版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
BuildingaCultureofCyberResilienceinManufacturing
WHITEPAPER
MAY2024
Images:Midjourney,GettyImages
Contents
Executivesummary3
1Prioritizingcyberresilienceinmanufacturing4
1.1Whycyberresilienceisvitalformanufacturing4
1.2Themaincyberrisksinmanufacturing7
1.3Theglobalimpactofcyberattacks9
2Towardsacyberresilientmanufacturingsector:10
Uncoveringthechallenges
2.1Divergentculturesandresources10
2.2Increasedconnectivityandlegacysystems11
2.3Operationalsensitivitytodowntimeandextended12
ecosystemdependencies
2.4Strategicalignmentwithbusinesspriorities12
2.5Widespreadandcomplexregulatorylandscape12
3Guidingprinciples15
3.1Makecyberresilienceabusinessimperative16
3.2Drivecyberresiliencebydesign22
3.3Engageandmanagetheecosystem28
Conclusion34
Contributors35
Methodology37
Endnotes38
Disclaimer
Thisdocumentispublishedbythe
WorldEconomicForumasacontributiontoaproject,insightareaorinteraction.
Thefindings,interpretationsand
conclusionsexpressedhereinarearesultofacollaborativeprocessfacilitatedand
endorsedbytheWorldEconomicForumbutwhoseresultsdonotnecessarily
representtheviewsoftheWorldEconomicForum,northeentiretyofitsMembers,
Partnersorotherstakeholders.
©2024WorldEconomicForum.Allrightsreserved.Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,includingphotocopyingandrecording,orbyanyinformation
storageandretrievalsystem.
BuildingaCultureofCyberResilienceinManufacturing2
May2024
BuildingaCultureofCyberResilienceinManufacturing
Executivesummary
Themanufacturingsectoroperateswithina
complexecosystem,characterizedbyavariety
ofsites,extensivesupplychainsandinterlinkednetworks.Thisecosystemreliesonamultitudeofsuppliers,vendorsandpartners.
Overthepastdecade,manufacturinghasbeen
experiencingaswiftdigitaltransformation,which
isfuellinggrowth,efficiencyandprofitability.This
trendhasalsoexposedthesectortoawiderangeofcyberthreats,makingitthemosttargetedby
cyberattacks–overthepastthreeyears,the
manufacturingsectorhasaccountedforoneinfourofallcyberincidents.
Atthe2023AnnualMeetingoftheWorldEconomicForuminDavos,businessleadershighlighted
theneedtoaddresscybersecurityrisksfor
manufacturingattheecosystemlevel,thuskick-
startingtheCyberResilienceinManufacturing
initiative.LedbytheCentreforCybersecurity
andtheCentreforAdvancedManufacturingand
SupplyChainsattheForum,thisinitiativehas
broughttogethermorethan30representativesfromacrossthemanufacturingecosystem.Theaimistodevelopactionableguidanceonhowtodevelopacultureofcyberresilience.
Throughextensiveresearchandconsultations
withindustryleadersaswellasstandard-setting
andregulatorybodies,theCyberResiliencein
Manufacturinginitiativehaspreviouslyunderscoredthefiveprimarychallengesfordevelopingacultureofcyberresilienceinthemanufacturingecosystem.
Inresponsetothese,theinitiativehasalsoformulatedthreeguidingprinciplestosupportmanufacturing
andsupplychainleadersinestablishingapervasivestrategyfordevelopingacyberresilienceculture
throughouttheirorganizations:
1.Makecyberresilienceabusinesspriority:Embedcyberresilienceintheorganization’sDNAorfoundationalstructure,fromthe
leadershiptotheshopfloor.
2.Drivecyberresiliencebydesign:Integratecybersecurityintopeople,processesand
assets.
3.Engageandmanagetheecosystem:Buildtrustedpartnerships,managethird-partyrisksandraisesecurityawarenessbyidentifyingthekeystakeholders.
