Recommended next reading:

The cyber threat landscape

The role of emerging technology