“There are two types of companies: those that have been hacked, and those who don't know they have been hacked.“ John T. Chambers, former CEO of Cisco Systems
IT security is a sensitive issue at a time when cyberattacks are regularly making headlines. In our opinion, protection is an ongoing process. It is not enough to stick to a system statically, but new ways and means have to be tried again and again in order to ensure greater IT security.
One idea to increase protection against IT encroachment is to selectively disconnect from the full dependence on digital complexity and connectivity by identifying key processes and functions and then redirecting the digital paths that attackers could use to reach, reduce or eliminate them. The CCE (consequence-driven, cyber-informed engineering) method, developed by the Idaho National Lab, is not a one-off risk assessment, but is designed to change the mindset and balance of strategic cyber risks for the company.