CINXE.COM

Cyber Biosecurity - At the convergence between cybersecurity and biosecurity

<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>Cyber Biosecurity - At the convergence between cybersecurity and biosecurity</title> <meta name="description" content="Explore the emerging field of cyber biosecurity, focusing on safeguarding data, systems, and infrastructures." > <meta name="keywords" content="Cyber biosecurity, biological data protection, biosecurity, cyber threats, biological systems security, bioinformatics, biotechnology security, cyber defense, biological infrastructure protection, cyberbiosecurity training, Cyber Risk GmbH"> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Index", "item": "https://www.cyberbiosecurity.ch" }, { "@type": "ListItem", "position": 2, "name": "Dual Use", "item": "https://www.cyberbiosecurity.ch/Dual_Use_Cyberbiosecurity.html" }, { "@type": "ListItem", "position": 3, "name": "Espionage", "item": "https://www.cyberbiosecurity.ch/Espionage_Cyberbiosecurity.html" }, { "@type": "ListItem", "position": 4, "name": "Training", "item": "https://www.cyberbiosecurity.ch/Cyberbiosecurity_Training.html" }, { "@type": "ListItem", "position": 5, "name": " Impressum", "item": "https://www.cyber-risk-gmbh.com/Impressum.html" } ] } </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Organization", "name": "Cyber Risk GmbH", "url": "https://www.cyber-risk-gmbh.com", "logo": "https://www.cyber-risk-gmbh.com/Cyber_Risk_GmbH_Logo.jpg", "sameAs": [ "https://www.linkedin.com/company/71474270/admin/page-posts/published/", "https://x.com/Cyber_Risk_GmbH" ], "contactPoint": { "@type": "ContactPoint", "telephone": "+41-79-5058960", "contactType": "Customer Service", "areaServed": "Worldwide", "availableLanguage": "English" }, "founder": { "@type": "Person", "name": "George Lekatis" }, "description": "Cyber Risk GmbH is a leading provider of cyber risk and compliance training in Switzerland and worldwide.", "address": { "@type": "PostalAddress", "streetAddress": "Dammstrasse 16", "addressLocality": "Horgen", "addressRegion": "Canton of Zürich", "postalCode": "8810", "addressCountry": "CH" } } </script> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> <meta name="google-site-verification" content="I0CDxLn5hun_Esd7Gf8jIPUBQ1eIIcVNsUQQ9d4Dq8Q"> <style> .wrapper-banner { background: url("Dual Use 21.JPG"); background-size: cover; background-position: center; } </style> <meta name="msvalidate.01" content="3992470AA0B488CE9CF07B1CD73A76D7"> <link rel="stylesheet" href="./style2.css"> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.disinformation.ch/"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.cyberbiosecurity.ch" target="_blank" >Index</a></li> <li><a href="https://www.cyberbiosecurity.ch/Dual_Use_Cyberbiosecurity.html" target="_blank" >Dual Use</a></li> <li><a href="https://www.cyberbiosecurity.ch/Espionage_Cyberbiosecurity.html" target="_blank" >Espionage</a></li> <li><a href="https://www.cyberbiosecurity.ch/Cyberbiosecurity_Training.html" target="_blank" >Cyberbiosecurity Training</a></li> <li><a href="https://www.cyber-risk-gmbh.com" target="_blank">Cyber Risk GmbH</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a> </li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h1>What is Cyberbiosecurity?</h1> <br> <br> <p class="text-left"> According to Randall Murch, cyberbiosecurity involves the <b>understanding, protection, mitigation, investigation, and attribution </b>of unwanted surveillance, intrusions, and malicious and harmful activities which can occur within or at the interfaces of comingled life and medical sciences, that affect security, competitiveness, and resilience. </p> <p class="text-left"><b>Areas of concern </b>include the privacy of patient data, the security of public health databases, the integrity of diagnostic test data, the integrity of public biological databases, the security implications of automated laboratory systems, disease surveillance and outbreak management data, and the security of proprietary biological engineering advances.</p> <p class="text-left"> Biological information is measured, monitored, altered, and converted to digital information. Digital information can be used to manipulate biological systems. </p> <p class="text-left"><b>Cybersecurity </b>is always important when digital information is propagated and stored through networks of connected electronic devices. </p> <p class="text-left"><b>Biosecurity </b>refers to the threat to humans, living organisms and the environment, as the result of the exposures to biological agents, such as pathogens, that occur naturally or intentionally. </p> <p class="text-left">Securing the information flow in systems, and providing cyberbiosecurity training to persons having authorized access, is critical for public health, economic security, and national security for every country. </p> <p class="text-left">Pathogen detection, identification, and tracking is shifting to methods relying on whole genomes. We <b>increasingly rely on genome databases, </b>and these databases are increasingly becoming the targets for cyberattacks from state sponsored but independent groups and the organized crime. </p> <p class="text-left">The protection of the <b>privacy </b>of individuals, growers, and retailers is another major cyberbiosecurity challenge, as we need to collect pathogen genomic data from infected individuals or agricultural and food products during disease outbreaks to improve disease modeling and forecast. </p> <p class="text-left">The fact that genome databases are most utilized by the <b>research community </b>increases the risks, as the research community is not always following cybersecurity standards and best practices. The culture of trust and the willingness to share without considering information security rules is becoming a major vulnerability. </p> <p class="text-left"> The <b>access </b>to pathogen sequences can lead to malicious use. Many