SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Get Rolling Today:
+1.504.300.1347
sales@center-lift.com
Launching a 550 ton
dredge into a tailings pond
using our Patented Stability
Control System.
Specializing in moving marine assets using
PNEUMATIC ROLLERS
CENTER-LIFT.COMalternative to other heavy launch methodsalternative to other heavy launch methodsalternative to other heavy launch methodsalternative to other heavy launch methods
FLEXIBLE, EFFICIENT, SAFE & ECONOMICAL
and our patented Stability Control System
MANAGEMENT
Precious ore, precious data
A digital future exposes mining to new threats
DATA MANAGEMENT
N
o one knows exactly what
the mine of the future will
look like, but we can be
sure of one thing: it will be a target
for hackers.
Mining may not seem an obvious
place for cyber-security risks, but the
industry is transforming fast. Com-
modity prices have fallen 52% since
2011 and mining productivity is
down 3.5% per year over the past 10
years, according to a 2015 McKinsey
report. In response, the industry has
turned to digital and technological
innovation to help preserve cash
in the short term, and capture value
over the long term.
Mining operations are often in
remote locations, with variations in
geology, metallurgy and weather
extremes. New technology is help-
ing mitigate such variability by low-
ering risk and cost while increasing
safety and productivity.
“We believe this to be the future
of mining,” says Pedro Fuenzalida,
innovation manager at Antofagasta
Minerals. Analytics can “deliver
a step change in productivity”, he
says.
Digital tools already move equip-
ment fleets and driverless trains,
schedule maintenance and manage
the global supply chain. Drones and
scanning equipment create 3-D
maps of underground areas, and
78
A bank of
servers at a data
centre: mining
companies’
information
could be less
secure than
managers realise
“Mining
may not
seem an
obvious
place for
cyber-
security
risks, but
the industry
is trans-
forming
fast”
September 2016www. .com
MANAGEMENT
underestimate the longer-term con-
sequences on reputation.
In 2012, Saudi Aramco revealed a
cyber assault on its systems, to “stop
the flow of oil and gas to local and
international markets,” Abdallah al-
Saadan, Aramco’s senior vice-presi-
dent of finance, strategy and devel-
opment, said at the time. While it
didn’t succeed, damage was done.
In 2015, Canadian company
Detour Gold was hacked, putting
at risk credit-card numbers and
employees’ personal data. And in
2016, Canada’s Goldcorp had 14.8
gigabytes of sensitive data accessed
and posted on a public website by
‘hacktivists’, with a message railing
against “corporate racism, sexism
and greed”.
One of the most prolific
hacktivists, Anonymous, this year
relaunched a campaign under the
guise of #OpCanary focusing primar-
ily on the military and mining indus-
tries. It defaced BCGold Corp’s web-
page and two days later did the
same to Kenyan Petroleum Refiner-
ies. While databases were not
breached and data wasn’t stolen, the
incident was embarrassing and ulti-
mately has an impact on reputation.
TOTALLY TRANSPARENT?
Meanwhile, the industry has been
poor at disclosure and communica-
tion of how it assesses, manages and
mitigates cyber risk.
Of the top 20 global mining com-
panies, just 12 mention cybersecu-
rity as a risk in their 2015 annual
reports. Among them, disclosure
varies widely: from a minimal state-
ment saying the topic was discussed
by the Audit and Risk Committee,
to a vague outline of the potential
impact of attacks. Only one classi-
fied a potential breach as a “reputa-
tional risk”.
While there is little debate about
the value of the data produced and
held, there is a difference of opinion
about how transparent to be with
that data. As we move from the
information age to the digital age
and most recently to the transpar-
ency age, mining companies need to
address the issue of how transparent
they want to be with their data,
given it is often commercially and
politically sensitive.
The balance between secrecy and
transparency may be shifting in the
quest for a transparent world, and
good communication holds the key
robots are being developed to mine
hard-to-reach resources.
For example: Rio Tinto’s fleet of
autonomous trucks has driven the
equivalent of 98 times around the
earth to deliver loads 24 hours a day,
and BHP Billiton intends to develop
apps for mobile devices to improve
communications and productivity
across the company.
“The team working in Shanghai
will develop a range of mobile appli-
cations that could include the capa-
bility for operators to re-plan crew
work in the field, check equipment
maintenance requirements and loca-
tion, immediately report potential
safety problems or even check
where and when people are travel-
ling,” says Diane Jurgens, BHP’s
chief technology officer.
As mining companies increasingly
become digitised to lower costs, and
improve productivity, safety and flex-
ibility, the risk to cyber security is
heightened as the data is increased
and becomes more valuable to the
business.
“Our operations are increasingly
digitised,” says Richard Williams,
chief operating officer of Barrick
Gold Corp. “Data flows from one
point to another, which makes it
open to attack,” he adds.
The fallout from a cyber attack
can have negative short-term finan-
cial impact, but companies often
79
www.paus.de
MinCa
> For real tough conditions underground
> Payload 4t
> Extremely versatile
All you ever wanted
while moving in a mine.
Visit us:
Noth hall, booth 1568
“Our operations
are increasingly
digitised. Data
flows from one
point to another,
which makes it
open to attack”
“The industry
has been
poor at
disclosure
and
communi-
cation of
how it
assesses,
manages
and
mitigates
cyber risk”
80 MANAGEMENT
to foster stakeholder trust and
understanding of the company’s
approach to managing valuable data
and mitigating risk.
According to Kroll’s review of
2015 cyber-security breaches among
financial services, health care, retail
and education sector, 60% of the
reported cases were from human
error. While the review does not
include mining data, the statistics
are likely to be similar. Using effec-
tive internal communication to edu-
cate and empower employees to
protect the company’s valuable
information is as important as having
IT adding more padlocks. It is sur-
prising how many companies do
not consider communication in their
cyber-protection strategy.
Stakeholders want to know that
you are using data in a way to cre-
ate value and that you are doing
everything you can to ensure it
doesn’t fall into the wrong hands.
“Every company should have a
chief information security officer sit-
ting on the board and a written
information security plan ready,”
says Ingrid Hobbs, Insurance Group
partner at Mayer Brown.
The threat environment is becom-
ing increasingly complex as the list
of attackers include nation states,
criminal groups and activists, and
as increased public awareness puts
pressure on companies and boards.
As the mining industry depends
more on digital technology, stake-
holders will look for a balance
between transparency and secrecy,
creating value and protecting it. This
is not an IT issue; everyone in the
company must take responsibility.
“People see risk as a separate
subject managed by specialists,”
Williams adds. “But cyber risk being
managed by IT is the same as lead-
ership being managed by HR –
it feels like a function and is not
owned at the highest level of the
organisation.”
Booth 25331
LED Lights
For ConditionsFor ConditionsExtreme
Superior Vibration And Shock HandlingSuperior Vibration And Shock Handling
Teaming With
800.346.1956
WWW.JAMESONLLC.COM
Carole Cable is a partner in Brunswick’s London office and co-leads the Global Energy and Resources practice. A version of this article was
featured in the Brunswick Review Spotlight on Cybersecurity
‘Hacktivists’
could target
mining
companies
“Every
company
should have
a chief
information
security
officer
sitting on
the board
and a
written
information
security
plan ready”

