版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
BuildingaCultureofCyberResilienceinManufacturing
WHITEPAPER
MAY2024
Images:Midjourney,GettyImages
Contents
Executivesummary3
1Prioritizingcyberresilienceinmanufacturing4
1.1Whycyberresilienceisvitalformanufacturing4
1.2Themaincyberrisksinmanufacturing7
1.3Theglobalimpactofcyberattacks9
2Towardsacyberresilientmanufacturingsector:10
Uncoveringthechallenges
2.1Divergentculturesandresources10
2.2Increasedconnectivityandlegacysystems11
2.3Operationalsensitivitytodowntimeandextended12
ecosystemdependencies
2.4Strategicalignmentwithbusinesspriorities12
2.5Widespreadandcomplexregulatorylandscape12
3Guidingprinciples15
3.1Makecyberresilienceabusinessimperative16
3.2Drivecyberresiliencebydesign22
3.3Engageandmanagetheecosystem28
Conclusion34
Contributors35
Methodology37
Endnotes38
Disclaimer
Thisdocumentispublishedbythe
WorldEconomicForumasacontributiontoaproject,insightareaorinteraction.
Thefindings,interpretationsand
conclusionsexpressedhereinarearesultofacollaborativeprocessfacilitatedand
endorsedbytheWorldEconomicForumbutwhoseresultsdonotnecessarily
representtheviewsoftheWorldEconomicForum,northeentiretyofitsMembers,
Partnersorotherstakeholders.
©2024WorldEconomicForum.Allrightsreserved.Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,includingphotocopyingandrecording,orbyanyinformation
storageandretrievalsystem.
BuildingaCultureofCyberResilienceinManufacturing2
May2024
BuildingaCultureofCyberResilienceinManufacturing
Executivesummary
Themanufacturingsectoroperateswithina
complexecosystem,characterizedbyavariety
ofsites,extensivesupplychainsandinterlinkednetworks.Thisecosystemreliesonamultitudeofsuppliers,vendorsandpartners.
Overthepastdecade,manufacturinghasbeen
experiencingaswiftdigitaltransformation,which
isfuellinggrowth,efficiencyandprofitability.This
trendhasalsoexposedthesectortoawiderangeofcyberthreats,makingitthemosttargetedby
cyberattacks–overthepastthreeyears,the
manufacturingsectorhasaccountedforoneinfourofallcyberincidents.
Atthe2023AnnualMeetingoftheWorldEconomicForuminDavos,businessleadershighlighted
theneedtoaddresscybersecurityrisksfor
manufacturingattheecosystemlevel,thuskick-
startingtheCyberResilienceinManufacturing
initiative.LedbytheCentreforCybersecurity
andtheCentreforAdvancedManufacturingand
SupplyChainsattheForum,thisinitiativehas
broughttogethermorethan30representativesfromacrossthemanufacturingecosystem.Theaimistodevelopactionableguidanceonhowtodevelopacultureofcyberresilience.
Throughextensiveresearchandconsultations
withindustryleadersaswellasstandard-setting
andregulatorybodies,theCyberResiliencein
Manufacturinginitiativehaspreviouslyunderscoredthefiveprimarychallengesfordevelopingacultureofcyberresilienceinthemanufacturingecosystem.
Inresponsetothese,theinitiativehasalsoformulatedthreeguidingprinciplestosupportmanufacturing
andsupplychainleadersinestablishingapervasivestrategyfordevelopingacyberresilienceculture
throughouttheirorganizations:
1.Makecyberresilienceabusinesspriority:Embedcyberresilienceintheorganization’sDNAorfoundationalstructure,fromthe
leadershiptotheshopfloor.
2.Drivecyberresiliencebydesign:Integratecybersecurityintopeople,processesand
assets.
3.Engageandmanagetheecosystem:Buildtrustedpartnerships,managethird-partyrisksandraisesecurityawarenessbyidentifyingthekeystakeholders.
