to the viewer’s player via the CDN. At this point, every viewer receives a unique manifest.
  8. Playback begins on the viewer’s device.
  9. The viewer sees the ad(s) as inserted into the VoD programming.
  10. The ad insertion service or the viewer’s player generates data about the ad viewership. This data is then transmitted to the ad service for reporting purposes.

How Does a DAI System Decide What Ads to Serve?

One of the key attributes of dynamic ad insertion is the ability to serve personalized ads to individual viewers. It’s this ad personalization that offers value to all parties involved.

How does a DAI system know what ads to serve to what viewers? Ad targeting is part of the overall DAI process, based on information about the viewer provided by the publisher’s viewer’s subscription services on their devices. The OTT provider may know that viewers of a specific gender, age group, income level, and location want to watch a given program. That information enables advertisers, to attach highly personalized ads to programming that matches their viewer targets.

Bidding on specific ad slots is handled via programmatic advertising. Programmatic advertising uses machine learning and other technologies to automate ad buying and serve targeted ads to individual viewers. The State of Connected TV/OTT: Ad Supply Trends Report from Pixelate reveals that programmatic video advertising now reaches 72% of U.S. households.

The entire programmatic advertising process involves OTT providers, supply-side platforms (SSPs), demand-side platforms (DSPs), and advertisers. An SSP is an automated service that lets OTT providers sell their ad blocks to multiple DSPs. A DSP is an automated service that lets advertisers place ads with multiple OTTs via their SSPs. The OTT provider deals with one or more SSP, whereas advertisers deal with one or more DSPs.

The OTT provider tells the SSP what ad blocks are available and information about the program content and viewer demographics. The SSP transmits that information to one or more DSPs. The DSPs use that information to match available ad blocks to relevant advertisers, who’ve targeted the audiences that match what the OTT is transmitting. Advertisers can buy based on pre-determined pricing (Programmatic Guaranteed, DealID based) or, depending on the OTT provider, bid on available ad blocks via the DSP. In either case, the DSP will choose one or more advertisers to send to the SSP for consideration of inclusion in the ad break.

The result is that viewers see personally relevant ads seamlessly inserted into their VoD programming. They get an enhanced viewing experience while advertisers reach a targeted audience and get better value from their ad spend. This also benefits OTT providers, who generate greater ad revenues and keep their viewers more engaged during commercial breaks.

Contact us today to learn more about dynamic ad insertion and SSAI.

How aggregation is helping drive OTT subscriber numbers

How aggregation is helping drive OTT subscriber numbers

Industry Insights: New research shows that there is still plenty of headroom for OTT growth even in saturated markets, while we now have a better understanding of the composition of European OTT content libraries, and The DPP sets the industry mood music for the year.

Aggregation helps drive OTT subscriber numbers

While it is often tempting to think of OTT markets rapidly becoming saturated, study after study constantly finds headroom in even the most crowded marketplace.

As Rapid TV News reports, a new study from Parks Associates has found that 60% of Pay-TV subscribers, accounting for nearly half of US broadband households, are interested in streaming films and TV shows from an online video service as part of their Pay-TV subscription. What’s more, Pay-TV providers are responding to this demand, as the number of pay-TV consumers who receive online video services jumped nearly 50% in a year.

The average number of OTT services among households that have any OTT service was found to be 3.8, while the data shows households with Pay-TV services plus at least one OTT service subscribe to 4.2 OTT services on average.

“Parks suggested that pay-TV providers must keep offering their most valuable content, which includes live sporting and cultural events,” writes the website. “Additionally, it advised operators that they must offer access to streaming, target new services to their interested customers, and perhaps be willing to take a hit on pricing until this [current] chaotic market stabilizes.”

Meanwhile, and not unrelated, data presented by stocks analyst Trading Platforms shows that Netflix still has potential for growth in the US (and, by implication, elsewhere in the world).

The SVOD giant currently has 66m subscribers in the US, approximately one-third of its global total. Trading Platforms extrapolates that to 168.9m unique viewers per month and reckons that will grow to 182.2 by 2024, an 8% increase. Subs will grow in turn to 71% by 2025.

Amazon is currently the second-largest SVOD provider in the US and will remain so, increasing its subscriber numbers to 59.8m. Hulu’s growth is impressive too as the chart below shows, rising to 49.5 million.

