




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
BuildingaCultureofCyberResilienceinManufacturing
WHITEPAPER
MAY2024
Images:Midjourney,GettyImages
Contents
Executivesummary3
1Prioritizingcyberresilienceinmanufacturing4
1.1Whycyberresilienceisvitalformanufacturing4
1.2Themaincyberrisksinmanufacturing7
1.3Theglobalimpactofcyberattacks9
2Towardsacyberresilientmanufacturingsector:10
Uncoveringthechallenges
2.1Divergentculturesandresources10
2.2Increasedconnectivityandlegacysystems11
2.3Operationalsensitivitytodowntimeandextended12
ecosystemdependencies
2.4Strategicalignmentwithbusinesspriorities12
2.5Widespreadandcomplexregulatorylandscape12
3Guidingprinciples15
3.1Makecyberresilienceabusinessimperative16
3.2Drivecyberresiliencebydesign22
3.3Engageandmanagetheecosystem28
Conclusion34
Contributors35
Methodology37
Endnotes38
Disclaimer
Thisdocumentispublishedbythe
WorldEconomicForumasacontributiontoaproject,insightareaorinteraction.
Thefindings,interpretationsand
conclusionsexpressedhereinarearesultofacollaborativeprocessfacilitatedand
endorsedbytheWorldEconomicForumbutwhoseresultsdonotnecessarily
representtheviewsoftheWorldEconomicForum,northeentiretyofitsMembers,
Partnersorotherstakeholders.
©2024WorldEconomicForum.Allrightsreserved.Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,includingphotocopyingandrecording,orbyanyinformation
storageandretrievalsystem.
BuildingaCultureofCyberResilienceinManufacturing2
May2024
BuildingaCultureofCyberResilienceinManufacturing
Executivesummary
Themanufacturingsectoroperateswithina
complexecosystem,characterizedbyavariety
ofsites,extensivesupplychainsandinterlinkednetworks.Thisecosystemreliesonamultitudeofsuppliers,vendorsandpartners.
Overthepastdecade,manufacturinghasbeen
experiencingaswiftdigitaltransformation,which
isfuellinggrowth,efficiencyandprofitability.This
trendhasalsoexposedthesectortoawiderangeofcyberthreats,makingitthemosttargetedby
cyberattacks–overthepastthreeyears,the
manufacturingsectorhasaccountedforoneinfourofallcyberincidents.
Atthe2023AnnualMeetingoftheWorldEconomicForuminDavos,businessleadershighlighted
theneedtoaddresscybersecurityrisksfor
manufacturingattheecosystemlevel,thuskick-
startingtheCyberResilienceinManufacturing
initiative.LedbytheCentreforCybersecurity
andtheCentreforAdvancedManufacturingand
SupplyChainsattheForum,thisinitiativehas
broughttogethermorethan30representativesfromacrossthemanufacturingecosystem.Theaimistodevelopactionableguidanceonhowtodevelopacultureofcyberresilience.
Throughextensiveresearchandconsultations
withindustryleadersaswellasstandard-setting
andregulatorybodies,theCyberResiliencein
Manufacturinginitiativehaspreviouslyunderscoredthefiveprimarychallengesfordevelopingacultureofcyberresilienceinthemanufacturingecosystem.
Inresponsetothese,theinitiativehasalsoformulatedthreeguidingprinciplestosupportmanufacturing
andsupplychainleadersinestablishingapervasivestrategyfordevelopingacyberresilienceculture
throughouttheirorganizations:
1.Makecyberresilienceabusinesspriority:Embedcyberresilienceintheorganization’sDNAorfoundationalstructure,fromthe
leadershiptotheshopfloor.
2.Drivecyberresiliencebydesign:Integratecybersecurityintopeople,processesand
assets.
3.Engageandmanagetheecosystem:Buildtrustedpartnerships,managethird-partyrisksandraisesecurityawarenessbyidentifyingthekeystakeholders.
