How manipulation jeopardizes food safety
As a critical infrastructure, the food industry offers a wide range of targets for espionage, blackmail and, above all, cybercrime. Threats from cyber attacks are a major threat to every company and therefore entire supply chains in the food industry. From pishing mails, denial of service (DDoS) attacks to CEO fraud – the means of choice are creative and are not limited to cyberspace, but also to physical access to companies.
The article “When the firewall is not enough…” by Information Security Content Manager Julia Nusko (CALPANA business consulting GmbH) and Security Consultant Paul André de Jong (management consultancy Claudia de Jong) provides in-depth insights into how manipulation jeopardizes food safety and, above all, how you as a company can protect yourself against it.
This article was published in the magazine LVT Lebensmittel Industrie, issue 9, September 2023, page 30 & 31.
The requirements for companies with critical infrastructures are set out in the GRC platform CRISAM®
and many standards and compliance norms are met.
Simply register for a free and non-binding demo appointment and we will show you how you can use compliance standards and legal requirements in the form of the CRISAM® Knowledge Packs for your GRC management. Imagine that the proof of compliance for many standards and norms can be provided very efficiently with just ONE assessment of the content. How does that work? We will be happy to show you!
You are currently viewing a placeholder content from Facebook. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou need to load content from reCAPTCHA to submit the form. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Instagram. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from X. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information