Contenu connexe

Tendances

Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cAanchal579958
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographicGabe Schurman
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
DefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareDefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareCSNP
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Marcio Kanamaru
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015Marcos Ortiz Valmaseda
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
Top Secret - The Secure Internet Starts Here
Top Secret - The Secure Internet Starts HereTop Secret - The Secure Internet Starts Here
Top Secret - The Secure Internet Starts HereTom Millitzer
 
Mexico. The next frontier for collaborative and Software IT Services
Mexico. The next frontier for collaborative and Software IT ServicesMexico. The next frontier for collaborative and Software IT Services
Mexico. The next frontier for collaborative and Software IT ServicesiTexico
 

Tendances (20)

Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
DefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareDefendEdge - Negotiating Ransomware
DefendEdge - Negotiating Ransomware
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Top Secret - The Secure Internet Starts Here
Top Secret - The Secure Internet Starts HereTop Secret - The Secure Internet Starts Here
Top Secret - The Secure Internet Starts Here
 
Mexico. The next frontier for collaborative and Software IT Services
Mexico. The next frontier for collaborative and Software IT ServicesMexico. The next frontier for collaborative and Software IT Services
Mexico. The next frontier for collaborative and Software IT Services
 

En vedette

Guía para el diseño tipográfico. Regiones Ecuador
Guía para el diseño tipográfico. Regiones EcuadorGuía para el diseño tipográfico. Regiones Ecuador
Guía para el diseño tipográfico. Regiones EcuadorSantiago Pazmiño
 