Thesethreeprinciplesareinterlinkedandmutually
supportive–andareapplicableacrossany
manufacturingindustryandlocation.Eachprincipleisdefinedwithadditionalguidance,contextualizedwithkeyconsiderationsandcomplementedwith
real-worldmanufacturingusecasestofacilitateadoptionandeffectiveimplementation.
Theplaybooksuggestedinthispaperservesas
apragmaticframeworktoenablebusinessesto
navigatestrategic,organizational,operational,
technicalandregulatorychallenges–andwill
fosterarobustcultureofcyberresiliencethatcan
effectivelycounteractbothcurrentandfuturethreats.
BuildingaCultureofCyberResilienceinManufacturing3
1
Prioritizingcyberresiliencein
manufacturing
Manufacturingisamongthesectorsmost
targetedbycyberattacks,withdisruptions
havingsevereimpactontheglobaleconomy.
1.1
Whycyberresilienceisvitalformanufacturing
Manufacturingisaglobalanddiversesectorthatisessentialtosocietyandtheglobaleconomy.Itspansvariousindustriessuchasconsumergoods,electronics,automotives,energy,healthcare,foodandbeverage,heavyindustry,andoilandgas.
Overthepastdecade,digitaltransformationhasacceleratedwithinthesector,withcontinuous
investmentsininnovationandemerging
technologiessuchasdigitaltwins,robotics,
generativeartificialintelligence(GenAI),cloud
computingandtheindustrialinternetofthings
(IIoT).1Whilethisprogressivedigitalizationfostersgrowth,efficiencyandprofitability,italsoconnectsindustrialandoperationaltechnologies(OT)tothedigitalworld,exposingthesectortocyberthreats.
Heightenedconnectivityofthemanufacturing
digitalecosystemtovariousenterprisesystems,theinternet,cloudprovidersandserviceproviderspresentssignificantchallengesintheindustrialOTenvironments.Thistransitionfromtraditionalair-gappedsystemstohyperconnectedenvironments
augmentscybersecurityrisks.Furthermore,
discrepanciesininvestmentsbetweenlow-andhigh-revenueorganizationsexacerbatethese
challenges.2Theboostindataexchangewiththeentiresupplychain,includingsmallandmediumenterprises(SMEs)thataretypicallylow-tech,hasincreasedthisrisk.
Theupsurgeinconnectivityanddatatransparencyinthemanufacturingecosystemhasexpanded
thesector’sexposure,makingit,forthreeyearsinarow,thesectormosttargetedbycyberattacks,accountingfor25.7%,3withransomware
comprising71%oftheseattacks.4Giventhe
complexityofmodernsupplychains,disruptions
alongthemanufacturingprocesscanhavesystem-widecascadingeffects,beyondthecontrolofanysingleentity.
Theinherentcomplexitiesofmanufacturingand
supplychainsdemandaholisticapproachto
mitigatingcyberrisks.Embeddingacultureofcyberresilienceintheorganization’sDNAisessential.
BuildingaCultureofCyberResilienceinManufacturing4
FIGURE1Themanufacturingecosystem
Upstreamsupplier
Inboundtransport
s
r
e
I
i
l
p
p
d
n
su
irectsup
Manufacturer
t
c
e
r
i
D
ie
l
p
s
r
Outboundtransport
Downstreamconsumer
BuildingaCultureofCyberResilienceinManufacturing5
i
e
p
p
Tr3suliers
Third-partylogistics
Sole-sourcedtier3
2
r
p
Tiesupliers
s
i
T
s
p
er1uplier
Single-sourcedtier2
Contract
manufactures
Vendors
Serviceproviders
Outboundtransport
Downstreamconsumer
Source:AdaptedfromGartner.
