Cybersecurity futures 2025: What the scenarios got right, and what we learned
How have cybersecurity futures scenarios for 2025 played out?
Image: Getty Images/iStockphoto
Steven Weber
Professor of Information, Professor of Political Science, University of California, BerkeleyStay up to date:
Cybersecurity
- In 2018, scenarios regarding the cybersecurity futures for 2025 were developed but how did those scenarios play out and what can we learn?
- Rapid and disruptive technological change had been correctly anticipated, with AI and semiconductors becoming key geopolitical assets.
- Omissions from the modelling where there is a profound effect include the impact of global talent movement on tech innovation and the evolution of ransomware.
In 2018, the UC Berkeley Center for Long-Term Cybersecurity (CLTC) partnered with CNA’s Institute for Public Research to develop scenarios exploring potential “cybersecurity futures” for 2025. Now that 2025 is here, we ask, how did we do?
We conducted a detailed “postmortem” on our scenarios to understand which signals we correctly identified and those we missed, collecting those insights for lessons learned.
The original 2025 scenarios
Quantum leap
Early breakthroughs in quantum computing prompted attempts to establish a global non-proliferation regime. These efforts failed as quantum technology spread beyond original state control to multiple countries and criminal networks.
Non-proliferation efforts slowed competitors but rarely stopped them, leading major powers to consider accelerating quantum dissemination to allies instead of containment.
The new wiggle room
The push to use secure digital technology, the internet of things and machine learning to quantify individual and social life led to an unexpected dilemma: the loss of constructive ambiguity.
As hyper-precise data eliminated the small uncertainties that smooth social, legal and economic interactions, people sought new flexibility through multiple, fluid digital identities. This created new security challenges around identity management and verification.
Barlow’s revenge
Following catastrophic security failures, the world split into two competing internet governance models: one where governments ceded control to large tech firms (fulfilling John Perry Barlow’s cyber-libertarian vision) and another embracing digital nationalism, where the internet became an explicit instrument of state power.
The sharpest tensions emerged where these approaches collided.
Trust us
After digital insecurity nearly collapsed the internet economy, companies turned security over to “SafetyNet,” an artificial intelligence (AI) driven mesh network detecting intrusions and patching vulnerabilities in real time.
Cyberspace is split into the traditional internet (less secure but more private) and the SafetyNet environment (highly secure but heavily monitored), raising questions about whether privacy, freedom and trust could survive in a world secured by omnipresent AI oversight.
Scenarios cannot precisely predict the future but they surface strategic decisions we can take now to better prepare for multiple possible futures.
”What we got right
Revisiting these scenarios in 2025 surfaced a few key insights:
Discontinuous change does happen
We correctly anticipated that technologies such as AI and quantum computing would advance through dramatic step functions rather than smooth curves. The rapid emergence of generative AI (GenAI) models since 2022 exemplifies this pattern, as GenAI transformed expectations, investment patterns and technology trajectories seemingly overnight.
Similarly, quantum computing has moved faster than contemporary forecasts anticipated (the National Institute of Standards and Technology accelerated its timeline for transitioning to quantum-resistant cryptography).
Advanced technologies as sovereign assets
The CHIPS Act and similar initiatives highlight how semiconductor manufacturing, AI development and quantum research have become central theatres of great power competition.
This dynamic has extended to export controls and increasingly, to fundamental tenets of recent globalization, such as capital flows, particularly in the US-China relationship, precisely as our scenarios anticipated.
Trends we underestimated
Public-private integration intensifies
We underestimated how quickly boundaries between government and corporate capabilities would blur, creating hybrid institutional forms. Organizations like OpenAI demonstrate this hybridity, operating as nonprofits with for-profit subsidiaries while partnering with defense agencies.
Meanwhile, open-source AI development has introduced governance models that transcend traditional state or market binaries – a dynamic our scenarios didn’t adequately explore.
Identity is a battlefield
While we named digital identity an important contested space, we underestimated how synthetic media would weaponize ambiguity. According to the World Economic Forum’s “Global Cybersecurity Outlook 2025,” 47% of organizations view adversarial advances powered by GenAI as their primary concern, as these enable more sophisticated and scalable attacks.
Today’s environment combines excessive certainty (thanks to algorithmic profiling) with radical uncertainty, where even video evidence carries a diminishing truth value. This contradiction creates excessive precision and fundamental doubt – a tension our scenarios only partially capture.
What we missed
Human capital mobility
We failed to anticipate how global talent flows would shape technological development. The movement of researchers between organizations transfers crucial knowledge, making immigration policies instruments of technology strategy.
This is particularly visible in AI, where key scientists moving between technology companies such as DeepMind, OpenAI and Anthropic have created competitive advantages while accelerating overall capability development.
Ransomware
The malware that encrypts the victim’s personal data until a ransom is paid transformed the threat landscape through business model innovations rather than technical advances.
Ransomware-as-a-service platforms democratized attack capabilities, revealing limitations in our focus on technologies rather than economic organization and incentives. That was an ironic and unacceptable miss – we failed to make adequate use of the best knowledge and understanding in this area.
Accept our marketing cookies to access this content.
These cookies are currently disabled in your browser.
What we couldn’t have seen
Lockdown
The pandemic accelerated digital transformation and tested security architectures. Though we didn’t predict COVID-19, the resilience demonstrated by digital infrastructure suggests security capabilities had matured more than anticipated.
Supply chain vulnerabilities
Weaknesses within a business’s network of suppliers, processes and infrastructure emerged as a central attack vector. The SolarWinds incident demonstrated how adversaries leverage trusted distribution channels to bypass conventional security, exposing an offence-dominance we failed to capture in our scenarios.
Per the Global Cybersecurity Outlook, 54% of large organizations cite supply chain challenges as the greatest barrier to achieving cyber resilience.
Looking forward
Looking forward to 2030, these are three tensions decision-makers should monitor.
- Sovereignty versus interoperability: How will competing visions of digital sovereignty balance against the need for interoperable systems? The notion of a global IT stack appears dead for now, implying less uniform attack surfaces and greater fragmentation of defence capabilities.
- Transparency versus performance: This tension manifests across AI, quantum and security systems, where black box algorithms offer performance advantages but undermine accountability. Will interpretability remain an important source of human “trust” in technology?
- Human judgment versus automation: What decision boundaries will emerge between algorithmic and human authority? The optimal allocation of agency between human and machine systems is deeply contested across domains, from content moderation to the creative industries to critical infrastructure protection.
Scenarios cannot precisely predict the future but they surface strategic decisions we can take now to better prepare for multiple possible futures.
Don't miss any update on this topic
Create a free account and access your personalized content collection with our latest publications and analyses.
License and Republishing
World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.
The views expressed in this article are those of the author alone and not the World Economic Forum.
Forum Stories newsletter
Bringing you weekly curated insights and analysis on the global issues that matter.
More on CybersecuritySee all
Chiara Barbeschi and Luna Rohland
May 21, 2025
Steve Durbin
May 20, 2025
Sadie Creese and Filipe Beato
May 15, 2025
Madeleine North
May 14, 2025