COSHH Training
COSHH TrainingCOSHH Training
COSHH TrainingPiplu Das
 
DSD-INT 2015 - Planning support toolbox for resilient urban design
DSD-INT 2015 - Planning support toolbox for resilient urban designDSD-INT 2015 - Planning support toolbox for resilient urban design
DSD-INT 2015 - Planning support toolbox for resilient urban designDeltares
 
Gestión de proyectos “lean”. PMI - Arturo Penas Rial
Gestión de proyectos  “lean”. PMI - Arturo Penas RialGestión de proyectos  “lean”. PMI - Arturo Penas Rial
Gestión de proyectos “lean”. PMI - Arturo Penas RialArturo Penas Rial
 
Востребованное образование
Востребованное образованиеВостребованное образование
Востребованное образованиеMargarita Fatina
 
Collection of Soft Contact Lenses
Collection of Soft Contact LensesCollection of Soft Contact Lenses
Collection of Soft Contact Lensesmysterylenses
 
Coding for the cloud - development of modern web applications
Coding for the cloud - development of modern web applicationsCoding for the cloud - development of modern web applications
Coding for the cloud - development of modern web applicationsWekoslav Stefanovski
 
Redes Locales IES El Piles
Redes Locales IES El PilesRedes Locales IES El Piles
Redes Locales IES El Pilesemi900
 
Animales domesticos y de granaja
Animales domesticos y de granajaAnimales domesticos y de granaja
Animales domesticos y de granajaManuelatorresp
 
Allopass presentation @ Feweb seminar
Allopass presentation @ Feweb seminarAllopass presentation @ Feweb seminar
Allopass presentation @ Feweb seminarFeWeb FR
 

En vedette (16)

Vanessa trejo
Vanessa trejoVanessa trejo
Vanessa trejo
 
Guía para el diseño tipográfico. Regiones Ecuador
Guía para el diseño tipográfico. Regiones EcuadorGuía para el diseño tipográfico. Regiones Ecuador
Guía para el diseño tipográfico. Regiones Ecuador
 
Mate
MateMate
Mate
 
COSHH Training
COSHH TrainingCOSHH Training
COSHH Training
 
Design Deck
Design DeckDesign Deck
Design Deck
 
DSD-INT 2015 - Planning support toolbox for resilient urban design
DSD-INT 2015 - Planning support toolbox for resilient urban designDSD-INT 2015 - Planning support toolbox for resilient urban design
DSD-INT 2015 - Planning support toolbox for resilient urban design
 
Gestión de proyectos “lean”. PMI - Arturo Penas Rial
Gestión de proyectos  “lean”. PMI - Arturo Penas RialGestión de proyectos  “lean”. PMI - Arturo Penas Rial
Gestión de proyectos “lean”. PMI - Arturo Penas Rial
 
Востребованное образование
Востребованное образованиеВостребованное образование
Востребованное образование
 
Collection of Soft Contact Lenses
Collection of Soft Contact LensesCollection of Soft Contact Lenses
Collection of Soft Contact Lenses
 
Infecciones de transmisión sexual
Infecciones de transmisión sexualInfecciones de transmisión sexual
Infecciones de transmisión sexual
 
Coding for the cloud - development of modern web applications
Coding for the cloud - development of modern web applicationsCoding for the cloud - development of modern web applications
Coding for the cloud - development of modern web applications
 
Redes Locales IES El Piles
Redes Locales IES El PilesRedes Locales IES El Piles
Redes Locales IES El Piles
 
Animales domesticos y de granaja
Animales domesticos y de granajaAnimales domesticos y de granaja
Animales domesticos y de granaja
 
Allopass presentation @ Feweb seminar
Allopass presentation @ Feweb seminarAllopass presentation @ Feweb seminar
Allopass presentation @ Feweb seminar
 
Nudistas
NudistasNudistas
Nudistas
 
5zehn - media.innovations
5zehn - media.innovations5zehn - media.innovations
5zehn - media.innovations
 

Similaire à Precious ore, precious data

5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2Alessandro Gazzini
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Andrea Mennillo
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportRamona Kohrs
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 

Similaire à Precious ore, precious data (20)

Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloud
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloudCsa UK agm 2019 - Chris J Hodson - Visibility in the cloud
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloud
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 

Plus de Brunswick Group

Investor use of digital media 2018
Investor use of digital media  2018Investor use of digital media  2018
Investor use of digital media 2018Brunswick Group
 
