Protecting Critical Infrastructure Against Cyber-Attacks
Apr 25th, 2012
Riskope gave a talk on Protecting Critical Infrastructure Against Cyber-Attacks. The venue was in Switzerland, at the Geneva Dialogue 16th-17th of April 2012. That conference was indeed geared toward Protecting Critical Infrastructure Against Cyber-Attacks. The general theme is Critical Infrastructure Protection, Resilience Enhancement, Strategies for the Future. Participants came from Canada, China, various European countries, Mexico as well as the USA.

Risk Management: steering your organization through difficult times
Riskope presented “Risk Management: steering your organization through difficult times”. The presentation is available for free to registered blog users on demand. In the presentation we showed the deficiencies of standard approaches. As a matter of fact heat maps, probability impact graphs and indexed approaches such as risk matrix fail to fulfill the needs of governments and corporations. As a matter of facts, government and corporations require to properly evaluate and keep up to date holistic , entreprise-wide risk assessments (ERM). They also need to optimize their risk exposures to gain critical competitive edge, and steer away from downturns or crisis.
We presented a case study from real life showing how we integrate into an ERM predictive knowledge about depth and duration of the economic recession originally published by Riskope in the fall 2008. We can of course integrate in the same approach various cyber risks. This enables a convergent process of rational mitigative decision making.
PIGs risk matrix, as stated earlier in this blog and in other publications simply do not allow the depth, transparency, rationality and repeatability Riskope’s Optimum Risk Estimates (ORE) approach offers to its users.
Tagged with: Critical Infrastructure Protection, Optimum Risk Estimates, Resilience Enhancement, risk exposures optimization, Risk Management
Category: Consequences, Optimum Risk Estimates, Probabilities, Risk analysis, Risk management, Tolerance/Acceptability
[…] it? But remain only an excuse. Methods to get that difficult job done do exist and we use them, for example in the formulation of the consequences of Cyber-attacks, large scale environmental damag…. They are certainly not deterministic, and they are certainly not 100% accurate, but rather than […]
[…] Major Mining Corporation Hacked scenario we had predicted and explained has occurred. Indeed last week Goldcorp’s (TSX:G) payroll, trade secrets, and other intimate […]