Thesethreeprinciplesareinterlinkedandmutually
supportive–andareapplicableacrossany
manufacturingindustryandlocation.Eachprincipleisdefinedwithadditionalguidance,contextualizedwithkeyconsiderationsandcomplementedwith
real-worldmanufacturingusecasestofacilitateadoptionandeffectiveimplementation.
Theplaybooksuggestedinthispaperservesas
apragmaticframeworktoenablebusinessesto
navigatestrategic,organizational,operational,
technicalandregulatorychallenges–andwill
fosterarobustcultureofcyberresiliencethatcan
effectivelycounteractbothcurrentandfuturethreats.
BuildingaCultureofCyberResilienceinManufacturing3
1
Prioritizingcyberresiliencein
manufacturing
Manufacturingisamongthesectorsmost
targetedbycyberattacks,withdisruptions
havingsevereimpactontheglobaleconomy.
1.1
Whycyberresilienceisvitalformanufacturing
Manufacturingisaglobalanddiversesectorthatisessentialtosocietyandtheglobaleconomy.Itspansvariousindustriessuchasconsumergoods,electronics,automotives,energy,healthcare,foodandbeverage,heavyindustry,andoilandgas.
Overthepastdecade,digitaltransformationhasacceleratedwithinthesector,withcontinuous
investmentsininnovationandemerging
technologiessuchasdigitaltwins,robotics,
generativeartificialintelligence(GenAI),cloud
computingandtheindustrialinternetofthings
(IIoT).1Whilethisprogressivedigitalizationfostersgrowth,efficiencyandprofitability,italsoconnectsindustrialandoperationaltechnologies(OT)tothedigitalworld,exposingthesectortocyberthreats.
Heightenedconnectivityofthemanufacturing
digitalecosystemtovariousenterprisesystems,theinternet,cloudprovidersandserviceproviderspresentssignificantchallengesintheindustrialOTenvironments.Thistransitionfromtraditionalair-gappedsystemstohyperconnectedenvironments
augmentscybersecurityrisks.Furthermore,
discrepanciesininvestmentsbetweenlow-andhigh-revenueorganizationsexacerbatethese
challenges.2Theboostindataexchangewiththeentiresupplychain,includingsmallandmediumenterprises(SMEs)thataretypicallylow-tech,hasincreasedthisrisk.
Theupsurgeinconnectivityanddatatransparencyinthemanufacturingecosystemhasexpanded
thesector’sexposure,makingit,forthreeyearsinarow,thesectormosttargetedbycyberattacks,accountingfor25.7%,3withransomware
comprising71%oftheseattacks.4Giventhe
complexityofmodernsupplychains,disruptions
alongthemanufacturingprocesscanhavesystem-widecascadingeffects,beyondthecontrolofanysingleentity.
Theinherentcomplexitiesofmanufacturingand
supplychainsdemandaholisticapproachto
mitigatingcyberrisks.Embeddingacultureofcyberresilienceintheorganization’sDNAisessential.
BuildingaCultureofCyberResilienceinManufacturing4
FIGURE1Themanufacturingecosystem
Upstreamsupplier
Inboundtransport
s
r
e
I
i
l
p
p
d
n
su
irectsup
Manufacturer
t
c
e
r
i
D
ie
l
p
s
r
Outboundtransport
Downstreamconsumer
BuildingaCultureofCyberResilienceinManufacturing5
i
e
p
p
Tr3suliers
Third-partylogistics
Sole-sourcedtier3
2
r
p
Tiesupliers
s
i
T
s
p
er1uplier
Single-sourcedtier2
Contract
manufactures
Vendors
Serviceproviders
Outboundtransport
Downstreamconsumer
Source:AdaptedfromGartner.