The Rise of Prince Mohammed bin Salman
The Rise of Prince Mohammed bin SalmanThe Rise of Prince Mohammed bin Salman
The Rise of Prince Mohammed bin SalmanBrunswick Group
 
OECD's Base Erosion and Profit Shifting Project
OECD's Base Erosion and Profit Shifting ProjectOECD's Base Erosion and Profit Shifting Project
OECD's Base Erosion and Profit Shifting ProjectBrunswick Group
 
European climate on foreign investment
European climate on foreign investment European climate on foreign investment
European climate on foreign investment Brunswick Group
 
Brunswick ISMEA Quarterly Newsletter - May 2017
Brunswick ISMEA Quarterly Newsletter - May 2017 Brunswick ISMEA Quarterly Newsletter - May 2017
Brunswick ISMEA Quarterly Newsletter - May 2017 Brunswick Group
 
Brunswick Group - ISMEA Newsletter - May 2017
Brunswick Group - ISMEA Newsletter - May 2017Brunswick Group - ISMEA Newsletter - May 2017
Brunswick Group - ISMEA Newsletter - May 2017Brunswick Group
 
Brunswick Group is expanding in Germany
Brunswick Group is expanding in Germany Brunswick Group is expanding in Germany
Brunswick Group is expanding in Germany Brunswick Group
 
Brexit in perspective article 50 notification
Brexit in perspective   article 50 notificationBrexit in perspective   article 50 notification
Brexit in perspective article 50 notificationBrunswick Group
 
Hong Kong 2017 Chief Executive Election
Hong Kong 2017 Chief Executive ElectionHong Kong 2017 Chief Executive Election
Hong Kong 2017 Chief Executive ElectionBrunswick Group
 
China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017Brunswick Group
 
Stakeholder management in getting the deal done
Stakeholder management in getting the deal doneStakeholder management in getting the deal done
Stakeholder management in getting the deal doneBrunswick Group
 
India, Singapore, Middle East and Africa – quarterly review
India, Singapore, Middle East and Africa – quarterly reviewIndia, Singapore, Middle East and Africa – quarterly review
India, Singapore, Middle East and Africa – quarterly reviewBrunswick Group
 
How will President Trump impact the GCC?
How will President Trump impact the GCC?How will President Trump impact the GCC?
How will President Trump impact the GCC?Brunswick Group
 
France 2017 elections – The left wing primaries
France 2017 elections – The left wing primariesFrance 2017 elections – The left wing primaries
France 2017 elections – The left wing primariesBrunswick Group
 
Brunswick intelligence - Brexit in perspective
Brunswick intelligence - Brexit in perspectiveBrunswick intelligence - Brexit in perspective
Brunswick intelligence - Brexit in perspectiveBrunswick Group
 
The future of corporate reputation
The future of corporate reputationThe future of corporate reputation
The future of corporate reputationBrunswick Group
 
Perceptions of Chinese businesses going global
Perceptions of Chinese businesses going globalPerceptions of Chinese businesses going global
Perceptions of Chinese businesses going globalBrunswick Group
 
Infographic - Perceptions of Chinese businesses going global
Infographic - Perceptions of Chinese businesses going globalInfographic - Perceptions of Chinese businesses going global
Infographic - Perceptions of Chinese businesses going globalBrunswick Group
 

Plus de Brunswick Group (20)

Investor use of digital media 2018
Investor use of digital media  2018Investor use of digital media  2018
Investor use of digital media 2018
 
The Rise of Prince Mohammed bin Salman
The Rise of Prince Mohammed bin SalmanThe Rise of Prince Mohammed bin Salman
The Rise of Prince Mohammed bin Salman
 
OECD's Base Erosion and Profit Shifting Project
OECD's Base Erosion and Profit Shifting ProjectOECD's Base Erosion and Profit Shifting Project
OECD's Base Erosion and Profit Shifting Project
 
European climate on foreign investment
European climate on foreign investment European climate on foreign investment
European climate on foreign investment
 
Brunswick ISMEA Quarterly Newsletter - May 2017
Brunswick ISMEA Quarterly Newsletter - May 2017 Brunswick ISMEA Quarterly Newsletter - May 2017
Brunswick ISMEA Quarterly Newsletter - May 2017
 
Brunswick Group - ISMEA Newsletter - May 2017
Brunswick Group - ISMEA Newsletter - May 2017Brunswick Group - ISMEA Newsletter - May 2017
Brunswick Group - ISMEA Newsletter - May 2017
 
