SlideShare a Scribd company logo
1 of 1
Download to read offline
Cyber resilience
Cyber resilience is the ability of an organisation to understand the
cyber threats it’s facing, to inform the known risks, put in place
proportionate protection, and to recover quickly from attack.
Cyber attacks
As the nation’s critical national
infrastructure becomes increasingly
networked the impact of an attack
on society becomes far more serious.
Infrastructure including utilities, power
networks, public transport, nuclear power
plants and defence facilities all face attack.
Network
compromise and
legacy systems
People Organised and
state-sponsored
cyber crime
Organised and
state-sponsored
cyber crime
The rapid
advance of
technology,
especially
convergence
Shortage of
skills required
for cyber
defence
Currently Future
2 2
1 1
3 3
What are the main concerns of cyber professionals?
*Research
conducted
by Atkins
October 2016
The future of cyber resilience
Technology is advancing all the time, so we cannot predict the
future, however we can imagine some key themes we should expect
•	 Corporate and industrial control networks
will continue to converge – benefits need to
be balanced against risks.
•	 Technology will shift – the technology in
10 years is likely to be completely different
from today. What is designed today is likely
to be obsolete in a decade.
•	 Access to cheap, ubiquitous technology will
make attack attempts increasingly easy
•	 Widespread mobile and wearable
technologies will make it nearly impossible
to set up strong geographical security
boundaries
•	 Quantum computing will compromise the
robust security currently offered by Public
Key Infrastructure (PKI) encryption.
Aligning security
to business goals
Using common
cyber language
Building physical
defences
Identifying key
assets and their
criticality
Planning for incidents
and crises
Increasing
cyber awareness
Identifying
threats
Securing industrial
networks
Educating employees
and suppliers
If you would like to find out about Atkins’ work in
cyber security please visit atkinsglobal.com/cyber
Human factors in cyber security
Accidental loss of
data/equipment
Use of open networks
Lack of awareness
Deliberate malice
Shortage of skilled resource
Acessing data on non-secure
personal devices
Perception of where the
advantage lies between
cyber attacker and
defender
Attacker
70%
Balanced
13%
Defender
17%
How to be cyber resilient

More Related Content

What's hot

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 

What's hot (20)

2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environments
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 

Viewers also liked

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
sarah kabirat
 
Implementación de un sistema 3D de información de servicios en el subsuelo en...
Implementación de un sistema 3D de información de servicios en el subsuelo en...Implementación de un sistema 3D de información de servicios en el subsuelo en...
Implementación de un sistema 3D de información de servicios en el subsuelo en...
Carles Colás
 

Viewers also liked (15)

8 ways to protect your digital footprint infographic
8 ways to protect your digital footprint infographic8 ways to protect your digital footprint infographic
8 ways to protect your digital footprint infographic
 
Could you be an engineer?
Could you be an engineer?Could you be an engineer?
Could you be an engineer?
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
The advent of digital engineering - a year in review
The advent of digital engineering - a year in reviewThe advent of digital engineering - a year in review
The advent of digital engineering - a year in review
 
The cyber resilient enterprise
The cyber resilient enterpriseThe cyber resilient enterprise
The cyber resilient enterprise
 
The renewable energy market in Asia
The renewable energy market in AsiaThe renewable energy market in Asia
The renewable energy market in Asia
 
Implementación de un sistema 3D de información de servicios en el subsuelo en...
Implementación de un sistema 3D de información de servicios en el subsuelo en...Implementación de un sistema 3D de información de servicios en el subsuelo en...
Implementación de un sistema 3D de información de servicios en el subsuelo en...
 
Video Marketing & YouTube with Lou Bortone
Video Marketing & YouTube with Lou BortoneVideo Marketing & YouTube with Lou Bortone
Video Marketing & YouTube with Lou Bortone
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
An introduction to the MicroProfile
An introduction to the MicroProfileAn introduction to the MicroProfile
An introduction to the MicroProfile
 
How to create better wellbeing outcomes for students through design
How to create better wellbeing outcomes for students through designHow to create better wellbeing outcomes for students through design
How to create better wellbeing outcomes for students through design
 
AQA Biology 1A Fighting Disease
AQA Biology 1A Fighting DiseaseAQA Biology 1A Fighting Disease
AQA Biology 1A Fighting Disease
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Increase retention by 35% and avoid US$2.5 million penalties with a single so...
Increase retention by 35% and avoid US$2.5 million penalties with a single so...Increase retention by 35% and avoid US$2.5 million penalties with a single so...
Increase retention by 35% and avoid US$2.5 million penalties with a single so...
 

