Page 49: of Offshore Engineer Magazine (Sep/Oct 2013)

Read this page in Pdf, Flash or Html5 edition of Sep/Oct 2013 Offshore Engineer Magazine

One bright spot rests on devis- underestimating the threat can

HSEQ be fatal to a company’s future. ing an effective strategy and “Instead of addressing vulnerabilities, tactics to block cyber attacks.

Cyber risks can be drastically reduced if they combine com-

Keeping a close account of you have to know who your adversaries are.” hacking incidents is a start. puter networks and computer

Shawn Henry, President

Instead of seeing cyber secu- power.

CrowdStrike Services rity as central to a company’s welfare and growth, com- Richard T. Sale was United pany leadership too often sees Press International’s intelligence users carry out the steps with vigi- it as an IT problem best left to special- correspondent for 10 years, and at lance, cyber attacks can be success- ists, techies, and information offcers. the Middle East Times, a publication fully managed.

Persistent threats are not a “board of UPI. He is the author of Clinton’s

Cyber security is a business room” problem but on the margins Secret Wars (2009) and Traitors (2003).

decision about proft and risk, and of company operations. But as Lewis pointed such an attitude is dreadfully obsolete. A PricewaterhouseCoopers survey, entitled “Global State of

Information Security Survey 2013,”

SamSon takes the made clear while companies believed they were securing their networks, out of most were not. The old strategy

HEAVY centered on identifying a pattern of code and then blocking it. But if the heavylift malware has not been identifed, then blocking can’t occur. slings

Mitigation strategies

Meeting cyber threats requires much more corporate energy than is appar- ent today. The combination of weak defense and easy hacking is an extremely dangerous one to a compa- ny’s future. Perhaps the most promis- ing program is a joint effort between

Australia’s Defense Signals Directorate and the US National Security Agency (NSA) of Ft. Meade, Maryland, which

Greater Gabbard Project: The world’s largest wind farm. Seaway Heavy Lifting worked with private companies and ® installs turbine monopiles with Samson’s AmSteel-Blue lifting slings.

government agencies like the FBI to analyze cyber breaches on the basis of their frequency and effectiveness.

The study was based on measurable, repeatable data.

The result was a list of 35 mitiga- tion steps, with four of them viewed

LIGHt SaFE FaSt EFFICIEnt as especially successful. Since most

Talk to the experts at Samson and put their experience and extensive dangerous cyber attacks are carried out testing to work on your next heavylift project.

using steps that allow an attacker to infltrate a system and steal data, the

Visit SamsonRope.com for the full case study on the new approach allows companies to

Seaway Heavy Lifting/Greater Gabbard project.

attack those steps one at a time. Using four mitigation strategies was effec- tive in stopping 85% of the intrusions, according to the fve-year study.

Perhaps the most attractive aspect of this approach is that it saves companies money by not having to ® mitigate a cyber incident and recover

Dyneema is a registered trademark of Royal DSM N.V. Dyneema is DSM’s high-performance polyethylene product.

from the unplanned downtime. If oedigital.com September 2013 | OE 51 044_OE0913_HSEQ_4_AdvPerThreat.indd 51 8/18/13 12:16 PM

Offshore Engineer