Corporate Defence Plan Against Cyberattacks

Siemens AG is joining with companies including Airbus and IBM to try to counter large-scale hacking attacks that threaten to cost $8 trillion in damage over the next five years.

The group signed a charter recently at a security conference in Munich urging stronger safeguards against assaults on digital systems that control homes, hospitals, factories and nearly all infrastructure. 

The charter aims to set a standard for companies to find trustworthy business partners, or avoid those outside that circle, Siemens Chief Executive Officer Joe Kaeser (pictured) said.

“If companies along the value chain share their experiences, then we can prevent a lot of things,” said Kaeser, who helped initiate the charter. Conversely, “if you haven’t established a certain set of elements, then you’re not part of the it. There has to be a unified approach.”

The initiative comes amid an ongoing investigation in the US into allegations of Russian interference in the 2016 election, and after computer malware has already shown its ability to spread through systems worldwide. 

Last year’s WannaCry ransomware crippled parts of Britain’s National Health Service and infected more than 300,000 computers across 150 countries. The cost of cyber-crime to firms over the next five years could reach $8 trillion, the World Economic Forum said in a report in January.

Signatories of the Munich charter, which also include Allianz AG, Daimler AG, NXP Semiconductors NV, SGS SA and Deutsche Telekom AG, are calling for governments and companies to take responsibility for digital security at the highest levels. They suggest governments set up dedicated ministries devoted to the issue.
Societal Breakdown

Airbus CEO Tom Enders said his company now employs about 1,000 people dealing with a response to cyber-attacks, a number he estimates will rise tenfold or more in the next decade, highlighting how the issue is becoming an increasingly central part of large companies’ organisation. 

New-generation aircraft contain tens of thousands of sensors and are increasingly connected via mobile networks, making the storage and securing of data increasingly complex, he said. Still, most of the security breaches that are disclosed via government agencies to companies typically come from the either the US or the UK, evidence that other European political institutions must do more to collaborate with companies, Enders said.

“We must not be afraid to share information freely between governments, government agencies and industries,”

Canadian Foreign Minister Chrystia Freeland said the issue “‘will certainly be a focus” of the country’s Group of Seven presidency this year.

The WEF report made reference to thousands of attacks every month on critical infrastructure, from European aviation systems to US nuclear power stations, and said state-sponsored hackers are attempting to “trigger a breakdown in the systems that keep societies functioning.”

Information Managment

You Might Also Read:

Darktrace Forms Cybersecurity Partnership With Siemens:

Alphabet Launches A Cybersecurity Company - Chronicle:

Hacking Aviation Technology:

« UN Chief Urges Global Rules For Cyber Warfare
North Korea's Cyber Army Has A New Battalion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.