But it is Disney that produces the most arresting figures, with Disney+ going from a standing start to 49.8 million subscribers by 2025. That is up 118% over its 2019 already impressive debut. By the end of 2020, 72.4 million people were already tuning in at least once a month.

And while we are talking about markets and subscribers, it is worth mentioning new research that shows insights into the behavior of SVOD subscribers through the lens of what sort of moviegoers they are.

“Cinema power users are subscribed to 50% more SVOD services than infrequent goers, rent twice as many new movie releases, purchase three times as many new releases, and are around three times as likely to pirate content from unauthorized sources,” writes Digital TV Europe. 

That said, it’s worth noting the YoY change across the categories for piracy in particular. It is down for the power users but up 28% YoY to just under 24% of all cinema goers, a much larger number of users, and an indication that the problem of content piracy in lockdown has not gone away. 

Mapping the European OTT industry’s content libraries

The European Audiovisual Observatory has just launched its latest round of figures and, for the first time, is including television content — both series and TV films — in its LUMIERE VOD database. 

Screenshot 18

As its headline for its announcement of this says, it has uncovered the fact that 44,000 European films and over 12,650 European TV seasons are currently available on a total of 462 VOD services in Europe (138 TVOD and 324 SVOD catalogs). This is a lot of locally produced content, especially given the perception of US dominance in the OTT market. But it arguably gets even more interesting when you dig down into some of the details. 

Here are our key takeaways from the figures.

  1. The UK still dominates European TV

The European market has four main content producers, the UK, Germany, France, and Spain. However, the presence of UK-produced content is highly disproportionate to its size. The United Kingdom leads the pack with 44% of all content, followed by Germany (17%), France (9%), and Spain (6%). Together these four provide three-quarters of all available European TV titles on VOD.

  1. A surprising lack of TV co-pros

While the film market featured 30% co-productions with other countries, only 12% of all European content was produced this way. The main secondary co-production countries are the United States and Canada.

  1. Children’s content dominates

9 out of 20 of the Top 20 European TV titles present in catalogs were children’s animated series. Peppa Pig dominates, found in 69 separate catalogs in 20 countries, with the rather more adult-themed live-action Irish/Canadian co-pro of Vikings not far behind. The cultural phenomenon that is Lego enabled Denmark to snag four positions in the Top 20 with its Ninjago: Masters of Spinjitzu.

  1. Age is no barrier

The average year of production for the Top 20 library content was 2011, though catalogs tended to trend much older than that and the average year of production of all TV seasons found on VOD in Europe was 1987. However, it’s worth noting that 60% of TV content was less than 10 years old, and it is largely outliers such as David Attenborough’s landmark BBC Zoo Quest series (1954) dragging the average down.

Assessing the mood of the industry

Some interesting insights into the year ahead come from the industry body, The DPP. Each year it considers five overarching themes, which it dubs the mood music of the year, that it thinks will inform media businesses in the year ahead. 

In previous years when it has done this, you can detect a slow and steady evolution from one year to the next. Unsurprisingly, 2021 is a bit different, and the mood music selected for this year is in places wholly new. 

  • Values

The articulation of business values, and the need to act upon them, is becoming increasingly necessary to attract, maintain and motivate employees on the one hand, and to stay relevant to customers on the other. Sustainability was the value that first broke through at the board level, but this is being joined by diversity and inclusion, wellbeing, trust, and social responsibility.

  • Data

Understanding the way the pandemic has reshaped the industry needs careful analysis, and companies are increasingly looking at data to provide far more nuanced views of business matters than before and inform the changes they need two make in the future.

  • Innovation

“Innovation is no longer a choice,” says The DPP, arguing that companies have to innovate if they are to maximize the opportunities that exist in the current slowly post-Covid market.

  • Adaptability

The DPP’s thoughts on this are worth quoting directly to pick out the subtleties over previous years.

“Over the years, we have seen the mood music theme of speed give way to one about agility. This refinement noted that going faster wasn’t always the appropriate response; sometimes the need is more to be highly responsive. 

“That notion has been refined again this year. Many wanted to capture the widespread need for flexibility which has come with both difficult economic circumstances and the need to innovate. The notion applies both internally and externally. 

  • Resilience

The ability to simply maintain business operations despite everything else currently going on.

The organization has also made some more straightforward predictions too, including the increased use of AI and automation and the growing importance of cybersecurity, and we’ll probably have a look at them in detail next time.