BuildingaCultureofCyberResilienceinManufacturing6
FIGURE2
Increasingcyberthreatsinmanufacturingrequireanevolutionofcyberresilience
2020s
Internetofthings,smart
andautonomoussystems,artificialintelligence,bigdata
Future
Artificialintelligenceandbeyond…
1999
Theglobeisconnected
bytheinternet
2010s
Cloudcomputing
DigitalconnectivityDigitalautomationandartificialintelligence
2015s
Increaseincyberattacks
2000s
Mobileflexibility
2020s
Industry4.0
Growthofcyberattacks
Cyberresiliencetimeline
InformationsecurityAntivirusprotectionofdataandsystems
Cybersecurity
Abilitytoprotectordefendtheuseofcyberspacefrom
cyberattacks
Cyberresilienceinmanufacturing…
…istheabilitytoanticipate,protectagainst,withstandandrecoverfromanycyber-relatedeventimpacting
manufacturingoperations
>
Source:SiemensandWorldEconomicForum
1.2
Themaincyberrisksinmanufacturing
Cyberattackscannotonlydisruptbusinesses
andsupplychains,offsettingthegainsfrom
digitalization,butalsoresultinfinancial,productivity,reputationalandevenphysicaldamage.Infact,
nearly57%ofcyberattacksonOTin2022hadreal-worldphysicalconsequences,includingproductionandloadingdisruptions,firesdamagingequipmentandaccidentsputtingshop-floorworkersatrisk.5
Thetallyofcyberattackscontinuestosurgeyearafteryear,withextortion-basedattacksremainingaprominenttype.6In2023,ransomwarepaymentsreachedanunprecedented$1.1billion.7Overthecourseof2023alone,thenumberofransomwareattacksonindustrialinfrastructuredoubled,
posingasignificantthreattosupplychainandmanufacturingoperations.
Ransomwareremainsthetop-of-mindconcernfor
manufacturerswith40%oftheCyberResiliencein
Manufacturingsurveyrespondents8rankingitfirst.
Accordingtorecentresearch,ransomwareattacks
onindustrialorganizationsincreasedbynearly50%in2023,with71%ofattacksdirectedatmanufacturers.9
Manufacturingorganizationspresentanattractivetargetforransomwareattacks,giventheirlow
tolerancefordowntimeandtheirrelativelylow
levelofcybermaturitycomparedtoothersectors.Furthermore,theseindustriesfrequentlyunderinvestincyberresilience,primarilyduetothesubstantialcostsassociatedwithredesigningmanufacturing
linesandupgradingequipment.10
Amongthesignificantrisksfacingmanufacturing
organizations,socialengineeringandphishing,
rankedasthesecondmostprominentcyberthreatsoverall,wereidentifiedby34%ofsurvey
respondents.Followingclosely,supplychain
attackssecuredthethirdposition.Insiderthreatsanddenialofserviceattacksrankedlowerintheoverallhierarchyofcyberthreatsforthesurvey
respondentsoverall.
However,respondentsfromthehealthand
healthcaresectorrankedinsiderthreatastheir
secondmostconcerningcyberthreat,alongsideransomware,withsupplychainattackstakingthetopspot.Similarly,participantsfromthefoodandbeverageindustryalsohighlightedinsiderthreatsasatopconcern,followedbysocialengineeringandransomware.
Toreapthebenefitsofdigitalization,itiscrucialfor
themanufacturingsectortobepreparedagainstthegrowingthreatlandscapeandbecomecyberresilient.
BuildingaCultureofCyberResilienceinManufacturing7
FIGURE3Topfivecyberriskstomanufacturing
1
>
Ransomware
Atypeofattackwherethreatactorstakecontrolofatarget’sassets,encryptthemanddemandaransominexchangefor
thereturnoftheasset’savailability.Attackerscanbreachintellectualproperty(IP)information,accessvictims’dataandblockcriticalsystemsbelongingtomanufacturersortheircriticalthirdparties,disruptingday-to-daybusinessactivities.