BuildingaCultureofCyberResilienceinManufacturing6
FIGURE2
Increasingcyberthreatsinmanufacturingrequireanevolutionofcyberresilience
2020s
Internetofthings,smart
andautonomoussystems,artificialintelligence,bigdata
Future
Artificialintelligenceandbeyond…
1999
Theglobeisconnected
bytheinternet
2010s
Cloudcomputing
DigitalconnectivityDigitalautomationandartificialintelligence
2015s
Increaseincyberattacks
2000s
Mobileflexibility
2020s
Industry4.0
Growthofcyberattacks
Cyberresiliencetimeline
InformationsecurityAntivirusprotectionofdataandsystems
Cybersecurity
Abilitytoprotectordefendtheuseofcyberspacefrom
cyberattacks
Cyberresilienceinmanufacturing…
…istheabilitytoanticipate,protectagainst,withstandandrecoverfromanycyber-relatedeventimpacting
manufacturingoperations
>
Source:SiemensandWorldEconomicForum
1.2
Themaincyberrisksinmanufacturing
Cyberattackscannotonlydisruptbusinesses
andsupplychains,offsettingthegainsfrom
digitalization,butalsoresultinfinancial,productivity,reputationalandevenphysicaldamage.Infact,
nearly57%ofcyberattacksonOTin2022hadreal-worldphysicalconsequences,includingproductionandloadingdisruptions,firesdamagingequipmentandaccidentsputtingshop-floorworkersatrisk.5
Thetallyofcyberattackscontinuestosurgeyearafteryear,withextortion-basedattacksremainingaprominenttype.6In2023,ransomwarepaymentsreachedanunprecedented$1.1billion.7Overthecourseof2023alone,thenumberofransomwareattacksonindustrialinfrastructuredoubled,
posingasignificantthreattosupplychainandmanufacturingoperations.
Ransomwareremainsthetop-of-mindconcernfor
manufacturerswith40%oftheCyberResiliencein
Manufacturingsurveyrespondents8rankingitfirst.
Accordingtorecentresearch,ransomwareattacks
onindustrialorganizationsincreasedbynearly50%in2023,with71%ofattacksdirectedatmanufacturers.9
Manufacturingorganizationspresentanattractivetargetforransomwareattacks,giventheirlow
tolerancefordowntimeandtheirrelativelylow
levelofcybermaturitycomparedtoothersectors.Furthermore,theseindustriesfrequentlyunderinvestincyberresilience,primarilyduetothesubstantialcostsassociatedwithredesigningmanufacturing
linesandupgradingequipment.10
Amongthesignificantrisksfacingmanufacturing
organizations,socialengineeringandphishing,
rankedasthesecondmostprominentcyberthreatsoverall,wereidentifiedby34%ofsurvey
respondents.Followingclosely,supplychain
attackssecuredthethirdposition.Insiderthreatsanddenialofserviceattacksrankedlowerintheoverallhierarchyofcyberthreatsforthesurvey
respondentsoverall.
However,respondentsfromthehealthand
healthcaresectorrankedinsiderthreatastheir
secondmostconcerningcyberthreat,alongsideransomware,withsupplychainattackstakingthetopspot.Similarly,participantsfromthefoodandbeverageindustryalsohighlightedinsiderthreatsasatopconcern,followedbysocialengineeringandransomware.
Toreapthebenefitsofdigitalization,itiscrucialfor
themanufacturingsectortobepreparedagainstthegrowingthreatlandscapeandbecomecyberresilient.
BuildingaCultureofCyberResilienceinManufacturing7
FIGURE3Topfivecyberriskstomanufacturing
1
>
Ransomware
Atypeofattackwherethreatactorstakecontrolofatarget’sassets,encryptthemanddemandaransominexchangefor
thereturnoftheasset’savailability.Attackerscanbreachintellectualproperty(IP)information,accessvictims’dataandblockcriticalsystemsbelongingtomanufacturersortheircriticalthirdparties,disruptingday-to-daybusinessactivities.
2
>
Socialengineeringattack
Exploitspeoplebybenefitingfromhumanerrororbehaviourtoaccessinformationorservices.Itusesmanipulationtotrickvictimsintogivingawaysensitiveinformation.Commonmethodsincludephishing,spear-phishingandothertacticslike
baitingandscareware.