Thesethreeprinciplesareinterlinkedandmutually
supportive–andareapplicableacrossany
manufacturingindustryandlocation.Eachprincipleisdefinedwithadditionalguidance,contextualizedwithkeyconsiderationsandcomplementedwith
real-worldmanufacturingusecasestofacilitateadoptionandeffectiveimplementation.
Theplaybooksuggestedinthispaperservesas
apragmaticframeworktoenablebusinessesto
navigatestrategic,organizational,operational,
technicalandregulatorychallenges–andwill
fosterarobustcultureofcyberresiliencethatcan
effectivelycounteractbothcurrentandfuturethreats.
BuildingaCultureofCyberResilienceinManufacturing3
1
Prioritizingcyberresiliencein
manufacturing
Manufacturingisamongthesectorsmost
targetedbycyberattacks,withdisruptions
havingsevereimpactontheglobaleconomy.
1.1
Whycyberresilienceisvitalformanufacturing
Manufacturingisaglobalanddiversesectorthatisessentialtosocietyandtheglobaleconomy.Itspansvariousindustriessuchasconsumergoods,electronics,automotives,energy,healthcare,foodandbeverage,heavyindustry,andoilandgas.
Overthepastdecade,digitaltransformationhasacceleratedwithinthesector,withcontinuous
investmentsininnovationandemerging
technologiessuchasdigitaltwins,robotics,
generativeartificialintelligence(GenAI),cloud
computingandtheindustrialinternetofthings
(IIoT).1Whilethisprogressivedigitalizationfostersgrowth,efficiencyandprofitability,italsoconnectsindustrialandoperationaltechnologies(OT)tothedigitalworld,exposingthesectortocyberthreats.
Heightenedconnectivityofthemanufacturing
digitalecosystemtovariousenterprisesystems,theinternet,cloudprovidersandserviceproviderspresentssignificantchallengesintheindustrialOTenvironments.Thistransitionfromtraditionalair-gappedsystemstohyperconnectedenvironments
augmentscybersecurityrisks.Furthermore,
discrepanciesininvestmentsbetweenlow-andhigh-revenueorganizationsexacerbatethese
challenges.2Theboostindataexchangewiththeentiresupplychain,includingsmallandmediumenterprises(SMEs)thataretypicallylow-tech,hasincreasedthisrisk.
Theupsurgeinconnectivityanddatatransparencyinthemanufacturingecosystemhasexpanded
thesector’sexposure,makingit,forthreeyearsinarow,thesectormosttargetedbycyberattacks,accountingfor25.7%,3withransomware
comprising71%oftheseattacks.4Giventhe
complexityofmodernsupplychains,disruptions
alongthemanufacturingprocesscanhavesystem-widecascadingeffects,beyondthecontrolofanysingleentity.
Theinherentcomplexitiesofmanufacturingand
supplychainsdemandaholisticapproachto
mitigatingcyberrisks.Embeddingacultureofcyberresilienceintheorganization’sDNAisessential.
BuildingaCultureofCyberResilienceinManufacturing4
FIGURE1Themanufacturingecosystem
Upstreamsupplier
Inboundtransport
s
r
e
I
i
l
p
p
d
n
su
irectsup
Manufacturer
t
c
e
r
i
D
ie
l
p
s
r
Outboundtransport
Downstreamconsumer
BuildingaCultureofCyberResilienceinManufacturing5
i
e
p
p
Tr3suliers
Third-partylogistics
Sole-sourcedtier3
2
r
p
Tiesupliers
s
i
T
s
p
er1uplier
Single-sourcedtier2
Contract
manufactures
Vendors
Serviceproviders
Outboundtransport
Downstreamconsumer
Source:AdaptedfromGartner.