genomes of animal and plant pathogens are accessible to all users of pathogen genome databases. We even had recommendations that open access to pathogen genomes should be promoted (Committee on Genomics Databases for Bioterrorism Threat Agents, 2004). The reduced cost of synthetic DNA technology and the advancement in synthetic biology reversed this approach, but many databases are still not properly secured. </p> <p class="text-left"> Most security measures are designed to <b>protect from external </b>attacks. Insiders pose substantial threats, as they already have authorized access to critical systems. Insiders include employees of the organization, employees of trusted business partners, suppliers and service providers. </p> <p class="text-left"> The <b>threats posed by insiders </b>can be unintentional or intentional, both of which should be accounted for in cyberbiosecurity assessments and training programs. Unintentional incidents include phishing or social engineering attacks from outside parties. </p> <p class="text-left">They can be the results of <b>negligence or misjudgment, </b>and cyberbiosecurity training can dramatically reduce them. </p> <p class="text-left"><b>Intentional </b>incidents include insiders that commit fraud for financial gain, or seek to sabotage the organization. </p> <p class="text-left">It can be the result of <b>bribery or blackmail </b>from foreign governments, competing organizations, or the organized crime. Employees must be trained to recognize the modus operandi of such persons.</p> <hr> <p class="text-left"><b>From the UN Secretary-General's remarks to the Security Council. </b></p> <p class="text-left">We can understand better the <b>risks for our societies and the opportunities for many adversaries, </b>from the UN Secretary-General's remarks to the Security Council on the COVID-19 Pandemic (09 April 2020). <b>Antonio Guterres said:</b></p> <p class="text-left">"But the pandemic also poses a significant threat to the maintenance of international peace and security -- potentially leading to an increase in social unrest and violence that would greatly undermine our ability to fight the disease. </p> <p class="text-left">My concerns are many and widespread, but let me <b>identify eight risks </b>that are particularly pressing:</p> <p class="text-left"><b>First, </b>the COVID-19 pandemic threatens to further <b>erode trust </b>in public institutions, particularly if citizens perceive that their authorities mishandled the response or are not transparent on the scope of the crisis. </p> <p class="text-left"><b>Second, </b>the economic fallout of this crisis could create major stressors, particularly in fragile societies, less developed countries, and those in transition. Economic instability will have particularly devastating impacts for women, who make up the vast majority of those sectors worst affected. The large numbers of female-headed households in conflict-settings are especially vulnerable to economic shocks.</p> <p class="text-left"><b>Third, </b>the postponement of elections or referenda, or the decision to proceed with a vote – even with mitigation measures – can create political tensions and undermine legitimacy. Such decisions are best made following broad consultation aimed at consensus. This is not a time for political opportunism.</p> <p class="text-left"><b>Fourth, </b>in some conflict settings, the uncertainty created by the pandemic may create incentives for some actors to promote further division and turmoil. This could lead to an escalation of violence and possibly devastating miscalculations, which could further entrench ongoing wars and complicate efforts to fight the pandemic.</p> <p class="text-left"><b>Fifth, </b>the threat of terrorism remains alive. Terrorist groups may see a window of opportunity to strike while the attention of most governments is turned towards the pandemic. The situation in the Sahel, where people face the double scourge of the virus and escalating terrorism, is of particular concern.</p> <p class="text-left"><b>Sixth, </b>the weaknesses and lack of preparedness exposed by this pandemic provide <b>a window onto how a bioterrorist attack might unfold </b>– and may increase its risks. Non-state groups could gain access to virulent strains that could pose similar devastation to societies around the globe.</p> <p class="text-left"><b>Seventh, </b>the crisis has hindered international, regional and national conflict resolution efforts, exactly when they are needed most. </p> <p class="text-left">Many peace processes have stalled as the world responds to COVID-19. </p> <p class="text-left">Our good offices and mediation engagements have felt the impact. </p> <p class="text-left">Restrictions on movement may continue to affect the work of various confidence-based mechanisms, as well as our ability to engage in crisis diplomacy to de-escalate potential conflicts. </p> <p class="text-left"><b>Eighth, </b>the pandemic is triggering or exacerbating various human rights challenges. </p> <p class="text-left">We are seeing <b>stigma, hate speech, and white supremacists and other extremists seeking to exploit the situation. </b> We are witnessing discrimination in accessing health services. Refugees and internally displaced persons are particularly vulnerable. And there are growing manifestations of authoritarianism, including limits on the media, civic space and freedom of expression." </p> <p class="text-left"><b>Our note:</b> From the UN Secretary-General's remarks we can understand the risks for our societies, and the opportunities for many adversaries. Situations similar to the COVID-19 pandemic can be designed and implemented by threat actors, and the cooperation of the public and the private sector is necessary to continuously improve the response plans.</p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > <img src="Logos/INSI8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10