Similar to Cyber resilient infrastructure infographic

CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Security
reuben_mathew
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
zayadeen2003
 

Similar to Cyber resilient infrastructure infographic (20)

Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructure
 
main.pptx
main.pptxmain.pptx
main.pptx
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Security
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
L479096.pdf
L479096.pdfL479096.pdf
L479096.pdf
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 

More from Atkins

More from Atkins (20)

Business uses for blockchain
Business uses for blockchainBusiness uses for blockchain
Business uses for blockchain
 
Nuclear energy mythbuster
Nuclear energy mythbusterNuclear energy mythbuster
Nuclear energy mythbuster
 
Sustainable Aerospace
Sustainable AerospaceSustainable Aerospace
Sustainable Aerospace
 
Geospatial data infographic
Geospatial data infographicGeospatial data infographic
Geospatial data infographic
 
Building what matters
Building what mattersBuilding what matters
Building what matters
 
Electrification of aircraft
Electrification of aircraftElectrification of aircraft
Electrification of aircraft
 
Atkins' End of Year Highlights 2017
Atkins' End of Year Highlights 2017Atkins' End of Year Highlights 2017
Atkins' End of Year Highlights 2017
 
Digital Reality Report Infographic
Digital Reality Report InfographicDigital Reality Report Infographic
Digital Reality Report Infographic
 
Procurement Made Simple
Procurement Made SimpleProcurement Made Simple
Procurement Made Simple
 
Green Sky Thinking: bringing forest schools to the inner city
Green Sky Thinking: bringing forest schools to the inner cityGreen Sky Thinking: bringing forest schools to the inner city
Green Sky Thinking: bringing forest schools to the inner city
 
A glance at Atkins' landscape architecture projects
A glance at Atkins' landscape architecture projectsA glance at Atkins' landscape architecture projects
A glance at Atkins' landscape architecture projects
 
Going for gold in London infrastructure
Going for gold in London infrastructureGoing for gold in London infrastructure
Going for gold in London infrastructure
 
Welcome to Atkins Acuity
Welcome to Atkins AcuityWelcome to Atkins Acuity
Welcome to Atkins Acuity
 
Atkins: Preliminary results for the year ended 31 March 2016
Atkins: Preliminary results for the year ended 31 March 2016Atkins: Preliminary results for the year ended 31 March 2016
Atkins: Preliminary results for the year ended 31 March 2016
 
Middle East Rail brochure
Middle East Rail brochureMiddle East Rail brochure
Middle East Rail brochure
 
What is engineering?
What is engineering?What is engineering?
What is engineering?
 
Welcome to Atkins 2016
Welcome to Atkins 2016Welcome to Atkins 2016
Welcome to Atkins 2016
 
Atkins looks back over 2015
Atkins looks back over 2015Atkins looks back over 2015
Atkins looks back over 2015
 
Analyst presentation: Crossrail and our international tunnelling expertise - ...
Analyst presentation: Crossrail and our international tunnelling expertise - ...Analyst presentation: Crossrail and our international tunnelling expertise - ...
Analyst presentation: Crossrail and our international tunnelling expertise - ...
 
2015 06-11-preliminary-results-presentaion
2015 06-11-preliminary-results-presentaion2015 06-11-preliminary-results-presentaion
2015 06-11-preliminary-results-presentaion
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Cyber resilient infrastructure infographic

  • 1. Cyber resilience Cyber resilience is the ability of an organisation to understand the cyber threats it’s facing, to inform the known risks, put in place proportionate protection, and to recover quickly from attack. Cyber attacks As the nation’s critical national infrastructure becomes increasingly networked the impact of an attack on society becomes far more serious. Infrastructure including utilities, power networks, public transport, nuclear power plants and defence facilities all face attack. Network compromise and legacy systems People Organised and state-sponsored cyber crime Organised and state-sponsored cyber crime The rapid advance of technology, especially convergence Shortage of skills required for cyber defence Currently Future 2 2 1 1 3 3 What are the main concerns of cyber professionals? *Research conducted by Atkins October 2016 The future of cyber resilience Technology is advancing all the time, so we cannot predict the future, however we can imagine some key themes we should expect • Corporate and industrial control networks will continue to converge – benefits need to be balanced against risks. • Technology will shift – the technology in 10 years is likely to be completely different from today. What is designed today is likely to be obsolete in a decade. • Access to cheap, ubiquitous technology will make attack attempts increasingly easy • Widespread mobile and wearable technologies will make it nearly impossible to set up strong geographical security boundaries • Quantum computing will compromise the robust security currently offered by Public Key Infrastructure (PKI) encryption. Aligning security to business goals Using common cyber language Building physical defences Identifying key assets and their criticality Planning for incidents and crises Increasing cyber awareness Identifying threats Securing industrial networks Educating employees and suppliers If you would like to find out about Atkins’ work in cyber security please visit atkinsglobal.com/cyber Human factors in cyber security Accidental loss of data/equipment Use of open networks Lack of awareness Deliberate malice Shortage of skilled resource Acessing data on non-secure personal devices Perception of where the advantage lies between cyber attacker and defender Attacker 70% Balanced 13% Defender 17% How to be cyber resilient