Cybersecurity can teach business how to succeed with platform models. Here's how

A pair of glasses in front of multiple computer screens

Cybercrime networks have been the most ruthless adopters of the platform model

William Dixon
Global Head, Research, ISTARI
David Balson
Director of Intelligence, Ripjar
Our Impact
What's the World Economic Forum doing to accelerate action on Cybersecurity?
The Big Picture
Explore and monitor how Illicit Economy is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:


In the early era of industrial growth, the only option for a successful business was to fully integrate supply chains and human capital. The rise of the use of digital technology in the 1980s and 1990s resulted in radically reduced transaction costs between businesses. Communications between organizations driven by early cyber pioneers became flexible and dynamic – collaboration and outsourcing, rather than ownership, started to become the new normal.

In an era of artificial intelligence, 5G and ubiquitous connectivity, some economists predict that the organizations of the future will be platform models, organizations that have shed ownership and only concentrate on the matching of needs.

Since the turn of the millennium, the cybersecurity industry has been grappling with the most ruthless adopters of platform models: cybercrime networks.

Cybersecurity and platform models

The creation of highly efficient and dynamic systems by criminals to provide malicious services exploiting computer networks and enable fraud has created a global, underground digital economy. For criminals, the advantages of digital networks are obvious: they deliver faster growth, better return on capital and larger profit margins than traditional organized crime activity. As Europol has been documenting since 2011, thousands of criminal online forums, platforms and crimeware service models have proliferated and enabled an explosion of online crime. Criminal markets are the backbone of the cybercrime explosion of the past 20 years.

Have you read?

Organizations seeking to match these highly effective criminal models have been obliged to adapt to a platform-based economy themselves. Criminal gain and the innovative acumen of criminal activity are driving technological prowess and advancement, causing the cybersecurity world to follow suit technologically. More businesses could look at how organizations have responded to cybercriminals when responding to platform models in their own industries.

The following three lessons show how the cybersecurity industry is adapting in the platform economy:

1. Networks reduce costs and need for ownership

The world’s most infamous cybercriminals – far from being technical super hackers – were the orchestrators of vast networks of highly connected criminal platforms and forums. The operators of some of the most high-profile cybercrimes of all time – including Zeus, SilkRoad and Hansamarket – were businesses and highly efficient service models that linked money launderers, malware specialists and network infrastructure providers in an ever-efficient market.

The rise of software-as-service, managed security services and cloud-based security, instead of building complex in-house security capabilities, have been some of the only ways to efficiently combat this threat. The world’s cybersecurity unicorns do not provide bespoke tailored capabilities but are platform-based. Their software and services are built to scale across industries and geographies.

Bar chart shows the rise in cybercrime in terms of dollar losses.
The impact of cybercrime has soared over two decades,

The platform model will continue to dominate with specialist skills in short supply and the growth of a vibrant, global, cyber gig economy. The market for managed service providers, companies that remotely manage their clients’ IT infrastructure, is set to be worth $55 billion in the next five years, for example.

2. Platforms are outcome-based not strategy-based

Cybercriminals commit to the accomplishment of an overall outcome, not a rigid plan. When faced with challenges mounted by defenders, they adapt to achieve their outcome. For attackers, experimentation, coordination and bottom-up decision-making have taken the place of strict top-down and hierarchical decision-making processes, which are too slow and cumbersome in the cyber age. Cybersecurity has a real-time cadence of cause and effect. Criminal platforms enable constant experimentation and innovation to gain a new foothold or advantage within a computer network.

As a direct consequence, the cybersecurity industry is one of the most proficient adopters of innovative defensive technology and new partnership models. It’s highly adept at the rapid integration and implementation of cutting-edge capabilities. Accenture’s recent Invest for Cyber Resilience study identified the industry as the most advanced in adoption of the latest technologies with 84% of businesses now spending 20% of their security budget on AI, machine learning or robotic process automation services. Business leaders are now looking within their security teams future organizational and strategic leaders as a result.

3. Trust and verification

Cybercrime platforms have developed complex trust and verification systems. Trust is a critical common component of thousands of dark-web forums which are centred on ratings, reviews and reputation management akin to Ebay, Etsy or Amazon. For cybercriminals the stakes are high: trust and verification could be the difference between a lifetime in prison or financial success.


How is the Forum tackling global cybersecurity challenges?

Cyber defenders face the same integrity and trust-based issues, both in fighting the criminal networks and in their own platform and cloud-based businesses. As networked businesses require more shared and sensitive access to data, working with partners can require an understanding of risk across an entire business supply chain. This is a major issue for the future of work. According to Coase’s theory of the firm, businesses will own what makes their core identity and therefore, for many, survival will rest on maintaining trust in their services, whether that’s banking, commerce or mobility. Yet, in the networked world, security and trust cannot be shed but will need to be shared.

Building a global multistakeholder platform

Criminal networks are ruthlessly geared towards goals and outcomes; the digital system that is necessary to counter them must be too. In the flexibility of platforms and networks businesses have the same tools with which to find solutions to achieve their outcomes. Instead of adopting a complex and carefully directed strategy, disruptive organizations are empowering their staff to achieve their outcomes with dynamic technology and the efficient matching of capabilities. This approach is driving efficiency, scale and profitability, but it is only an early response to the growing trends of digital crime and the wider strategic changes brought by technology.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

Tinder Swindler: How 'romance fraud' became a multi-billion dollar cybercrime

Robin Pomeroy and Sophia Akram

May 24, 2024

About Us



Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum