Tendencias en RI

Cyber crime costs 2017

Over the last two years, the accelerating cost of cyber crime means that it is now 23 percent more than last year and is costing organizations, on average, US$11.7 million. Whether managing incidents themselves or spending to recover from the disruption to the business and customers, organizations are investing on an unprecedented scale—but current spending priorities show that much of this is misdirected toward security capabilities that fail to deliver the greatest efficiency and effectiveness.

https://www.accenture.com/us-en/insight-cost-of-cybercrime-2017?utm_content=buffer3a48c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

https://www.accenture.com/t20171006T095146Z__w__/us-en/_acnmedia/PDF-62/Accenture-2017CostCybercrime-US-FINAL.pdf

Vodafone IoT Barometer 2017/18

The Barometer is an in-depth global study into how enterprises are using IoT technologies. IoT connects objects, turning them into “intelligent” assets that can communicate with people, applications and each other. It enables things like cars, buildings and machines to communicate about their status and environment. Other terms include machine-to-machine (M2M), Industrial Internet of Things and Industry 4.0. Often, instead of the technology, people talk about specific applications, such as: smart cities, connected vehicles, smart grid, smart meters, smart homes, connected health and so much more.

http://images.response.vodafone.com/Web/VodafoneGroupPLC/%7B53ad8b09-3179-4287-b5af-cdd45a83ea19%7D_Vodafone-2017_Barometer-0910.pdf

State of IoT Security

The rise of IoT is driving increasing concern about the threat of cyber attacks at home and work. This trend has sparked a security concern across the globe with companies and consumers as smart devices like baby monitors, smart speakers, smart watches or thermostats potentially provide a gateway into users’ home or workplace networks.

https://www6.gemalto.com/state-of-iot-security-2017-press-release

https://safenet.gemalto.com/resource/PartnerAsset.aspx?id=64424541713&resourcelang=1033

¡Atención, Seguridad Digital en Construcción!

Participa hasta el 11 de diciembre de 2017

El Modelo Nacional de Gestión de Riesgos de Seguridad Digital se está construyendo con el objetivo de que las entidades públicas, privadas y mixtas, operadores de infraestructuras críticas cibernéticas y la ciudadanía en general identifiquen sus riesgos, en el entorno digital, para tomar decisiones acertadas que permitan aumentar la confianza en el uso y aprovechamiento de este entorno. Y para lograr nuestro objetivo, el Ministerio de Tecnologías de las Información y las Comunicaciones, a través de la Dirección de Gobierno Digital, convoca a los ciudadanos para que nos den su opinión frente al tema. Queremos conocer las ideas y propuestas de los ciudadanos y de todos los grupos de interés, con el fin de construir un modelo útil, que impulse la prosperidad económica y social del país, mediante el uso de un entorno digital seguro.

http://www.urnadecristal.gov.co/construccion-modelo-gestion-riesgo-seguridad-digital

https://www.urnadecristal.gov.co/sites/default/files/Modelo%20Gestio%CC%81n%20de%20Riesgos%20de%20Seguridad%20Digital%20Ajustado%20OAJ%20Nov%2030-2017.pdf

The Strategic Energy Technology (SET) Plan

The remainder of this chapter outlines the SET Plan milestones since its birth in 2007. Chapter 2 illustrates the key role of R&I in the energy transition by presenting relevant examples of technological progress achieved over the last decade across the 14 low-carbon energy technology sectors the SET Plan covers. Chapter 3 presents the first three implementation plans which identify R&I activities to achieve strategic targets endorsed by the SET Plan community in 2016. The final chapter concludes this publication with the envisioned way forward.

https://publications.europa.eu/en/publication-detail/-/publication/771918e8-d3ee-11e7-a5b9-01aa75ed71a1/language-en/format-PDF/source-51344538