VENDOR SECURITY MANAGEMENT

In order for the entire industry to remain resilient to cybersecurity threats, a clear and coherent guideline is needed to provide vendors and operators with best practices and proper guidance. The practical approaches included will be used for the mining industry to provide to vendors and operators in order to increase their resilience to a growing array of local, national, and international cybersecurity threats.

As vendors provide more sophisticated digital technologies to the mining industry, they also allow for new risks of potential cyber threats and attacks. These include data breaches, system/equipment shutdown and hacking, phishing, infiltration through third-party access and cyber espionage.

Therefore, implementing strong cybersecurity is essential for both vendors, as well as the industry as a whole, in order to remain invulnerable to these threats.
In order for the entire industry to remain resilient to these threats, a clear and coherent guideline is needed to provide vendors with best practices and proper guidance.

The practical approaches included will be used for the mining industry to provide to vendors and operators in order to increase their resilience to a growing array of local, national, and international cybersecurity threats.

KEY TOPICS

    • Vendor security and third party management
    • Cybersecurity and proper use of technology
    • Network vulnerability and asset management

PROJECT UPDATE

Join virtual workshops on:

  • May 13
  • May 27
  • June 18

PROJECT ACTIVITIES

Project proposal is under development, and will soon be submitted to Working Group Steering Committee for final approval. To become part of this effort, please contact any GMG staff.

X