Brunswick Group is expanding in Germany
Brunswick Group is expanding in Germany Brunswick Group is expanding in Germany
Brunswick Group is expanding in Germany
 
The Mine of the Future
The Mine of the FutureThe Mine of the Future
The Mine of the Future
 
Brexit in perspective article 50 notification
Brexit in perspective   article 50 notificationBrexit in perspective   article 50 notification
Brexit in perspective article 50 notification
 
Hong Kong 2017 Chief Executive Election
Hong Kong 2017 Chief Executive ElectionHong Kong 2017 Chief Executive Election
Hong Kong 2017 Chief Executive Election
 
China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017
 
Getting the Deal Done
Getting the Deal DoneGetting the Deal Done
Getting the Deal Done
 
Stakeholder management in getting the deal done
Stakeholder management in getting the deal doneStakeholder management in getting the deal done
Stakeholder management in getting the deal done
 
India, Singapore, Middle East and Africa – quarterly review
India, Singapore, Middle East and Africa – quarterly reviewIndia, Singapore, Middle East and Africa – quarterly review
India, Singapore, Middle East and Africa – quarterly review
 
How will President Trump impact the GCC?
How will President Trump impact the GCC?How will President Trump impact the GCC?
How will President Trump impact the GCC?
 
France 2017 elections – The left wing primaries
France 2017 elections – The left wing primariesFrance 2017 elections – The left wing primaries
France 2017 elections – The left wing primaries
 
Brunswick intelligence - Brexit in perspective
Brunswick intelligence - Brexit in perspectiveBrunswick intelligence - Brexit in perspective
Brunswick intelligence - Brexit in perspective
 
The future of corporate reputation
The future of corporate reputationThe future of corporate reputation
The future of corporate reputation
 
Perceptions of Chinese businesses going global
Perceptions of Chinese businesses going globalPerceptions of Chinese businesses going global
Perceptions of Chinese businesses going global
 
Infographic - Perceptions of Chinese businesses going global
Infographic - Perceptions of Chinese businesses going globalInfographic - Perceptions of Chinese businesses going global
Infographic - Perceptions of Chinese businesses going global
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Precious ore, precious data