3
>
Supplychainattack
Focusesontheinteractionsandconnectionsbetweenorganizationsandtheirsuppliers.Attackersusetheservicesupplier’s
vulnerabilitiestoaccessordisruptthemanufacturingorganization.Attacktechniquesinclude:malwareinfection,socialengineering,brute-forceattack,exploitationofsoftwarevulnerabilityorconfigurationvulnerability,physicalattackandcounterfeiting.
4
Insiderthreatattack
Leveragesaninsiderpersonnel’sauthorizedaccessorunderstandingofanorganizationtoharmthatorganization.Thisharmcanincludemalicious,complacentorunintentionalactsthatnegativelyaffecttheintegrity,confidentialityandavailabilityoftheorganization,itsdata,personnelorfacilities.
Denialofservice(DoS)ordistributeddenialofservice(DDoS)
Accomplishedbyfloodingthetargetedhostornetworkwithtrafficuntilthetargetcannotrespondorsimplycrashes,preventsaccessforlegitimateusers.Thispreventslegitimateusersfromaccessinginformationsystems,devices,insiderpersonnelorothernetworkresources.
>
5
Source:CyberresilienceinManufacturingSurvey;ENISAThreatLandscape2023;11NIST12
BuildingaCultureofCyberResilienceinManufacturing8
1.3Theglobalimpactofcyberattacks
attackonalargesemiconductorindustrysupplierresultedinanestimatedcostof$250millioninthenextquarter.16Similarly,in2022,aprominentcarmanufacturerwasforcedtosuspendproductionat14plantsforaday,leadingtoanestimatedoutputlossof13,000cars,duetoacyberattackagainstacomponentssupplier.17
TheCyberResilienceinManufacturingsurvey
(pleaseseetheMethodology)identifiesbusiness
disruptionastheprimaryimpactofcyber
incidents,with60%ofrespondentshighlightingitssignificance.ThesefindingsalignwiththeGlobal
CybersecurityOutlook2024,where45%ofleadersexpressedoperationaldisruptionastheirgreatest
concernintheeventofacyberincident.Safety
concernsrankedsecond,with35%ofrespondents,followedbypotentialdamagetocustomerassets.Theseinsightsemphasizetheprofoundand
far-reachingimpactofcyberattackswithinthe
manufacturingsectorandtheurgentneedforrobustcybersecuritymeasurestosafeguarditsintegrity.
Withproductionfacilitiesspanningtheglobe,eachinterconnectedentityactsasbothaproducerandaconsumer,creatingacomplexnetworkvulnerabletocyberthreats.Consequently,acyberattackon
onecompanycantriggerrippleeffectsacrossthe
entireecosystem,leadingtocostlyconsequences.13
Theresultingrisksaresystemic,contagiousand
oftenbeyondtheunderstandingorcontrolofanysingleentity.AccordingtotheGlobalCybersecurityOutlook2024,54%oforganizationslackadequatevisibilityintothevulnerabilitiesoftheirsupplychain.Additionally,41%oforganizationsthatsufferedamaterialimpactfromacyberattackreportedthat
thebreachoriginatedfromathirdparty.14
Recentcyberincidentsfurtherhighlightthe
immensefinancialandoperationaltollofsuch
attacks.Forinstance,inFebruary2024,aGermanbatterymanufacturerexperiencedasignificant
cyberattack,resultinginproductionhaltsatfive
plantsforovertwoweeks.15In2023,aransomware
FIGURE4Theimpactofcyberattacksworldwide
Thecostofcybercrimehasincreased125%peryearonaverage,withtheimpactofasuccessfulcyberattackreaching$4.73millionperattackinindustrialsettings.Ifthisgrowthcontinues,theprojectedglobalimpact
135
124
120
105
104
$528
$527
$521
67
$410
couldreach$10.5trillionby2025
125%
Annualincreaseinglobalcostofcyberattacks
$4.73million
Averagecostofadata
breachwithprojectionsitcouldreach$10.5trillionby2025
$374
41
$156
$268
35
$122.5
12-15%
Ofcyberattacksrelate
tobusinesspartners
andsoftwaresupplychains
20152016201720182019202020212022202320242025
.Numberofsignificantcyberattacks
Averageglobalcostofsignificantcyberattacksperyear($million)
Source:McKinsey&CO,IBM2023CostofaDataBreachReport,WorldEconomicForumanalysis.
