Cyber Magazine May 2022 | Page 83

DIGITAL ECOSYSTEMS

“ With the volume of threats only rising , a standard approach to cyber security will no longer suffice ”

JAYNE GOBLE DIRECTOR , KPMG UK
In order to avoid that incident from happening , this four-step process for safeguarding critical infrastructure operations provides critical infrastructure owners and operators with a ' think like the adversary ' -style approach .
1 . Consequence Prioritisation : Select operations that cannot fail and attack scenarios that could bring them down with a clear focus on the risk management system .
2 . System-of-Systems Analysis : Rectifies the interdependencies and enabling or dependent components of critical processes and defensive systems by gathering data and making systematic observations .
3 . Consequence-Based Targeting : Defines the adversary ' s path to accomplish maximum impact effects , where they need to go to perform the attack , and what data is required to attain those aims .
4 . Mitigations and Protections : Disrupt or eliminate as many digital assault pathways as possible .
cybermagazine . com 83