2
>
Socialengineeringattack
Exploitspeoplebybenefitingfromhumanerrororbehaviourtoaccessinformationorservices.Itusesmanipulationtotrickvictimsintogivingawaysensitiveinformation.Commonmethodsincludephishing,spear-phishingandothertacticslike
baitingandscareware.
3
>
Supplychainattack
Focusesontheinteractionsandconnectionsbetweenorganizationsandtheirsuppliers.Attackersusetheservicesupplier’s
vulnerabilitiestoaccessordisruptthemanufacturingorganization.Attacktechniquesinclude:malwareinfection,socialengineering,brute-forceattack,exploitationofsoftwarevulnerabilityorconfigurationvulnerability,physicalattackandcounterfeiting.
4
Insiderthreatattack
Leveragesaninsiderpersonnel’sauthorizedaccessorunderstandingofanorganizationtoharmthatorganization.Thisharmcanincludemalicious,complacentorunintentionalactsthatnegativelyaffecttheintegrity,confidentialityandavailabilityoftheorganization,itsdata,personnelorfacilities.
Denialofservice(DoS)ordistributeddenialofservice(DDoS)
Accomplishedbyfloodingthetargetedhostornetworkwithtrafficuntilthetargetcannotrespondorsimplycrashes,preventsaccessforlegitimateusers.Thispreventslegitimateusersfromaccessinginformationsystems,devices,insiderpersonnelorothernetworkresources.
>
5
Source:CyberresilienceinManufacturingSurvey;ENISAThreatLandscape2023;11NIST12
BuildingaCultureofCyberResilienceinManufacturing8
1.3Theglobalimpactofcyberattacks
attackonalargesemiconductorindustrysupplierresultedinanestimatedcostof$250millioninthenextquarter.16Similarly,in2022,aprominentcarmanufacturerwasforcedtosuspendproductionat14plantsforaday,leadingtoanestimatedoutputlossof13,000cars,duetoacyberattackagainstacomponentssupplier.17
TheCyberResilienceinManufacturingsurvey
(pleaseseetheMethodology)identifiesbusiness
disruptionastheprimaryimpactofcyber
incidents,with60%ofrespondentshighlightingitssignificance.ThesefindingsalignwiththeGlobal
CybersecurityOutlook2024,where45%ofleadersexpressedoperationaldisruptionastheirgreatest
concernintheeventofacyberincident.Safety
concernsrankedsecond,with35%ofrespondents,followedbypotentialdamagetocustomerassets.Theseinsightsemphasizetheprofoundand
far-reachingimpactofcyberattackswithinthe
manufacturingsectorandtheurgentneedforrobustcybersecuritymeasurestosafeguarditsintegrity.
Withproductionfacilitiesspanningtheglobe,eachinterconnectedentityactsasbothaproducerandaconsumer,creatingacomplexnetworkvulnerabletocyberthreats.Consequently,acyberattackon
onecompanycantriggerrippleeffectsacrossthe
entireecosystem,leadingtocostlyconsequences.13
Theresultingrisksaresystemic,contagiousand
oftenbeyondtheunderstandingorcontrolofanysingleentity.AccordingtotheGlobalCybersecurityOutlook2024,54%oforganizationslackadequatevisibilityintothevulnerabilitiesoftheirsupplychain.Additionally,41%oforganizationsthatsufferedamaterialimpactfromacyberattackreportedthat
thebreachoriginatedfromathirdparty.14
Recentcyberincidentsfurtherhighlightthe
immensefinancialandoperationaltollofsuch
attacks.Forinstance,inFebruary2024,aGermanbatterymanufacturerexperiencedasignificant
cyberattack,resultinginproductionhaltsatfive
plantsforovertwoweeks.15In2023,aransomware
FIGURE4Theimpactofcyberattacksworldwide
Thecostofcybercrimehasincreased125%peryearonaverage,withtheimpactofasuccessfulcyberattackreaching$4.73millionperattackinindustrialsettings.Ifthisgrowthcontinues,theprojectedglobalimpact
135
124
120
105
104
$528
$527
$521
67
$410
couldreach$10.5trillionby2025
125%
Annualincreaseinglobalcostofcyberattacks
$4.73million
Averagecostofadata
breachwithprojectionsitcouldreach$10.5trillionby2025
$374
41
$156
$268
35
$122.5
12-15%
Ofcyberattacksrelate
tobusinesspartners
andsoftwaresupplychains
20152016201720182019202020212022202320242025
.Numberofsignificantcyberattacks
Averageglobalcostofsignificantcyberattacksperyear($million)
Source:McKinsey&CO,IBM2023CostofaDataBreachReport,WorldEconomicForumanalysis.