BuildingaCultureofCyberResilienceinManufacturing9
Towardsacyber
resilientmanufacturingsector:Uncoveringthechallenges
Organizationalchallengesrankasthetopdimensioninhibitingtheadoptionofacyberresilientculture.
Themanufacturingsectoroperateswithina
complexecosystemcharacterizedbydiverse
sites,extensivesupplychainsandinterconnectednetworks,whichrelyonnumeroussuppliers,
vendorsandpartners.Whilethesectorreapsthe
benefitsofdigitalizationandemergingtechnologies,italsograppleswithchallengesacrossfive
dimensions,eachpresentinguniquehurdlesonthepathtocyberresilience.
FIGURE5
Fivekeydimensionsofchallengesinmanufacturing
Organizational
Alignmentacrossorganizational
structure
Operational
Integrationwithoperational
workflows
Regulatory
Compliancewithglobalregulatoryrequirements
Technical
Capacityfor
technical
implementation
Strategic
Positioningamongbusinesspriorities
2.1
Divergentculturesandresources
Divergentorganizationalculturebetweenenterpriseandindustrialenvironmentspresentsthemost
significantobstacletocybersecurityefforts,
accordingtotheCyberResilienceinManufacturingsurvey(pleaserefertoMethodology).
–Distinctpriorities.ITandOTteamstraditionallyworkatdifferentendsofthetechnologystackanddataflow.Theytendtoapproach,prioritizeandgoverncybersecuritydifferently.Lackof
collaborationonaformalIT/OTconvergencestrategyhinderssecuredigitalizationof
industrialenvironments.
–Fragmentedcybersecuritygovernance.
Manyorganizationslackacomprehensive
cybersecuritygovernanceframework,leading
todecentralizeddecision-makingatthe
manufacturingsitelevelandhenceincreased
risk.Effectivecybersecuritygovernance
requiresawareness,trainingandincentives
acrossalloperationalsites,makingsurethey
allintegratecybersecurityintodailyhygiene
routines,similartoalreadyexistingpracticesforemployeesafety,productqualityandequipmentmaintenanceandintegration.
2
BuildingaCultureofCyberResilienceinManufacturing10
–Distributionofresponsibilities.Withthe
increasedpressureonbusinesstocutcost
andincreaseprofitability,manyorganizations
tendtohavepeoplewearingmultiplehatsand
performingvarioustasks,ignoringtheimportanceofsegregationofdutyandtheassociatedrisks.Forexample,databaseadministratorsmayserveassystemadministrators,enablingthemtohaveoverarchingrightstodeletelogsandcoverup
instancesoffraud.
–Talentshortage.Theglobalcybersecurity
talentshortage,reachingnearly4million,is
furtherexacerbatedinthemanufacturingsector,wheretheshortagesurpasses67%.18Findingandretainingtalentwithexpertiseinboth
cybersecurityandmanufacturingoperationscanbedifficult,makingthecyberresiliencejourneyharder.
2.2
Increasedconnectivityandlegacysystems
Technicalchallengeshavebeenrecognizedas
thesecondlargesthurdletocyberresilience.
Theconvergenceofoutdatedlegacysystems
withtheproliferationofconnectedassetswithinindustrialcontrolsystemshasengenderedan
environmentinadequatelypreparedtowithstandthesophisticatedtacticsandcapabilitieswieldedbycybercriminals.