BuildingaCultureofCyberResilienceinManufacturing6
FIGURE2
Increasingcyberthreatsinmanufacturingrequireanevolutionofcyberresilience
2020s
Internetofthings,smart
andautonomoussystems,artificialintelligence,bigdata
Future
Artificialintelligenceandbeyond…
1999
Theglobeisconnected
bytheinternet
2010s
Cloudcomputing
DigitalconnectivityDigitalautomationandartificialintelligence
2015s
Increaseincyberattacks
2000s
Mobileflexibility
2020s
Industry4.0
Growthofcyberattacks
Cyberresiliencetimeline
InformationsecurityAntivirusprotectionofdataandsystems
Cybersecurity
Abilitytoprotectordefendtheuseofcyberspacefrom
cyberattacks
Cyberresilienceinmanufacturing…
…istheabilitytoanticipate,protectagainst,withstandandrecoverfromanycyber-relatedeventimpacting
manufacturingoperations
>
Source:SiemensandWorldEconomicForum
1.2
Themaincyberrisksinmanufacturing
Cyberattackscannotonlydisruptbusinesses
andsupplychains,offsettingthegainsfrom
digitalization,butalsoresultinfinancial,productivity,reputationalandevenphysicaldamage.Infact,
nearly57%ofcyberattacksonOTin2022hadreal-worldphysicalconsequences,includingproductionandloadingdisruptions,firesdamagingequipmentandaccidentsputtingshop-floorworkersatrisk.5
Thetallyofcyberattackscontinuestosurgeyearafteryear,withextortion-basedattacksremainingaprominenttype.6In2023,ransomwarepaymentsreachedanunprecedented$1.1billion.7Overthecourseof2023alone,thenumberofransomwareattacksonindustrialinfrastructuredoubled,
posingasignificantthreattosupplychainandmanufacturingoperations.
Ransomwareremainsthetop-of-mindconcernfor
manufacturerswith40%oftheCyberResiliencein
Manufacturingsurveyrespondents8rankingitfirst.
Accordingtorecentresearch,ransomwareattacks
onindustrialorganizationsincreasedbynearly50%in2023,with71%ofattacksdirectedatmanufacturers.9
Manufacturingorganizationspresentanattractivetargetforransomwareattacks,giventheirlow
tolerancefordowntimeandtheirrelativelylow
levelofcybermaturitycomparedtoothersectors.Furthermore,theseindustriesfrequentlyunderinvestincyberresilience,primarilyduetothesubstantialcostsassociatedwithredesigningmanufacturing
linesandupgradingequipment.10
Amongthesignificantrisksfacingmanufacturing
organizations,socialengineeringandphishing,
rankedasthesecondmostprominentcyberthreatsoverall,wereidentifiedby34%ofsurvey
respondents.Followingclosely,supplychain
attackssecuredthethirdposition.Insiderthreatsanddenialofserviceattacksrankedlowerintheoverallhierarchyofcyberthreatsforthesurvey
respondentsoverall.
However,respondentsfromthehealthand
healthcaresectorrankedinsiderthreatastheir
secondmostconcerningcyberthreat,alongsideransomware,withsupplychainattackstakingthetopspot.Similarly,participantsfromthefoodandbeverageindustryalsohighlightedinsiderthreatsasatopconcern,followedbysocialengineeringandransomware.
Toreapthebenefitsofdigitalization,itiscrucialfor
themanufacturingsectortobepreparedagainstthegrowingthreatlandscapeandbecomecyberresilient.
BuildingaCultureofCyberResilienceinManufacturing7
FIGURE3Topfivecyberriskstomanufacturing
1
>
Ransomware
Atypeofattackwherethreatactorstakecontrolofatarget’sassets,encryptthemanddemandaransominexchangefor
thereturnoftheasset’savailability.Attackerscanbreachintellectualproperty(IP)information,accessvictims’dataandblockcriticalsystemsbelongingtomanufacturersortheircriticalthirdparties,disruptingday-to-daybusinessactivities.
2
>
Socialengineeringattack
Exploitspeoplebybenefitingfromhumanerrororbehaviourtoaccessinformationorservices.Itusesmanipulationtotrickvictimsintogivingawaysensitiveinformation.Commonmethodsincludephishing,spear-phishingandothertacticslike
baitingandscareware.