BuildingaCultureofCyberResilienceinManufacturing9
Towardsacyber
resilientmanufacturingsector:Uncoveringthechallenges
Organizationalchallengesrankasthetopdimensioninhibitingtheadoptionofacyberresilientculture.
Themanufacturingsectoroperateswithina
complexecosystemcharacterizedbydiverse
sites,extensivesupplychainsandinterconnectednetworks,whichrelyonnumeroussuppliers,
vendorsandpartners.Whilethesectorreapsthe
benefitsofdigitalizationandemergingtechnologies,italsograppleswithchallengesacrossfive
dimensions,eachpresentinguniquehurdlesonthepathtocyberresilience.
FIGURE5
Fivekeydimensionsofchallengesinmanufacturing
Organizational
Alignmentacrossorganizational
structure
Operational
Integrationwithoperational
workflows
Regulatory
Compliancewithglobalregulatoryrequirements
Technical
Capacityfor
technical
implementation
Strategic
Positioningamongbusinesspriorities
2.1
Divergentculturesandresources
Divergentorganizationalculturebetweenenterpriseandindustrialenvironmentspresentsthemost
significantobstacletocybersecurityefforts,
accordingtotheCyberResilienceinManufacturingsurvey(pleaserefertoMethodology).
–Distinctpriorities.ITandOTteamstraditionallyworkatdifferentendsofthetechnologystackanddataflow.Theytendtoapproach,prioritizeandgoverncybersecuritydifferently.Lackof
collaborationonaformalIT/OTconvergencestrategyhinderssecuredigitalizationof
industrialenvironments.
–Fragmentedcybersecuritygovernance.
Manyorganizationslackacomprehensive
cybersecuritygovernanceframework,leading
todecentralizeddecision-makingatthe
manufacturingsitelevelandhenceincreased
risk.Effectivecybersecuritygovernance
requiresawareness,trainingandincentives
acrossalloperationalsites,makingsurethey
allintegratecybersecurityintodailyhygiene
routines,similartoalreadyexistingpracticesforemployeesafety,productqualityandequipmentmaintenanceandintegration.
2
BuildingaCultureofCyberResilienceinManufacturing10
–Distributionofresponsibilities.Withthe
increasedpressureonbusinesstocutcost
andincreaseprofitability,manyorganizations
tendtohavepeoplewearingmultiplehatsand
performingvarioustasks,ignoringtheimportanceofsegregationofdutyandtheassociatedrisks.Forexample,databaseadministratorsmayserveassystemadministrators,enablingthemtohaveoverarchingrightstodeletelogsandcoverup
instancesoffraud.
–Talentshortage.Theglobalcybersecurity
talentshortage,reachingnearly4million,is
furtherexacerbatedinthemanufacturingsector,wheretheshortagesurpasses67%.18Findingandretainingtalentwithexpertiseinboth
cybersecurityandmanufacturingoperationscanbedifficult,makingthecyberresiliencejourneyharder.
2.2
Increasedconnectivityandlegacysystems
Technicalchallengeshavebeenrecognizedas
thesecondlargesthurdletocyberresilience.
Theconvergenceofoutdatedlegacysystems
withtheproliferationofconnectedassetswithinindustrialcontrolsystemshasengenderedan
environmentinadequatelypreparedtowithstandthesophisticatedtacticsandcapabilitieswieldedbycybercriminals.
