Contact

Archives

Archive

A decade of physical risks generated by industrial systems hacking

A decade of physical risks generated by industrial systems hacking is featuring a remarkable and worrisome acceleration. Indeed, it all started, as far as we know, with the crippling Stuxnex worm attack on the Iranian uranium refining centrifuges. As the title clearly indicates, we will not discuss here the devastating attacks on administrative systems, data repositories, but focus on industrial systems. What is going on Successful hacking on industrial systems seemed to remain “isolated exploits” for a long time. For…

Read More

Innovation in Dams Screening Level Risk Assessment

For some reasons Innovation in Dams Screening Level Risk Assessment feels like an oxymoron. At each new accident organization like MAC produce a new edition of their manuals, for example Developing an Operation, Maintenance, and Surveillance Manual for Tailings and Water Management. The new editions generally represent a strengthening of some rules, but the result is always very similar to the prior edition, does not address systemic failure to properly evaluate risks of old and new facilities. Let’s tackle fundamental…

Read More

Aluminum maker ransomware attack

The recent Aluminum maker ransomware attack is a timely example for our next speech at infonex’s Cyber and Operational Risk Management in Vancouver B.C. Riskope will present Fostering Sustainability and Value Through Convergent Risk Assessments at it. Riskope’s presentation will discuss holistic and convergent approaches. Indeed, as shown by this latest attack, cyber, natural and man-made hazards generate risks that cannot be tackled by siloed approaches. Indeed: Cyber risks are not only an IT issue, thus convergent approaches are needed. Cyber attacks can generate…

Read More

Leadership boosting competitiveness with data driven decision making

Leadership boosting competitiveness with data driven decision making occurs when risk assessment databases, risk data are well structured and ready to advanced analyses. It is then possible to carry out risk triage, bundling and develop mitigation road-maps. We have discussed at length in earlier blogposts the steps necessary to develop a quantitative, convergent, updatable risk assessment. How to start risk triage, bundling and develop mitigation road-maps To perform a solid quantitative risk assessment you should have in your hand: a)…

Read More

Biasing, censoring and confusion in risk approaches

This conversation between a client and Riskope illustrates common biasing, censoring and confusion in risk approaches. We always warn our clients against biasing, censoring to avoid corporate blunders and make them aware of common practice costly confusion. We hope this example will help fostering good understanding of some issues. An interesting conversation with a agro-industrial client During a kick-off discussion with an agro-industrial client interested in risk management, they stated: “As to the risk management issue, we will focus on…

Read More

Corrego do Feijao near Brumadinho Dam Failure

Our hearts are saddened to comment on the trajedy around Corrego do Feijao near Brumadinho Dam Failure. (Image: Portal R7.com | Twitter.) At this time we only have fragmentary data from the media. Thus we will focus on “peripheral” but very important concepts that seem to get lost in the aftermath of each new tragedy. These concepts emerged in the paper entitled A systemic look at tailings dams failure process, presented at Tailings and Mine Waste 2016, Keystone, Colorado, USA, October 2-5,…

Read More

Improving Sustainability through Reasonable Risk and Crisis Management

Improving Sustainability through Reasonable Risk and Crisis Management is the title of our 2007 book. The book has sold through our website in 34 countries to individuals and CxOs eager to get a look into quantitative and rational risk management. Today, one can easily state that sustainability is a big topic in the Western chemical and mining, oil & gas industries. Companies want to be sustainability leaders although in some cases their claim sound more like PR campaigns. A recent…

Read More

Cryptominers exploit miners vulnerabilities

Miners are under a new attack as Cryptominers exploit miners vulnerabilities. Programs that hijack computer resources to mine cryptocurrencies without permission are indeed a new threat in the list. In summary, the “old list” for miners reportedly encompassed for example: Ransomware, which holds a company’s data hostage until a ransom is paid. data leaks. worms that could break down equipement “a la” stuxnet focussing on the SCADA system. However, the real-life general list is way longer, as witnessed by a…

Read More

Vancouver Digital Creative Agency Ballistic Arts Media Studios.