3
>
Supplychainattack
Focusesontheinteractionsandconnectionsbetweenorganizationsandtheirsuppliers.Attackersusetheservicesupplier’s
vulnerabilitiestoaccessordisruptthemanufacturingorganization.Attacktechniquesinclude:malwareinfection,socialengineering,brute-forceattack,exploitationofsoftwarevulnerabilityorconfigurationvulnerability,physicalattackandcounterfeiting.
4
Insiderthreatattack
Leveragesaninsiderpersonnel’sauthorizedaccessorunderstandingofanorganizationtoharmthatorganization.Thisharmcanincludemalicious,complacentorunintentionalactsthatnegativelyaffecttheintegrity,confidentialityandavailabilityoftheorganization,itsdata,personnelorfacilities.
Denialofservice(DoS)ordistributeddenialofservice(DDoS)
Accomplishedbyfloodingthetargetedhostornetworkwithtrafficuntilthetargetcannotrespondorsimplycrashes,preventsaccessforlegitimateusers.Thispreventslegitimateusersfromaccessinginformationsystems,devices,insiderpersonnelorothernetworkresources.
>
5
Source:CyberresilienceinManufacturingSurvey;ENISAThreatLandscape2023;11NIST12
BuildingaCultureofCyberResilienceinManufacturing8
1.3Theglobalimpactofcyberattacks
attackonalargesemiconductorindustrysupplierresultedinanestimatedcostof$250millioninthenextquarter.16Similarly,in2022,aprominentcarmanufacturerwasforcedtosuspendproductionat14plantsforaday,leadingtoanestimatedoutputlossof13,000cars,duetoacyberattackagainstacomponentssupplier.17
TheCyberResilienceinManufacturingsurvey
(pleaseseetheMethodology)identifiesbusiness
disruptionastheprimaryimpactofcyber
incidents,with60%ofrespondentshighlightingitssignificance.ThesefindingsalignwiththeGlobal
CybersecurityOutlook2024,where45%ofleadersexpressedoperationaldisruptionastheirgreatest
concernintheeventofacyberincident.Safety
concernsrankedsecond,with35%ofrespondents,followedbypotentialdamagetocustomerassets.Theseinsightsemphasizetheprofoundand
far-reachingimpactofcyberattackswithinthe
manufacturingsectorandtheurgentneedforrobustcybersecuritymeasurestosafeguarditsintegrity.
Withproductionfacilitiesspanningtheglobe,eachinterconnectedentityactsasbothaproducerandaconsumer,creatingacomplexnetworkvulnerabletocyberthreats.Consequently,acyberattackon
onecompanycantriggerrippleeffectsacrossthe
entireecosystem,leadingtocostlyconsequences.13
Theresultingrisksaresystemic,contagiousand
oftenbeyondtheunderstandingorcontrolofanysingleentity.AccordingtotheGlobalCybersecurityOutlook2024,54%oforganizationslackadequatevisibilityintothevulnerabilitiesoftheirsupplychain.Additionally,41%oforganizationsthatsufferedamaterialimpactfromacyberattackreportedthat
thebreachoriginatedfromathirdparty.14
Recentcyberincidentsfurtherhighlightthe
immensefinancialandoperationaltollofsuch
attacks.Forinstance,inFebruary2024,aGermanbatterymanufacturerexperiencedasignificant
cyberattack,resultinginproductionhaltsatfive
plantsforovertwoweeks.15In2023,aransomware
FIGURE4Theimpactofcyberattacksworldwide
Thecostofcybercrimehasincreased125%peryearonaverage,withtheimpactofasuccessfulcyberattackreaching$4.73millionperattackinindustrialsettings.Ifthisgrowthcontinues,theprojectedglobalimpact
135
124
120
105
104
$528
$527
$521
67
$410
couldreach$10.5trillionby2025
125%
Annualincreaseinglobalcostofcyberattacks
$4.73million
Averagecostofadata
breachwithprojectionsitcouldreach$10.5trillionby2025
$374
41
$156
$268
35
$122.5
12-15%
Ofcyberattacksrelate
tobusinesspartners
andsoftwaresupplychains
20152016201720182019202020212022202320242025
.Numberofsignificantcyberattacks
Averageglobalcostofsignificantcyberattacksperyear($million)
Source:McKinsey&CO,IBM2023CostofaDataBreachReport,WorldEconomicForumanalysis.
