Engineering & Mining Journal

MAR 2017

Engineering and Mining Journal - Whether the market is copper, gold, nickel, iron ore, lead/zinc, PGM, diamonds or other commodities, E&MJ takes the lead in projecting trends, following development and reporting on the most efficient operating pr

Issue link:

Contents of this Issue


Page 46 of 67

CYBERSECURITY MARCH 2017 • E&MJ 45 protection. ABB also trained Boliden per- sonnel on new methods to help improve cyber security. Don't Panic, Think Ahead In a report published last June, entitled Cyber Threats to the Mining Industry, Trend Micro noted that "In today's com- petitive global market for commodities … cyber espionage campaigns are designed to make sure that interest groups have access to the latest technical knowledge and intelligence so they can maintain competitive advantage and thrive in a market-driven global economy. "The mining industry is under threat from cyber attacks aimed at exploiting its strategic position in global supply chains. Very targeted and highly coordinated, the attacks are launched by a broad set of at- tacker groups ranging from 'hacktivists' to hostile governments and organized crim- inals. These groups have learned how to leverage the significant role that mining commodities play in regional and global supply chains and for national econo- mies, and know how to exploit the vul- nerabilities that mining companies are exposed to due to heavy reliance on inte- grated and automated systems." "The mining industry is both a geopo- litical and an economic target," the com- pany went on. "The threat actors behind foreign cyber espionage campaigns are increasingly interested in learning about governance policies, decisions and deci- sion-making processes of corporate exec- utives, but also in trying to gain a compet- itive edge by disrupting the advantage of a competitor." That said, in most cases, there is lit- tle reason to suspect that each and every player in a particular commodity market is busy infiltrating its competitors, day-in, day-out. That is no excuse, however, for complacency, and it behooves everyone to be on the lookout for anything that could suggest that cyber criminals are at work. French cybersecurity firm Sentryo be- lieves that with the growing number of cyber attacks each year, companies that use industrial control systems must re- gard establishing a Security Operation Centre (SOC) as a crucial step in the fight against cybercrime. Sentryo explains that "an SOC is a supervisory and administra- tive mechanism for IT systems security that enables IT security issues to be de- tected and analyzed by capturing events. In the case of an alert being issued, the SOC is also able to map out of the appro- priate responses." Such an approach does, admittedly, require a substantial amount of resource input, not only to put an SOC in place, but to maintain its integrity and capabil- ities over time. Yet it is hard to see how such an investment is not becoming es- sential as the shoals of cyber-sharks seek new prey within the increasingly global business environment. At the end of the day, one thing re- mains crystal clear. The weakest link in any security system is the movement of human fingers on a keyboard. Keeping people aware of the risks is one big step in maintaining corporate and personal security. Whether you are drilling thru a mountain or a mole hill, we've got a durable, dependable solution for you. If you need tools for construction, mining, or demolition-we're the only name you need to know. Call (800) 872-6899 or vs Brunner � Lay "Quality First" since 1882

Articles in this issue

Links on this page

Archives of this issue

view archives of Engineering & Mining Journal - MAR 2017