cyber risk rss sort by issue

Issue 02/2020

Eight things organizations should do to ensure compliance with cyber security regulations

International standards can provide guidance and support for complying with regulations such as Europe’s GDPR or California’s CCPA

An organization’s legal responsibilities have always depended on its geographical location or, sometimes, the geographical origins of the data, but the world is becoming a smaller place. The European Union’s General Data Protection Regulation (GDPR), for example, has transformed the way data is treated everywhere, as businesses opt to avoid the additional costs of managing different data regimes. Comparable laws giving local residents more control over their data are starting to come into effect in other countries. For example, the California Consumer Privacy Act (CCPA) gives their residents the power to demand the deletion of information.  

2019
Issue 06/2019

Protecting manufacturing from cyber attacks

Adopting a risk-based approach and erecting defence-in-depth architecture to ensure business continuity is the best way to protect the manufacturing sector and other critical infrastructure.

Half of the manufacturing companies that took part in a recent survey in the US admitted they had suffered a data breach or cyber attack in the previous 12 months. Unfortunately, such attacks are part of a growing global trend as the Industrial Internet of Things (IIoT) accelerates the convergence of the once separate domains of IT and operational technology (OT). This has made cyber security intrusions and threats not only more difficult to detect but also to prevent. 

2017
Issue 07/2017

Helping thwart cyber threats on nuclear plants

Bespoke IEC International Standards reinforce protection against cyber attacks on nuclear power plants

Cyber attacks on civil nuclear power plants (NPPs) would have devastating consequences for a country relying, even in part, on nuclear energy. It could affect the entire power network, might cause the release of radioactive material and would have a highly adverse impact on public opinion. A Subcommittee (SC) of the IEC is developing International Standards that reinforce the cyber resilience of NPPs. 

Issue 07/2017

Cyber security for the modern grid

Protecting the keystone of critical infrastructure from cyber threats is an absolute priority

Mitigating risk and anticipating attack vulnerabilities on utility grids and systems are not just about installing technology, but also about understanding risk.

Issue 05/2017

Securing critical infrastructure all the way to the top

Protecting myriad connected devices will require a holistic approach to security risks

As more and more objects are connected, communicate and interact with each other, in what is labelled the internet of things (IoT), they become building blocks in larger systems. Known and unknown vulnerabilities in this wealth of objects are bound to attract cyber attacks that can bring down entire critical installations in many countries. Protection of IoT components against cyber threats, as well as of the systems that integrate them, is fast becoming a key priority. 

Issue 03/2017

To drive or not to drive?

The car of the future is already here

Imagine someone who hasn’t driven a car in the past 30 years. Taking the wheel of a modern car today, this person would probably be lost trying to figure out all the electronics inside. Voice command, self-driving cars, and even GPS navigation were still sci-fi ideas in the 1980s…