Major Mining Corporation Hacked

Major Mining Corporation Hacked

May 4th, 2016

Major mining corporation hacked and their confidential information made public

The Major Mining Corporation Hacked scenario we had predicted and explained has occurred. Indeed last week Goldcorp’s (TSX:G) payroll, trade secrets, and other intimate information leaked on a torrent free for anyone to download.
Last year a cyber attack significantly damaged a German steel mill.

Hackers find ways to tap in the complexities of the IT networks of corporations and governments around the world leading in this case to Major Mining Corporation Hacked

Hackers find ways to tap in the complexities of the IT networks of corporations and governments around the world. In this case the result was a Major Mining Corporation Hacked

Especially with the advent of IoT (Internet of Things) cyber attacks have the ability to generate multi-faceted consequences on interdependent systems. These were physical for the German steel mill, informational for the Canadian gold mining company.

Need for convergent ERM

There are 4 types of interdependencies:

  • logical,
  • physical,
  • geographical, and finally
  • informational.

Enterprise Risk Management (ERM) approaches have to consider them all.
This is why cyber risks are not a “Information Technology (IT) silo”, but we have to treat them as an ERM component. As we showed in a previous post IT silo lead to inefficiencies.

The Armed Forces of a European country came to the conclusion that ORE is the only available toolbringing ERM solutions for complex interdependent systems. Days before the Goldcorp hack reports in the media, we presented at CIM MES  here in Vancouver a conference which demonstrated the similarities between the Army and large mining companies ERM requirements and solutions.

Solving complex interdependent systems ERM issues

Riskope’s scalable, drillable, convergent ORE (Optimum Risk Estimates) ERM platform, sole sourced by Armed Forces for convergent cyber risks analysis (convergent means in this case multi-hazard, i.e. simultaneous cyber and all other hazards) has been created to solve these conundrums.

In the conference we explored:

The first step into a convergent ERM approach deployment is a Risk Management Functions Audit, the second being a full ORE implementation to replace obsolete siloed approaches.

Tagged with: , , , ,

Category: Consequences, Mitigations, Probability Impact Graphs, Risk analysis, Risk management

Leave a Reply

Your email address will not be published. Required fields are marked *

Riskope Blog latests posts

  • Wells Fargo judgement and Tailings risks
  • 1-02-2023
  • We thought of Wells Fargo judgement and Tailings risks in follow-up to the recent judgement against a number of bank’s…
  • Read More
  • Prefeasibility hazard adjusted NPV
  • 25-01-2023
  • A mining company asked us to perform a Prefeasibility hazard adjusted NPV evaluation. Our action first focused on bringing clarity…
  • Read More
  • OpenAI’s ChatGPT applied to tailings dams and associated risks
  • 11-01-2023
  • As everyone else, we got excited about the new ChatGPT so we tried OpenAI’s ChatGPT applied to tailings dams and…
  • Read More
  • Get in Touch
  • Learn more about our services by contacting us today
  • t +1 604-341-4485
  • +39 347-700-7420

Hosted and powered by WR London.