Cybersecurity Challenges ??
Businesses, administrations, and even governments are increasingly being hit by cyberattacks. No one can now claim to be safe.
This edition of the Agility Effect newsletter is dedicated to : Cybersecurity ???
Interview ????: In a world where everything is connected, cyber risk is everywhere
Analysis by David Ofer, President of the French Cybersecurity Federation.
Which activity sectors are most under threat?
David Ofer: The health sector is one of the worst affected by recent attacks. Other sectors that, if paralysed, would affect the way society functions are also in the attackers’ crosshairs: regional and local authorities, energy, telecommunications and transportation in particular. The risk is currently strongly focused on supply chains.
What is the French Cybersecurity Federation’s place and role in the digital security ecosystem ?
D. O.: Our ambition is to unify efforts to inform, prevent, and protect the economy, through an independent community approach completely separate from any commercial interest.
How much have businesses done regarding prevention?
D. O.: In 2023, the Federation carried out a survey, which showed that more than 60% of SMEs don’t have anyone with specific responsibility for cybersecurity, and only 25% have taken out related insurance. We urgently need to strip the subject of cybersecurity of its technical baggage in order to reach out to business in simple and understandable terms. Today, because they do not fully understand the subject, small businesses and SMEs are not inclined to allocate adequate budgets to protective measures.
What are the impacts of AI on cybersecurity?
Opinion piece by Julia Himmelsbach, Team Lead Advanced Analytics & AI at Axians ICT Austria GmbH.
Artificial intelligence is a technology that brings opportunities and risks in equal measure to the field of cybersecurity. An evaluation of its benefits and limits is the best way to fight effectively against cybercrime. With the introduction of LLMs (Large Language Models) such as ChatGPT, and the proliferation of open-source models, new opportunities are becoming available to the IT specialist – and to the cybercriminal.
领英推荐
Did you know the top cyber threats in the EU*?
How to secure energy infrastructure?
Energy transmission and distribution networks use OT (Operational Technology) and critical communications to manage the hardware and software that control industrial equipment.
Grid digitalization offer unprecedented business and operational benefits, such as grid automation and the integration of new value-added applications for Utilities. Nonetheless, digitalisation and standardisation adoption also increase the ways in which the systems can be attacked, because their devices, equipment, software and processes are all connected to the network. They are therefore more vulnerable to cyber attacks.
A robust cybersecurity strategy with the aim of increasing the strength and security of energy infrastructure is based on two main principles: “?Zero Trust” and “?Defense in Depth”.
According to Naiara Pabo Busto , Business Development Manager at Axians :
“A Zero Trust approach implies that that only known and legitimate computing, IoT and OT devices, and their communications only are explicitly authorised. Defense in Depth is a concept that originated from the army. It was successfully transposed to cybersecurity, where numerous protective layers and mechanisms are provided to secure data, assets and critical communications. Defense in Depth offers mechanisms for redundancy and resilience in order to counteract a wide range of cyber attacks”.
Discover maximum security with "Zero Trust"??
Discover our playlist of animations related to the environmental transition.
If you want to learn more about our expertise in digital, environmental, and energy transitions, visit our online media: The Agility Effect ??
Managing Director InprOTech en Inprosec
1 个月The article provides a thorough overview of the growing cyber threats businesses are facing, especially in IT environments. However, I feel there's an opportunity to highlight the increasing importance of Operational Technology (OT) security, particularly with the expanded regulatory framework introduced by the NIS2 Directive. NIS2 has broadened the scope, covering more sectors and companies, placing a spotlight on OT systems, which play a crucial role in industries like energy, transport, and manufacturing. As these sectors become more interconnected, ensuring that OT environments are secured is just as critical as safeguarding IT systems. While the article touches on many relevant aspects, I hope future discussions delve deeper into the unique challenges of OT cybersecurity. The risks here go beyond data breaches, with potential real-world impacts, and it's encouraging to see this area gaining attention.
Agent de sécurité
1 个月Très informatif
AWS Product Owner | Agile Coach | Project & Cloud Migration Manager | ITIL & Scrum Master | CAD-CAM & AutoCAD Expert | Logistics & Supply Chain Professional
1 个月A crucial discussion and timely insight into the evolving cyber security landscape! Vinci Energies' approach to integrating IT and OT protection, particularly in critical sectors, resonates deeply with the increasing sophistication of cyber threats. The proactive solutions provided by the SOC, including vulnerability scans, penetration testing, and managed detection, ensure that businesses can operate securely without massive upfront investments. As a professional in technology management, I particularly appreciate the OPEX model's flexibility and scalability, making top-tier cybersecurity accessible to a wider range of companies. In today’s Industry 4.0 environment, safeguarding interconnected systems is more critical than ever, and Vinci Energies is clearly leading the way in this space. Looking forward to seeing how this proactive model evolves further and how we can all better protect our infrastructures from emerging threats.
Juriste
1 个月Yesssss. All right ??