  • 1. Get Rolling Today: +1.504.300.1347 sales@center-lift.com Launching a 550 ton dredge into a tailings pond using our Patented Stability Control System. Specializing in moving marine assets using PNEUMATIC ROLLERS CENTER-LIFT.COMalternative to other heavy launch methodsalternative to other heavy launch methodsalternative to other heavy launch methodsalternative to other heavy launch methods FLEXIBLE, EFFICIENT, SAFE & ECONOMICAL and our patented Stability Control System MANAGEMENT Precious ore, precious data A digital future exposes mining to new threats DATA MANAGEMENT N o one knows exactly what the mine of the future will look like, but we can be sure of one thing: it will be a target for hackers. Mining may not seem an obvious place for cyber-security risks, but the industry is transforming fast. Com- modity prices have fallen 52% since 2011 and mining productivity is down 3.5% per year over the past 10 years, according to a 2015 McKinsey report. In response, the industry has turned to digital and technological innovation to help preserve cash in the short term, and capture value over the long term. Mining operations are often in remote locations, with variations in geology, metallurgy and weather extremes. New technology is help- ing mitigate such variability by low- ering risk and cost while increasing safety and productivity. “We believe this to be the future of mining,” says Pedro Fuenzalida, innovation manager at Antofagasta Minerals. Analytics can “deliver a step change in productivity”, he says. Digital tools already move equip- ment fleets and driverless trains, schedule maintenance and manage the global supply chain. Drones and scanning equipment create 3-D maps of underground areas, and 78 A bank of servers at a data centre: mining companies’ information could be less secure than managers realise “Mining may not seem an obvious place for cyber- security risks, but the industry is trans- forming fast”
  • 2. September 2016www. .com MANAGEMENT underestimate the longer-term con- sequences on reputation. In 2012, Saudi Aramco revealed a cyber assault on its systems, to “stop the flow of oil and gas to local and international markets,” Abdallah al- Saadan, Aramco’s senior vice-presi- dent of finance, strategy and devel- opment, said at the time. While it didn’t succeed, damage was done. In 2015, Canadian company Detour Gold was hacked, putting at risk credit-card numbers and employees’ personal data. And in 2016, Canada’s Goldcorp had 14.8 gigabytes of sensitive data accessed and posted on a public website by ‘hacktivists’, with a message railing against “corporate racism, sexism and greed”. One of the most prolific hacktivists, Anonymous, this year relaunched a campaign under the guise of #OpCanary focusing primar- ily on the military and mining indus- tries. It defaced BCGold Corp’s web- page and two days later did the same to Kenyan Petroleum Refiner- ies. While databases were not breached and data wasn’t stolen, the incident was embarrassing and ulti- mately has an impact on reputation. TOTALLY TRANSPARENT? Meanwhile, the industry has been poor at disclosure and communica- tion of how it assesses, manages and mitigates cyber risk. Of the top 20 global mining com- panies, just 12 mention cybersecu- rity as a risk in their 2015 annual reports. Among them, disclosure varies widely: from a minimal state- ment saying the topic was discussed by the Audit and Risk Committee, to a vague outline of the potential impact of attacks. Only one classi- fied a potential breach as a “reputa- tional risk”. While there is little debate about the value of the data produced and held, there is a difference of opinion about how transparent to be with that data. As we move from the information age to the digital age and most recently to the transpar- ency age, mining companies need to address the issue of how transparent they want to be with their data, given it is often commercially and politically sensitive. The balance between secrecy and transparency may be shifting in the quest for a transparent world, and good communication holds the key robots are being developed to mine hard-to-reach resources. For example: Rio Tinto’s fleet of autonomous trucks has driven the equivalent of 98 times around the earth to deliver loads 24 hours a day, and BHP Billiton intends to develop apps for mobile devices to improve communications and productivity across the company. “The team working in Shanghai will develop a range of mobile appli- cations that could include the capa- bility for operators to re-plan crew work in the field, check equipment maintenance requirements and loca- tion, immediately report potential safety problems or even check where and when people are travel- ling,” says Diane Jurgens, BHP’s chief technology officer. As mining companies increasingly become digitised to lower costs, and improve productivity, safety and flex- ibility, the risk to cyber security is heightened as the data is increased and becomes more valuable to the business. “Our operations are increasingly digitised,” says Richard Williams, chief operating officer of Barrick Gold Corp. “Data flows from one point to another, which makes it open to attack,” he adds. The fallout from a cyber attack can have negative short-term finan- cial impact, but companies often 79 www.paus.de MinCa > For real tough conditions underground > Payload 4t > Extremely versatile All you ever wanted while moving in a mine. Visit us: Noth hall, booth 1568 “Our operations are increasingly digitised. Data flows from one point to another, which makes it open to attack” “The industry has been poor at disclosure and communi- cation of how it assesses, manages and mitigates cyber risk”
  • 3. 80 MANAGEMENT to foster stakeholder trust and understanding of the company’s approach to managing valuable data and mitigating risk. According to Kroll’s review of 2015 cyber-security breaches among financial services, health care, retail and education sector, 60% of the reported cases were from human error. While the review does not include mining data, the statistics are likely to be similar. Using effec- tive internal communication to edu- cate and empower employees to protect the company’s valuable information is as important as having IT adding more padlocks. It is sur- prising how many companies do not consider communication in their cyber-protection strategy. Stakeholders want to know that you are using data in a way to cre- ate value and that you are doing everything you can to ensure it doesn’t fall into the wrong hands. “Every company should have a chief information security officer sit- ting on the board and a written information security plan ready,” says Ingrid Hobbs, Insurance Group partner at Mayer Brown. The threat environment is becom- ing increasingly complex as the list of attackers include nation states, criminal groups and activists, and as increased public awareness puts pressure on companies and boards. As the mining industry depends more on digital technology, stake- holders will look for a balance between transparency and secrecy, creating value and protecting it. This is not an IT issue; everyone in the company must take responsibility. “People see risk as a separate subject managed by specialists,” Williams adds. “But cyber risk being managed by IT is the same as lead- ership being managed by HR – it feels like a function and is not owned at the highest level of the organisation.” Booth 25331 LED Lights For ConditionsFor ConditionsExtreme Superior Vibration And Shock HandlingSuperior Vibration And Shock Handling Teaming With 800.346.1956 WWW.JAMESONLLC.COM Carole Cable is a partner in Brunswick’s London office and co-leads the Global Energy and Resources practice. A version of this article was featured in the Brunswick Review Spotlight on Cybersecurity ‘Hacktivists’ could target mining companies “Every company should have a chief information security officer sitting on the board and a written information security plan ready”