Cyber Risk in Critical National Infrastructure: Whitepaper




We respect your privacy, by clicking "Download Your Copy" you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object . In addition, you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest subject to their privacy policy. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

In the realm of cyber security, threats are treated in isolation, analysed in separation from the actor behind the attack, or the cyber weapon that is utilised in the incident. This may have been because of a lack of resources and skills, or it may be because organisations do not see how the identity of the actor affects their tactical choices in deploying its defence, unless the attack was perpetrated internally.

[inlinead]

RECOMMENDED