Protecting Critical Infrastructure Against Cyber-Attacks

Protecting Critical Infrastructure Against Cyber-Attacks

Apr 25th, 2012

Riskope gave a talk on Protecting Critical Infrastructure Against Cyber-Attacks. The venue was in Switzerland, at the Geneva Dialogue 16th-17th of April 2012. That conference was indeed geared toward Protecting Critical Infrastructure Against Cyber-Attacks. The general theme is Critical Infrastructure Protection, Resilience Enhancement, Strategies for the Future. Participants came from Canada, China, various European countries, Mexico as well as the USA.

Protecting Critical Infrastructure Against Cyber-Attacks

Risk Management: steering your organization through difficult times

Riskope presented “Risk Management: steering your organization through difficult times”. The presentation is available for free to registered blog users on demand. In the presentation we showed the deficiencies of standard  approaches. As a matter of fact heat maps, probability impact graphs and indexed approaches such as risk matrix fail to fulfill the needs of governments and corporations. As a matter of facts, government and corporations require to properly evaluate and keep up to date holistic , entreprise-wide risk assessments (ERM). They also need to optimize their risk exposures to gain critical competitive edge, and steer away from downturns or crisis.

We presented a case study from real life showing how we integrate into an ERM predictive knowledge about depth and duration of the economic recession  originally published by Riskope in the fall 2008. We can of course integrate in the same approach various cyber risks. This enables a convergent process of rational mitigative decision making.

PIGs risk matrix, as stated earlier in this blog and in other publications simply do not allow the depth, transparency, rationality and repeatability Riskope’s Optimum Risk Estimates (ORE) approach offers to its users.

Tagged with: , , , ,

Category: Consequences, Optimum Risk Estimates, Probabilities, Risk analysis, Risk management, Tolerance/Acceptability

2 responses to “Protecting Critical Infrastructure Against Cyber-Attacks”

  1. […] it? But remain only an excuse. Methods to get that difficult job done do exist and we use them, for example in the formulation of the consequences of Cyber-attacks, large scale environmental damag…. They are certainly not deterministic, and they are certainly not 100% accurate, but rather than […]

  2. Major Mining Corporation Hacked - The Ore Foundation says:

    […] Major Mining Corporation Hacked scenario we had predicted and explained has occurred. Indeed last week Goldcorp’s (TSX:G) payroll, trade secrets, and other intimate […]

Leave a Reply

Your email address will not be published. Required fields are marked *

Riskope Blog latests posts

  • New achievements in risk assessment and management
  • 2-05-2023
  • Print PDFNew achievements in risk assessment and management will be attained thanks to SRK Consulting merging with Riskope. Indeed, we…
  • Read More
  • Open letter to the organizer of the tailings dam round robin exercise
  • 29-03-2023
  • Print PDFDear Ryan, please receive this open letter to the organizer of the tailings dam round robin exercise. It explains…
  • Read More
  • Landslides risk assessment and monitoring
  • 8-03-2023
  • Print PDFDuring the first couple decades of our professional life we worked extensively with Landslides risk assessment and monitoring in…
  • Read More
  • Get in Touch
  • Learn more about our services by contacting us today
  • t +1 604-341-4485
  • +39 347-700-7420

Hosted and powered by WR London.