echo $post_date ?>
I was delighted to have Riskope Interviewed by Endeavor Magazine. Indeed Alice Instone-Brewer of Littlegate Publishing and I chatted for over an hour. The resulting interview appears in their Endeavor Magazine, December issue, page 33, https://www.littlegatepublishing.com/2021/11/endeavour-magazine-december-2021/. Riskope Interviewed by Endeavor Magazine: Calculated Risk Alice selected “Calculated Risk” as a title for the interview. Although at first sight the title may seem as a “déjà vu”, I gladly accepted it. Because it clearly states what we do for our clients. Indeed,…
Read More
echo $post_date ?>
Convergent risk assessments integrate areas that are significant to an organization, such as operational risk generated by various hazards or compliance, within a single framework. In the meantime, convergent risk assessments suppress informational siloes and therefore tend to explicitly tackle systemic interdependencies. Convergent risk assessment A convergent risk assessment looks at a silos-free system where: physical, informational geographical, and finally logical risk information converge in a single platform. Convergent risk assessments have to be holistic by definition. We discuss the definitions…
Read More
echo $post_date ?>
We are pleased to see that FM Global recognize the fact that Cyber attacks leave physical consequences. Some context on physical consequences Last year in 2019 we wrote about an aluminum maker forced to shut down operations because of a ransomware attack. Successful hacking on industrial systems seemed to remain “isolated exploits” for a long time. For example, in 2014 hackers struck a steel mill in Germany. They did so by manipulating and disrupting the industrial control systems (ICS) to such a…
Read More
echo $post_date ?>
Major mining corporation hacked and their confidential information made public The Major Mining Corporation Hacked scenario we had predicted and explained has occurred. Indeed last week Goldcorp’s (TSX:G) payroll, trade secrets, and other intimate information leaked on a torrent free for anyone to download. Last year a cyber attack significantly damaged a German steel mill. Especially with the advent of IoT (Internet of Things) cyber attacks have the ability to generate multi-faceted consequences on interdependent systems. These were physical for…
Read More