Cybersecurity Working Group

With technological advances and the rise of remote working, the mining industry is susceptible to new and advanced cyber threats and attacks that can cause incredible damage for both mines and suppliers. The GMG/MM-ISAC Cybersecurity Working Group aims to foster awareness, develop a culture of cybersecurity, and provide guidance for the global industry.

Why Cybersecurity matters

As the mining industry acquires more sophisticated and efficient digital technologies, these technologies also create new risks for potential cyber threats and attacks. These risks include data breaches, system/equipment shutdown and hacking, phishing, infiltration through third-party access, and cyberespionage. Most of these attacks are targeted at mid-to-large size organizations and can potentially be associated with cyberterrorism. Attacks can result in revenue loss, reputational impact, and misuse of classified information.

Adopting prudent security measures and implementing an integrated cybersecurity management framework is essential for any mining organization to prevent service disruption and react to threats. It is critical to build reliable, secure, and resilient mining operations, to enable secure convergence between operational technology/information technology (OT/IT), and to drive accountability across the entire value chain.


Active Projects

No active projects

Our objectives

Drive convergence between IT/OT by developing security guidelines, a governance framework, dealing with legacy and emerging technologies, and security standards

Foster cybersecurity awareness and education at all levels of the industry

Create a culture of cybersecurity, phishing awareness and preventive detection in the mining industry

Enable a global community of subject matter experts, operators, leaders from inside and outside the mining industry, and those interested in cybersecurity to collaborate and share experiences

Develop industry guidance on topics such as IT/OT management, data discovery and protection, vendor security management, asset identification/inventory, incident response plan, and other selected topics agreed upon by the working group

Cybersecurity updates

Copyright © 2023 Global Mining Guidelines Group