BuildingaCultureofCyberResilienceinManufacturing9
Towardsacyber
resilientmanufacturingsector:Uncoveringthechallenges
Organizationalchallengesrankasthetopdimensioninhibitingtheadoptionofacyberresilientculture.
Themanufacturingsectoroperateswithina
complexecosystemcharacterizedbydiverse
sites,extensivesupplychainsandinterconnectednetworks,whichrelyonnumeroussuppliers,
vendorsandpartners.Whilethesectorreapsthe
benefitsofdigitalizationandemergingtechnologies,italsograppleswithchallengesacrossfive
dimensions,eachpresentinguniquehurdlesonthepathtocyberresilience.
FIGURE5
Fivekeydimensionsofchallengesinmanufacturing
Organizational
Alignmentacrossorganizational
structure
Operational
Integrationwithoperational
workflows
Regulatory
Compliancewithglobalregulatoryrequirements
Technical
Capacityfor
technical
implementation
Strategic
Positioningamongbusinesspriorities
2.1
Divergentculturesandresources
Divergentorganizationalculturebetweenenterpriseandindustrialenvironmentspresentsthemost
significantobstacletocybersecurityefforts,
accordingtotheCyberResilienceinManufacturingsurvey(pleaserefertoMethodology).
–Distinctpriorities.ITandOTteamstraditionallyworkatdifferentendsofthetechnologystackanddataflow.Theytendtoapproach,prioritizeandgoverncybersecuritydifferently.Lackof
collaborationonaformalIT/OTconvergencestrategyhinderssecuredigitalizationof
industrialenvironments.
–Fragmentedcybersecuritygovernance.
Manyorganizationslackacomprehensive
cybersecuritygovernanceframework,leading
todecentralizeddecision-makingatthe
manufacturingsitelevelandhenceincreased
risk.Effectivecybersecuritygovernance
requiresawareness,trainingandincentives
acrossalloperationalsites,makingsurethey
allintegratecybersecurityintodailyhygiene
routines,similartoalreadyexistingpracticesforemployeesafety,productqualityandequipmentmaintenanceandintegration.
2
BuildingaCultureofCyberResilienceinManufacturing10
–Distributionofresponsibilities.Withthe
increasedpressureonbusinesstocutcost
andincreaseprofitability,manyorganizations
tendtohavepeoplewearingmultiplehatsand
performingvarioustasks,ignoringtheimportanceofsegregationofdutyandtheassociatedrisks.Forexample,databaseadministratorsmayserveassystemadministrators,enablingthemtohaveoverarchingrightstodeletelogsandcoverup
instancesoffraud.
–Talentshortage.Theglobalcybersecurity
talentshortage,reachingnearly4million,is
furtherexacerbatedinthemanufacturingsector,wheretheshortagesurpasses67%.18Findingandretainingtalentwithexpertiseinboth
cybersecurityandmanufacturingoperationscanbedifficult,makingthecyberresiliencejourneyharder.
2.2
Increasedconnectivityandlegacysystems
Technicalchallengeshavebeenrecognizedas
thesecondlargesthurdletocyberresilience.
Theconvergenceofoutdatedlegacysystems
withtheproliferationofconnectedassetswithinindustrialcontrolsystemshasengenderedan
environmentinadequatelypreparedtowithstandthesophisticatedtacticsandcapabilitieswieldedbycybercriminals.
