Categories
Resources

GIA’s Effective Cyber Risk Management Guide

A best practice thought leadership governance guide for digitally secure and resilient organisations

Categories
Commentary & Insights

12 recent cyber-attacks on the telco sector

In this post we summarise recent cyber-attacks on providers of telecommunications services. What are the business risks of cyber-attacks on telecommunication service providers? Cyber-attacks on telcos can have far reaching consequences. The nature of information held on customers can put their personal safety at risk if it’s breached. And outages can prevent connected, critical equipment […]

Categories
Resources

NIST Cybersecurity Framework (CSF) 2.0

A globally recognised framework that helps organisations of any size, sector, or maturity, to manage and reduce cyber security risk through a structured, flexible approach

Categories
Commentary & Insights

10 recent cyber attacks on the transport & logistics sector

In this post we summarise recent cyber-attacks on transport and logistics operators. Transport and logistics sector overview The transport and logistics sector is responsible for the movement of people and goods. Our definition covers the public and private transport systems, infrastructure, and ancillary services associated with: Our definition of transport and logistics covers the transport […]

Categories
Commentary & Insights

8 recent cyber attacks on the manufacturing industry

In the highly competitive world of manufacturing, the intellectual property of competitors can save adversaries millions of dollars, if not billions, in product development, and shrink time to market timelines considerably. The shutdown of production lines can lead to product shortages that result in consumers switching suppliers, as well as starve manufacturers of revenue in […]

Categories
Commentary & Insights

9 recent cyber attacks on the water and wastewater sector

This page summarises some of the most recent cyber attacks on water and wastewater utilities that are in the public record. The majority of organisations, of any type, prefer not to publicly report their incidents, so the reality is that more attacks are occurring than we hear about. Tipton, Indiana Date: April 2024Country: United StatesConsequence: […]

Categories
Resources

SA Power Networks Cyber Security Annual Report 2023

Exemplar cyber security report for boards, executives, asset managers, and external stakeholders

Categories
Explain

Cyber-Physical Systems

Cyber-physical systems are a type of system where physical processes and computational elements are deeply integrated and interact with each other

Categories
Resources

AICD’s Governing Through a Cyber Crisis

A framework for cyber incident preparedness, response and recovery for Australian directors

Categories
Commentary & Insights

Cyber-Informed Engineering (CIE) vs Consequence Driven, Cyber-Informed Engineering (CCE)

Cyber-Informed Engineering (CIE) and Consequence Driven, Cyber-Informed Engineering (CCE) are concepts developed by the Idaho National Laboratory (INL). A side-by-side comparison of the two is presented in the table below. CIE is a guide to embedding cyber security considerations into cyber-physical systems throughout the engineering lifecycle model, and across business functions. The CIE guide is […]