State-Sponsored Attack / Critical Infrastructure Attack / Lawful Interception /Cyber warfare
Hacktivism
Cloud Services Vulnerable to Privacy Attack
The Rising of Internal Threats and Occupational Fraud
Regulatory Compliance Threats / AEC Threats or Opportunity