–Legacysystems.LegacyOTandindustrial
controlsystemsintroducesignificant
vulnerabilitiesduetooutdateddesignsand
limitedaccessmanagement.Despitetheirage,thesesystemsremainintegraltomanufacturingoperations,functioningastheywereoriginallyintended.However,thechallengeliesintheir
inabilitytoadapttomoderncybersecurity
standardsandtotheevolvingthreatlandscape.Compoundingthisissueisthereluctanceto
replacethesesystemsduetothehighcosts
involved,aswellastheirinterconnectednature.Consequently,financialresourcesareoften
redirectedtomoreimmediateoperational
needs,leavinglegacysystemsvulnerable.Withnearly71%ofthesesystemslackingproper
supportandrobustaccessmanagement
procedures,therisksassociatedwithlegacyinfrastructureareescalatingrapidly,doublingyearbyyear.19
–Emergingtechnologiespresentadouble-edgedsword,bringingbothopportunities
andchallengestocybersecurity.Investments
incutting-edgetechnologiesintroduce
complexityandnewrisks,requiringaholisticandcomprehensiveupdateofcybersecuritystrategies.Forinstance,theproliferationof
highlyconnectedindustrialinternetofthings(IIoT)devicesandthewidespreadadoptionofartificialintelligence(AI)aimtoimproveservicedeliveryandproductivity.However,theyalsocreatenewpointsofentryandexpandthe
attacksurfaceformaliciousactors,requiringproactiveadjustmentsofcybereducation,riskassessmentandvalidationprotocols.
–Softwarereliance.Mostmanufacturing
processes,operationsandkeyapplicationsarebasedonsoftwareapplications.Infact,softwareplaysacrucialroleinoptimizing
processes,increasingefficiencyand
ensuringproductqualityforkeyareassuch
asprocurement,invoicingandsupplychain
automation.Theseprocessesarecrucialand
theirhyperconnectivityandinteroperability
complicatesthetaskformanufacturersandtheirsupplierstoensureagoodsecurityposture.20
Whilemanagingthelargesoftwareenvironmentanditsconnectivityiscumbersome,thefact
thatanaverageof77%-90%21ofanygiven
pieceofmodernsoftwareisopen-source
softwaremakesitevenhardertocontroland
attestforitssecurity.TherecentexampleoftheXZbackdoorhighlightsthisproblem,giventhatthebackdoorwasintroducedin2021andonlydiscoveredin2024.22
BuildingaCultureofCyberResilienceinManufacturing11
2.3
Operationalsensitivitytodowntimeand
extendedecosystemdependencies
Operationalchallengeshindermanufacturing
resilience,rankingthirdamongthechallengesinthesurvey,giventhedigitalizationandautomationofmanufacturingoperationsandtheiroften-
continuousthroughputrequirement.
–Downtimesensitivity.Limiteddowntime
tolerancemakesmanufacturingcompaniesprimetargetsforransomwareattacks,constraining
regularsystemupdatesandpatches.
–Ecosystemrisks.Asmanufacturing
facilitiesembraceinterconnecteddata-drivenprocesses,relianceoncloudservicesand
remotemaintenanceoperations,thescopeofriskextendsbeyondtraditionalsupply
chainstoencompassabroaderecosystem.Thisintricatenetworkofdependencies
challengescybersecuritystrategies,requiringacomprehensivemappingtoaddressbothdirectandindirectrisks.
–Paceofdigitalization:Rapiddigitalization
drivestheneedfornewexpertiseinboth
internal(e.g.industrialization)andexternal(e.g.roboticsandAI)domainstomanageevolvingriskprofileseffectively.
Strategicalignmentwithbusinesspriorities
2.4
Strategicchallengesarisefromthedynamic
tensionsbetweeneconomicfactors,marketforcesandgeopoliticaltensions.
–Integratingcybersecuritystrategyinto
businessprioritiesremainsapersistent
challengeformostorganizations,astheyoftenprioritizeshort-termbusinessobjectivesoverinvestinginlong-termresiliencemeasures.
