Corporate Defence Plan Against Cyberattacks

Siemens AG is joining with companies including Airbus and IBM to try to counter large-scale hacking attacks that threaten to cost $8 trillion in damage over the next five years.

The group signed a charter recently at a security conference in Munich urging stronger safeguards against assaults on digital systems that control homes, hospitals, factories and nearly all infrastructure. 

The charter aims to set a standard for companies to find trustworthy business partners, or avoid those outside that circle, Siemens Chief Executive Officer Joe Kaeser (pictured) said.

“If companies along the value chain share their experiences, then we can prevent a lot of things,” said Kaeser, who helped initiate the charter. Conversely, “if you haven’t established a certain set of elements, then you’re not part of the it. There has to be a unified approach.”

The initiative comes amid an ongoing investigation in the US into allegations of Russian interference in the 2016 election, and after computer malware has already shown its ability to spread through systems worldwide. 

Last year’s WannaCry ransomware crippled parts of Britain’s National Health Service and infected more than 300,000 computers across 150 countries. The cost of cyber-crime to firms over the next five years could reach $8 trillion, the World Economic Forum said in a report in January.

Signatories of the Munich charter, which also include Allianz AG, Daimler AG, NXP Semiconductors NV, SGS SA and Deutsche Telekom AG, are calling for governments and companies to take responsibility for digital security at the highest levels. They suggest governments set up dedicated ministries devoted to the issue.
Societal Breakdown

Airbus CEO Tom Enders said his company now employs about 1,000 people dealing with a response to cyber-attacks, a number he estimates will rise tenfold or more in the next decade, highlighting how the issue is becoming an increasingly central part of large companies’ organisation. 

New-generation aircraft contain tens of thousands of sensors and are increasingly connected via mobile networks, making the storage and securing of data increasingly complex, he said. Still, most of the security breaches that are disclosed via government agencies to companies typically come from the either the US or the UK, evidence that other European political institutions must do more to collaborate with companies, Enders said.

“We must not be afraid to share information freely between governments, government agencies and industries,”

Canadian Foreign Minister Chrystia Freeland said the issue “‘will certainly be a focus” of the country’s Group of Seven presidency this year.

The WEF report made reference to thousands of attacks every month on critical infrastructure, from European aviation systems to US nuclear power stations, and said state-sponsored hackers are attempting to “trigger a breakdown in the systems that keep societies functioning.”

Information Managment

You Might Also Read:

Darktrace Forms Cybersecurity Partnership With Siemens:

Alphabet Launches A Cybersecurity Company - Chronicle:

Hacking Aviation Technology:

« UN Chief Urges Global Rules For Cyber Warfare
North Korea's Cyber Army Has A New Battalion »

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Georgia Tech Research Institute (GTRI)

Georgia Tech Research Institute (GTRI)

GTRI's Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER Lab) is a leader in developing the technologies that secure, defend, and respond to cyber threats.

6WIND

6WIND

6WIND deliver high performance networking software to enable new generation architectures on COTS servers. Products include network security solutions.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Baffle

Baffle

Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing.

IPV Cyber Tech (IPVTec)

IPV Cyber Tech (IPVTec)

IPV Tec has developed IPVmon, an innovative cloud-based remote-monitoring system for websites and online assets.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Office of the National Security Council (UVNS)

Office of the National Security Council (UVNS)

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Blockchain Security Solutions (BCSS)

Blockchain Security Solutions (BCSS)

Blockchain Security Solutions delivers solutions to make Blockchains more cyber secure. It provides services to authorities and institutes to make the Blockchain unattractive for cybercriminals.