–Legacysystems.LegacyOTandindustrial
controlsystemsintroducesignificant
vulnerabilitiesduetooutdateddesignsand
limitedaccessmanagement.Despitetheirage,thesesystemsremainintegraltomanufacturingoperations,functioningastheywereoriginallyintended.However,thechallengeliesintheir
inabilitytoadapttomoderncybersecurity
standardsandtotheevolvingthreatlandscape.Compoundingthisissueisthereluctanceto
replacethesesystemsduetothehighcosts
involved,aswellastheirinterconnectednature.Consequently,financialresourcesareoften
redirectedtomoreimmediateoperational
needs,leavinglegacysystemsvulnerable.Withnearly71%ofthesesystemslackingproper
supportandrobustaccessmanagement
procedures,therisksassociatedwithlegacyinfrastructureareescalatingrapidly,doublingyearbyyear.19
–Emergingtechnologiespresentadouble-edgedsword,bringingbothopportunities
andchallengestocybersecurity.Investments
incutting-edgetechnologiesintroduce
complexityandnewrisks,requiringaholisticandcomprehensiveupdateofcybersecuritystrategies.Forinstance,theproliferationof
highlyconnectedindustrialinternetofthings(IIoT)devicesandthewidespreadadoptionofartificialintelligence(AI)aimtoimproveservicedeliveryandproductivity.However,theyalsocreatenewpointsofentryandexpandthe
attacksurfaceformaliciousactors,requiringproactiveadjustmentsofcybereducation,riskassessmentandvalidationprotocols.
–Softwarereliance.Mostmanufacturing
processes,operationsandkeyapplicationsarebasedonsoftwareapplications.Infact,softwareplaysacrucialroleinoptimizing
processes,increasingefficiencyand
ensuringproductqualityforkeyareassuch
asprocurement,invoicingandsupplychain
automation.Theseprocessesarecrucialand
theirhyperconnectivityandinteroperability
complicatesthetaskformanufacturersandtheirsupplierstoensureagoodsecurityposture.20
Whilemanagingthelargesoftwareenvironmentanditsconnectivityiscumbersome,thefact
thatanaverageof77%-90%21ofanygiven
pieceofmodernsoftwareisopen-source
softwaremakesitevenhardertocontroland
attestforitssecurity.TherecentexampleoftheXZbackdoorhighlightsthisproblem,giventhatthebackdoorwasintroducedin2021andonlydiscoveredin2024.22
BuildingaCultureofCyberResilienceinManufacturing11
2.3
Operationalsensitivitytodowntimeand
extendedecosystemdependencies
Operationalchallengeshindermanufacturing
resilience,rankingthirdamongthechallengesinthesurvey,giventhedigitalizationandautomationofmanufacturingoperationsandtheiroften-
continuousthroughputrequirement.
–Downtimesensitivity.Limiteddowntime
tolerancemakesmanufacturingcompaniesprimetargetsforransomwareattacks,constraining
regularsystemupdatesandpatches.
–Ecosystemrisks.Asmanufacturing
facilitiesembraceinterconnecteddata-drivenprocesses,relianceoncloudservicesand
remotemaintenanceoperations,thescopeofriskextendsbeyondtraditionalsupply
chainstoencompassabroaderecosystem.Thisintricatenetworkofdependencies
challengescybersecuritystrategies,requiringacomprehensivemappingtoaddressbothdirectandindirectrisks.
–Paceofdigitalization:Rapiddigitalization
drivestheneedfornewexpertiseinboth
internal(e.g.industrialization)andexternal(e.g.roboticsandAI)domainstomanageevolvingriskprofileseffectively.
Strategicalignmentwithbusinesspriorities
2.4
Strategicchallengesarisefromthedynamic
tensionsbetweeneconomicfactors,marketforcesandgeopoliticaltensions.
–Integratingcybersecuritystrategyinto
businessprioritiesremainsapersistent
challengeformostorganizations,astheyoftenprioritizeshort-termbusinessobjectivesoverinvestinginlong-termresiliencemeasures.
