Protecting Critical Infrastructure Against Cyber-Attacks

Protecting Critical Infrastructure Against Cyber-Attacks

Apr 25th, 2012

Riskope gave a talk on Protecting Critical Infrastructure Against Cyber-Attacks. The venue was in Switzerland, at the Geneva Dialogue 16th-17th of April 2012. That conference was indeed geared toward Protecting Critical Infrastructure Against Cyber-Attacks. The general theme is Critical Infrastructure Protection, Resilience Enhancement, Strategies for the Future. Participants came from Canada, China, various European countries, Mexico as well as the USA.

Protecting Critical Infrastructure Against Cyber-Attacks

Risk Management: steering your organization through difficult times

Riskope presented “Risk Management: steering your organization through difficult times”. The presentation is available for free to registered blog users on demand. In the presentation we showed the deficiencies of standard  approaches. As a matter of fact heat maps, probability impact graphs and indexed approaches such as risk matrix fail to fulfill the needs of governments and corporations. As a matter of facts, government and corporations require to properly evaluate and keep up to date holistic , entreprise-wide risk assessments (ERM). They also need to optimize their risk exposures to gain critical competitive edge, and steer away from downturns or crisis.

We presented a case study from real life showing how we integrate into an ERM predictive knowledge about depth and duration of the economic recession  originally published by Riskope in the fall 2008. We can of course integrate in the same approach various cyber risks. This enables a convergent process of rational mitigative decision making.

PIGs risk matrix, as stated earlier in this blog and in other publications simply do not allow the depth, transparency, rationality and repeatability Riskope’s Optimum Risk Estimates (ORE) approach offers to its users.

Tagged with: , , , ,

Category: Consequences, Optimum Risk Estimates, Probabilities, Risk analysis, Risk management, Tolerance/Acceptability

2 responses to “Protecting Critical Infrastructure Against Cyber-Attacks”

  1. […] it? But remain only an excuse. Methods to get that difficult job done do exist and we use them, for example in the formulation of the consequences of Cyber-attacks, large scale environmental damag…. They are certainly not deterministic, and they are certainly not 100% accurate, but rather than […]

  2. Major Mining Corporation Hacked - The Ore Foundation says:

    […] Major Mining Corporation Hacked scenario we had predicted and explained has occurred. Indeed last week Goldcorp’s (TSX:G) payroll, trade secrets, and other intimate […]

Leave a Reply

Your email address will not be published. Required fields are marked *

Riskope Blog latests posts

  • Review of Credibility Crisis
  • 26-01-2022
  • Today we present the review of Credibility Crisis, Brumadinho and the politics of mining industry reform. The authors of this…
  • Read More
  • Recent failure at Pau Branco Mine, MG, Brazil
  • 13-01-2022
  • The recent failure at Pau Branco Mine, MG, Brazil is a classic example of cascading events. At this Vallourec Mineração…
  • Read More
  • What lies ahead?
  • 5-01-2022
  • What lies ahead? Well, first of all we wish all the serene and fruitful 2022 we all deserve despite the…
  • Read More
  • Get in Touch
  • Learn more about our services by contacting us today
  • t +1 604-341-4485
  • +39 347-700-7420

Hosted and powered by WR London.