–Legacysystems.LegacyOTandindustrial
controlsystemsintroducesignificant
vulnerabilitiesduetooutdateddesignsand
limitedaccessmanagement.Despitetheirage,thesesystemsremainintegraltomanufacturingoperations,functioningastheywereoriginallyintended.However,thechallengeliesintheir
inabilitytoadapttomoderncybersecurity
standardsandtotheevolvingthreatlandscape.Compoundingthisissueisthereluctanceto
replacethesesystemsduetothehighcosts
involved,aswellastheirinterconnectednature.Consequently,financialresourcesareoften
redirectedtomoreimmediateoperational
needs,leavinglegacysystemsvulnerable.Withnearly71%ofthesesystemslackingproper
supportandrobustaccessmanagement
procedures,therisksassociatedwithlegacyinfrastructureareescalatingrapidly,doublingyearbyyear.19
–Emergingtechnologiespresentadouble-edgedsword,bringingbothopportunities
andchallengestocybersecurity.Investments
incutting-edgetechnologiesintroduce
complexityandnewrisks,requiringaholisticandcomprehensiveupdateofcybersecuritystrategies.Forinstance,theproliferationof
highlyconnectedindustrialinternetofthings(IIoT)devicesandthewidespreadadoptionofartificialintelligence(AI)aimtoimproveservicedeliveryandproductivity.However,theyalsocreatenewpointsofentryandexpandthe
attacksurfaceformaliciousactors,requiringproactiveadjustmentsofcybereducation,riskassessmentandvalidationprotocols.
–Softwarereliance.Mostmanufacturing
processes,operationsandkeyapplicationsarebasedonsoftwareapplications.Infact,softwareplaysacrucialroleinoptimizing
processes,increasingefficiencyand
ensuringproductqualityforkeyareassuch
asprocurement,invoicingandsupplychain
automation.Theseprocessesarecrucialand
theirhyperconnectivityandinteroperability
complicatesthetaskformanufacturersandtheirsupplierstoensureagoodsecurityposture.20
Whilemanagingthelargesoftwareenvironmentanditsconnectivityiscumbersome,thefact
thatanaverageof77%-90%21ofanygiven
pieceofmodernsoftwareisopen-source
softwaremakesitevenhardertocontroland
attestforitssecurity.TherecentexampleoftheXZbackdoorhighlightsthisproblem,giventhatthebackdoorwasintroducedin2021andonlydiscoveredin2024.22
BuildingaCultureofCyberResilienceinManufacturing11
2.3
Operationalsensitivitytodowntimeand
extendedecosystemdependencies
Operationalchallengeshindermanufacturing
resilience,rankingthirdamongthechallengesinthesurvey,giventhedigitalizationandautomationofmanufacturingoperationsandtheiroften-
continuousthroughputrequirement.
–Downtimesensitivity.Limiteddowntime
tolerancemakesmanufacturingcompaniesprimetargetsforransomwareattacks,constraining
regularsystemupdatesandpatches.
–Ecosystemrisks.Asmanufacturing
facilitiesembraceinterconnecteddata-drivenprocesses,relianceoncloudservicesand
remotemaintenanceoperations,thescopeofriskextendsbeyondtraditionalsupply
chainstoencompassabroaderecosystem.Thisintricatenetworkofdependencies
challengescybersecuritystrategies,requiringacomprehensivemappingtoaddressbothdirectandindirectrisks.
–Paceofdigitalization:Rapiddigitalization
drivestheneedfornewexpertiseinboth
internal(e.g.industrialization)andexternal(e.g.roboticsandAI)domainstomanageevolvingriskprofileseffectively.
Strategicalignmentwithbusinesspriorities
2.4
Strategicchallengesarisefromthedynamic
tensionsbetweeneconomicfactors,marketforcesandgeopoliticaltensions.
