Digital Economy and Cyber World are growing rapidly and becoming more complex every day.
The upgrade to 4.0 business and the evolutive integration of and dependence on technology, along with increasing threat vectors and security vulnerabilities, are raising awareness among governments and citizens on the importance of cybersecurity. Considering these transformations stakeholders are called urgently to decide and define necessary measures to protect the new ecosystem architecture against any attack and exploitation.
In addition, indirect consequences of a cyber attack can lead to loss of production and disruption of sales, undermining consumer confidence. Such indirect economic costs can be just as significant as damage to equipment and infrastructure and have serious long-term consequences for jobs, innovation and economic growth.
Operating systems rely on the uninterrupted security system functioning, ensuring the continuity of its critical processes, the disruption of which can have serious consequences on organizations and individuals. Information System Security means otherwise reviewing social and economical ecosystem safety. Critical infrastructure organizations use a wide range of interrelated networks and systems, including information technology (IT) and industrial control systems (ICS), to support their operations and ensure that individuals acting inside the ecosystem have access to essential products and facilities. However, these systems are vulnerable to accidental disruption and intentional redirection, which can have devastating consequences.
This overview requires automatic implementation of pragmatic guidelines and concrete mitigation measures to increase awareness and undertake activities conducted to achieve a minimum level of cybersecurity. However, this analysis is not intended to be an exhaustive description of all aspects of cybersecurity and should be read in conjunction with other publications, such as industry guidelines, international standards and other institutional references, such as the European Union Agency for Cybersecurity (ENISA), the European Cyber Security Organization (ECSO), the CyberSec4Europe and also the Cybersecurity and Infrastructure Security Agency (CISA), which are publishing institutions and all of their draft sheets are eventually applicable in the scope of study. Organizations should also consider consulting with cybersecurity experts, who will meet their specific needs and situations.
This draft was advanced by ACG Cybersecurity R&D Laboratory working on Governmental & Public Platforms Security and Critical Data Infrastructures in order to recommend improvement of methods and programs challenging cyber threats and systems failure. ACG Cybersecurity drafts are published in a vision of knowledge sharing and interaction with experts around specific topics related to cyber security and Information System Security works. These drafts will be designed to respond to the need for a pragmatic lecture of security challenges in the coming years to eventually increase cybersecurity impact on the global performance of transforming organizations.
Establishing real resilience requires absolutely active mobilization of all ecosystem stakeholders. Relying on a vulgarized approach of security systems, involving a strategy in order to define a lean based system and secure it through an agile security management and toolkit. In France and in Europe, many organizations work at the crossroads of the public and private practices and security standards to strengthen the cyber systems that underpin e-Gov and public platforms. The above-mentioned organizations have set a multichannel communication with business analysts, social experts and ergonomists to create a favorable environment for partnerships with cyber security experts and operators who are familiar with critical infrastructure management.
Yet, these efforts need to be driven through two refined major channels which conduct essentially to ensure service continuity and the protection of users’ data. Public Safety Framework was supported by the implementation of the General Data Protection Regulation (GDPR) and the recognition of its relevance and applicability in the European context. But still too much work on the applicative level to make the regulations as evident on field as on paper.
In order to be effective, ACG Cybersecurity R&D Lab, has launched a Task Force team dedicated to studying the evolving nature of the cyber threat environment, reviewing procedures in critical infrastructure sectors, considering connected partners, and reporting eventual risks for e-Gov platforms. Public online datamining providers need to regularly review and analyze their cybersecurity readiness and measure the progress of their curative security in case of incident.
In relation to the board vision, ACG Cybersecurity R&D Lab outputs and methods would serve to describe new measurement instruments, both reactive and proactive in nature, that can be used to assess the progress of an organization’s resilience to cyber threats, both nationally and within individual organizations.
In fact, given that we are well aware of the importance of Information Asset which is today the organization’s most valuable asset, we are working, in ACG Cybersecurity R&D Lab, on cybersecurity, bearing in mind the protection of this valuable asset. Our researchers Task Force team is trying to simulate new and efficient methods to integrate DSI³ principles into key business and administrative processes provided by e-Gov platforms. Critical infrastructure sectors are interconnected and depend on secure cyber systems. Cyber disruption of critical infrastructure can have significant economic consequences, including causing heavy losses for businesses and negative spillover effects on local, national and global economy.
Cyber systems are now essential in almost all facilities provided by the government. As all industries have been revolutionized by computers and systems, governments have to take once more the lead of these transformations by enabling its growth channels and activating Public Private Partnership (PPP) mechanisms
29 Déc