Corporate Defence Plan Against Cyberattacks

Siemens AG is joining with companies including Airbus and IBM to try to counter large-scale hacking attacks that threaten to cost $8 trillion in damage over the next five years.

The group signed a charter recently at a security conference in Munich urging stronger safeguards against assaults on digital systems that control homes, hospitals, factories and nearly all infrastructure. 

The charter aims to set a standard for companies to find trustworthy business partners, or avoid those outside that circle, Siemens Chief Executive Officer Joe Kaeser (pictured) said.

“If companies along the value chain share their experiences, then we can prevent a lot of things,” said Kaeser, who helped initiate the charter. Conversely, “if you haven’t established a certain set of elements, then you’re not part of the it. There has to be a unified approach.”

The initiative comes amid an ongoing investigation in the US into allegations of Russian interference in the 2016 election, and after computer malware has already shown its ability to spread through systems worldwide. 

Last year’s WannaCry ransomware crippled parts of Britain’s National Health Service and infected more than 300,000 computers across 150 countries. The cost of cyber-crime to firms over the next five years could reach $8 trillion, the World Economic Forum said in a report in January.

Signatories of the Munich charter, which also include Allianz AG, Daimler AG, NXP Semiconductors NV, SGS SA and Deutsche Telekom AG, are calling for governments and companies to take responsibility for digital security at the highest levels. They suggest governments set up dedicated ministries devoted to the issue.
Societal Breakdown

Airbus CEO Tom Enders said his company now employs about 1,000 people dealing with a response to cyber-attacks, a number he estimates will rise tenfold or more in the next decade, highlighting how the issue is becoming an increasingly central part of large companies’ organisation. 

New-generation aircraft contain tens of thousands of sensors and are increasingly connected via mobile networks, making the storage and securing of data increasingly complex, he said. Still, most of the security breaches that are disclosed via government agencies to companies typically come from the either the US or the UK, evidence that other European political institutions must do more to collaborate with companies, Enders said.

“We must not be afraid to share information freely between governments, government agencies and industries,”

Canadian Foreign Minister Chrystia Freeland said the issue “‘will certainly be a focus” of the country’s Group of Seven presidency this year.

The WEF report made reference to thousands of attacks every month on critical infrastructure, from European aviation systems to US nuclear power stations, and said state-sponsored hackers are attempting to “trigger a breakdown in the systems that keep societies functioning.”

Information Managment

You Might Also Read:

Darktrace Forms Cybersecurity Partnership With Siemens:

Alphabet Launches A Cybersecurity Company - Chronicle:

Hacking Aviation Technology:

« UN Chief Urges Global Rules For Cyber Warfare
North Korea's Cyber Army Has A New Battalion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies is a developer and provider of personal information protection and cyber security solutions and services.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Innova

Innova

Innova is Turkey's leading IT solutions company, providing platform independent solutions to organizations in telecommunication, finance, production, public and service sectors.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.