This discussion is locked.
You cannot post a reply to this discussion. If you have a question start a new discussion

cybersecurity assurance

Hello all,

I am the newly appointed lead cyber authority for a large energy company.  I am interested in your thoughts on what an assurance framework or assurance model  might look like in providing an independent view on cyber risk. 


Thanks,


Mike Ramesar
Parents
  • On a more practical note

    There are some really odd things done for things like remote monitoring of distributed assets, with for example special SIM cards and adapters generating legacy protocols at each end of  link that is pretending to be wired 20mA loop or CanBus or something but is not really wired, in a way  that may or may not be very secure. 

    In such a system one needs to include consideration of compromise of the physical assets - how much damage  could someone do if they stole a monitoring unit from a remote location and then sometime later mis-used it to re-join the network as a subversive and either snooped or inserted false data.?

    Mike.

Reply
  • On a more practical note

    There are some really odd things done for things like remote monitoring of distributed assets, with for example special SIM cards and adapters generating legacy protocols at each end of  link that is pretending to be wired 20mA loop or CanBus or something but is not really wired, in a way  that may or may not be very secure. 

    In such a system one needs to include consideration of compromise of the physical assets - how much damage  could someone do if they stole a monitoring unit from a remote location and then sometime later mis-used it to re-join the network as a subversive and either snooped or inserted false data.?

    Mike.

Children
No Data