–Continuouslyshiftingmarketdynamics
furthercomplicatestrategicdecision-makingandhindercybersecurityinvestmentsand
prioritization,asorganizationsgrapplewiththeneedtoadaptquicklytonewmarketdemandsorcompetitivethreats.
–Increasinggeopoliticaltensionsimpact
manufacturingorganizationsbothdigitallyandphysically.Decentralizedoperationsand
relianceonglobalITandOTsuppliersamplifythesechallenges,requiringrobustcyber
resiliencestrategies.
Widespreadandcomplexregulatorylandscape
2.5
Manufacturingorganizationsmustadhereto
variousregulationsandindustrystandardsrelatedtohumanandproductsafety,dataprotection
andcybersecurity.Thedecentralizedoperationalenvironmentandfragmentedanddiverse
local,regionalandindustry-specificregulatorylandscapesaddanotherlayerofcomplexitytocybersecurityefforts.
–Widespreadregulationsposeasignificantchallengeforthemanufacturingsector.For
example,intheEuropeanUnion,anew
legislativeproposal,theCyberResilienceAct,isbeingdiscussedtointroducemandatory
cybersecurityrequirementsforhardwareandsoftwareproductsthroughouttheirlifecycle.Additionally,legislationssuchastheupdatedNetworkandInformationSecurity(NIS2)andCriticalEntitiesResilience(CER)directives
classifycertainmanufacturingindustries
as“essentialentities,”mandatingthemto
managetheirsecurityrisksandpreventor
minimizetheimpactofincidentsonrecipientsoftheirservices.Duetothelargevarietyof
requirements,organizationshavetoadapttheiroperationsandproductstolocalandregionalrequirements.Atthesametime,thedifferent
incidentreportingrequirementsandtimelineschallengeorganizationsontheirresponse
mechanismsandreactiontime.
–Legislativedevelopments:IntheUnited
States(US),federalregulationstargetspecificsectorslikewater,transportationandpipelinesandanationalcybersecuritystrategywas
releasedinMarch2023.TheUSCybersecurity&InfrastructureSecurityAgency’sCross-
SectorCybersecurityPerformanceGoals
BuildingaCultureofCyberResilienceinManufacturing12
outlinecybersecuritypracticesthatallcriticalinfrastructureentities,largeorsmall,shouldvoluntarilyimplementtoreducerisksto
bothcriticalinfrastructureoperationsand
UScitizens.23Thecountry’sSecuritiesand
ExchangeCommissionhassetanewprecedentbycha
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年度年福建省高校教师资格证之高等教育心理学综合练习试卷B卷附答案
- 2024年度山西省高校教师资格证之高等教育法规押题练习试题B卷含答案
- 重庆市西南大学附中2024-2025学年高一上定时检测(一)语文试题含答案
- 2024年度xx村监测对象风险消除民主评议会议记录
- 湖南省长沙市长郡郡维中学2022-2023学年九年级上学期入学英语试卷(含答案)
- 2024年长沙市事业单位招聘计算机岗位专业知识试题
- 2024年培训学校业务外包协议
- 2024年工程咨询服务具体协议样式
- 2024医疗销售企业合作协议样本
- 2024房屋建筑施工劳务协议详例
- 养老机构(养老院)全套服务管理实用手册
- 企业文化管理第八章企业文化的比较与借鉴
- WST311-2023《医院隔离技术标准》
- 《缕书香伴我同行》课件
- 建设项目竣工环境保护验收管理办法
- 100道解方程 计算题
- 赛事承办服务投标方案(技术方案)
- 概率论(华南农业大学)智慧树知到课后章节答案2023年下华南农业大学
- 上海中考英语专项练习-动词的时态-练习卷一和参考答案
- GB 4806.7-2023食品安全国家标准食品接触用塑料材料及制品
- 我们的出行方式 (教学设计)2022-2023学年综合实践活动四年级上册 全国通用
评论
0/150
提交评论