Major Mining Corporation Hacked

Major Mining Corporation Hacked

May 4th, 2016

Major mining corporation hacked and their confidential information made public

The Major Mining Corporation Hacked scenario we had predicted and explained has occurred. Indeed last week Goldcorp’s (TSX:G) payroll, trade secrets, and other intimate information leaked on a torrent free for anyone to download.
Last year a cyber attack significantly damaged a German steel mill.

Hackers find ways to tap in the complexities of the IT networks of corporations and governments around the world leading in this case to Major Mining Corporation Hacked

Hackers find ways to tap in the complexities of the IT networks of corporations and governments around the world. In this case the result was a Major Mining Corporation Hacked

Especially with the advent of IoT (Internet of Things) cyber attacks have the ability to generate multi-faceted consequences on interdependent systems. These were physical for the German steel mill, informational for the Canadian gold mining company.

Need for convergent ERM

There are 4 types of interdependencies:

  • logical,
  • physical,
  • geographical, and finally
  • informational.

Enterprise Risk Management (ERM) approaches have to consider them all.
This is why cyber risks are not a “Information Technology (IT) silo”, but we have to treat them as an ERM component. As we showed in a previous post IT silo lead to inefficiencies.

The Armed Forces of a European country came to the conclusion that ORE is the only available toolbringing ERM solutions for complex interdependent systems. Days before the Goldcorp hack reports in the media, we presented at CIM MES  here in Vancouver a conference which demonstrated the similarities between the Army and large mining companies ERM requirements and solutions.

Solving complex interdependent systems ERM issues

Riskope’s scalable, drillable, convergent ORE (Optimum Risk Estimates) ERM platform, sole sourced by Armed Forces for convergent cyber risks analysis (convergent means in this case multi-hazard, i.e. simultaneous cyber and all other hazards) has been created to solve these conundrums.

In the conference we explored:

The first step into a convergent ERM approach deployment is a Risk Management Functions Audit, the second being a full ORE implementation to replace obsolete siloed approaches.

Tagged with: , , , ,

Category: Consequences, Mitigations, Probability Impact Graphs, Risk analysis, Risk management

Leave a Reply

Your email address will not be published. Required fields are marked *

Riskope Blog latests posts

  • New achievements in risk assessment and management
  • 2-05-2023
  • Print PDFNew achievements in risk assessment and management will be attained thanks to SRK Consulting merging with Riskope. Indeed, we…
  • Read More
  • Open letter to the organizer of the tailings dam round robin exercise
  • 29-03-2023
  • Print PDFDear Ryan, please receive this open letter to the organizer of the tailings dam round robin exercise. It explains…
  • Read More
  • Landslides risk assessment and monitoring
  • 8-03-2023
  • Print PDFDuring the first couple decades of our professional life we worked extensively with Landslides risk assessment and monitoring in…
  • Read More
  • Get in Touch
  • Learn more about our services by contacting us today
  • t +1 604-341-4485
  • +39 347-700-7420

Hosted and powered by WR London.