I need a one page answering these questions
Where do we think the next wave of security threats will come from?
Do we think they will follow technology and any weaknesses therein?
Will it divert from current exploits based on advances in technology defenses?
Or will it continue to exploit the weak link in the security chain (USERS)?