–Continuouslyshiftingmarketdynamics
furthercomplicatestrategicdecision-makingandhindercybersecurityinvestmentsand
prioritization,asorganizationsgrapplewiththeneedtoadaptquicklytonewmarketdemandsorcompetitivethreats.
–Increasinggeopoliticaltensionsimpact
manufacturingorganizationsbothdigitallyandphysically.Decentralizedoperationsand
relianceonglobalITandOTsuppliersamplifythesechallenges,requiringrobustcyber
resiliencestrategies.
Widespreadandcomplexregulatorylandscape
2.5
Manufacturingorganizationsmustadhereto
variousregulationsandindustrystandardsrelatedtohumanandproductsafety,dataprotection
andcybersecurity.Thedecentralizedoperationalenvironmentandfragmentedanddiverse
local,regionalandindustry-specificregulatorylandscapesaddanotherlayerofcomplexitytocybersecurityefforts.
–Widespreadregulationsposeasignificantchallengeforthemanufacturingsector.For
example,intheEuropeanUnion,anew
legislativeproposal,theCyberResilienceAct,isbeingdiscussedtointroducemandatory
cybersecurityrequirementsforhardwareandsoftwareproductsthroughouttheirlifecycle.Additionally,legislationssuchastheupdatedNetworkandInformationSecurity(NIS2)andCriticalEntitiesResilience(CER)directives
classifycertainmanufacturingindustries
as“essentialentities,”mandatingthemto
managetheirsecurityrisksandpreventor
minimizetheimpactofincidentsonrecipientsoftheirservices.Duetothelargevarietyof
requirements,organizationshavetoadapttheiroperationsandproductstolocalandregionalrequirements.Atthesametime,thedifferent
incidentreportingrequirementsandtimelineschallengeorganizationsontheirresponse
mechanismsandreactiontime.
–Legislativedevelopments:IntheUnited
States(US),federalregulationstargetspecificsectorslikewater,transportationandpipelinesandanationalcybersecuritystrategywas
releasedinMarch2023.TheUSCybersecurity&InfrastructureSecurityAgency’sCross-
SectorCybersecurityPerformanceGoals
BuildingaCultureofCyberResilienceinManufacturing12
outlinecybersecuritypracticesthatallcriticalinfrastructureentities,largeorsmall,shouldvoluntarilyimplementtoreducerisksto
bothcriticalinfrastructureoperationsand
UScitizens.23Thecountry’sSecuritiesand
ExchangeCommissionhassetanewprecedentbycha
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 《2024年 北京地区土壤腐蚀性关键参量与Q235钢腐蚀速率预测模型研究》范文
- 《2024年 《剑桥英语语法》(第5章)英汉翻译实践报告》范文
- DB13-T 3008.2-2024 人力资源服务规范 第2部分:招聘服务
- 【北师大版】二年级下册心理健康教育-【北师大版】二年级下册心理健康教育-029.我的学习习惯
- 农产品质量安全追溯系统解决方案
- 农业行业遥感技术应用与智能农业生产管理方案
- 安全教育培训制度
- 医用生命支持设备分析与质控智慧树知到答案2024年山东药品食品职业学院
- 供热站接收供热系统改造施工(技术方案)
- Unit 1 be动词的一般现在时-2024-2025学年七年级英语上册
- 统编版(2024新版)七年级上册历史期末复习全册知识点考点提纲
- 【道法】做更好的自己 课件 2024-2025学年统编版道德与法治七年级上册
- 电气自动化工程师考试题库
- DL∕T 5545-2018 火力发电厂间接空冷系统设计规范
- 人教版2024年新版七年级上册英语Starter Units 1-3综合测试卷(含答案)
- 智能渔船自动化技术
- 抖音合伙人合作的协议书
- 装配式混凝土建筑预制叠合板、叠合梁识图
- 2024入团知识题库(含答案)
- 浙江义乌海德国际社区物业管理服务方案样本
- MH-T 5064-2023飞机地锚设计与维护技术指南
评论
0/150
提交评论