–Integratingcybersecuritystrategyinto
businessprioritiesremainsapersistent
challengeformostorganizations,astheyoftenprioritizeshort-termbusinessobjectivesoverinvestinginlong-termresiliencemeasures.
–Continuouslyshiftingmarketdynamics
furthercomplicatestrategicdecision-makingandhindercybersecurityinvestmentsand
prioritization,asorganizationsgrapplewiththeneedtoadaptquicklytonewmarketdemandsorcompetitivethreats.
–Increasinggeopoliticaltensionsimpact
manufacturingorganizationsbothdigitallyandphysically.Decentralizedoperationsand
relianceonglobalITandOTsuppliersamplifythesechallenges,requiringrobustcyber
resiliencestrategies.
Widespreadandcomplexregulatorylandscape
2.5
Manufacturingorganizationsmustadhereto
variousregulationsandindustrystandardsrelatedtohumanandproductsafety,dataprotection
andcybersecurity.Thedecentralizedoperationalenvironmentandfragmentedanddiverse
local,regionalandindustry-specificregulatorylandscapesaddanotherlayerofcomplexitytocybersecurityefforts.
–Widespreadregulationsposeasignificantchallengeforthemanufacturingsector.For
example,intheEuropeanUnion,anew
legislativeproposal,theCyberResilienceAct,isbeingdiscussedtointroducemandatory
cybersecurityrequirementsforhardwareandsoftwareproductsthroughouttheirlifecycle.Additionally,legislationssuchastheupdatedNetworkandInformationSecurity(NIS2)andCriticalEntitiesResilience(CER)directives
classifycertainmanufacturingindustries
as“essentialentities,”mandatingthemto
managetheirsecurityrisksandpreventor
minimizetheimpactofincidentsonrecipientsoftheirservices.Duetothelargevarietyof
requirements,organizationshavetoadapttheiroperationsandproductstolocalandregionalrequirements.Atthesametime,thedifferent
incidentreportingrequirementsandtimelineschallengeorganizationsontheirresponse
mechanismsandreactiontime.
–Legislativedevelopments:IntheUnited
States(US),federalregulationstargetspecificsectorslikewater,transportationandpipelinesandanationalcybersecuritystrategywas
releasedinMarch2023.TheUSCybersecurity&InfrastructureSecurityAgency’sCross-
SectorCybersecurityPerformanceGoals
BuildingaCultureofCyberResilienceinManufacturing12
outlinecybersecuritypracticesthatallcriticalinfrastructureentities,largeorsmall,shouldvoluntarilyimplementtoreducerisksto
bothcriticalinfrastructureoperationsand
UScitizens.23Thecountry’sSecuritiesand
ExchangeCommissionhassetanewprecedentbycha
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 财务出纳担保责任协议(含保密协议)
- 城市排水设施拆迁补偿安置协议书
- 车辆事故道路修复赔偿协议书范例
- 草场承包租赁与农业产业化合作协议
- 财务担保资产担保合同范本
- 文化创意产业代理记账及知识产权财务保护合同
- 旧区改造拆迁安置房购置合同范本(含产权)
- Brand KPIs for hotels:Lemon Tree in India-英文培训课件2025.5
- 2025年电子商务与供应链管理职业考试试卷及答案
- 2025年各行业技能提升考试试卷及答案
- 2025年全钒液流电池行业调研分析报告
- 2025年二级建造师考试《矿业工程管理与实物》真题及答案
- 2025年Python数据分析试题及答案
- 植物保护通论重点复习题
- 儿童抽动障碍共患焦虑抑郁障碍诊治2025
- 2024年山东省初中学业水平考试语文试题(文字版-含答案)
- 2024-2025教科版一年级下册科学期末考试卷附参考答案 (三套)
- 高血压药的类型
- 家规家训课件
- 《深圳音乐厅解析》课件
- 2025届河南省鹤壁市淇县第一中学高三下学期联合考试英语试题含解析
评论
0/150
提交评论