Cyber Threats to the Bioengineering Supply Chain

January 25, 2019

The Bioengineering supply chain begins with the acquisition of either a physical genetic sample or an existing data record, which could be downloaded from a repository such as the National Center for Biotechnology Information Genbank FTP website. This data is sequenced, stored, analyzed and disseminated on various platforms to include Local Area Networks and cloud services (2018, Bajema). Universities, pharmaceutical companies, the genomic sequencing industry and genetic testing companies rely on the availability of this data. While machines are programmed with binary code to include 0s and 1s, in biology, genetic code relies on As (adenine), Cs (cytosine), Gs (guanine) and Ts (thymine). Data stored in either form may be vulnerable to theft, sabotage or manipulation by adversaries.

Spotlight

Kroll

Kroll is the leading global provider of risk solutions. For more than 40 years, Kroll has helped clients make confident risk management decisions about people, assets, operations, and security through a wide range of investigations, cyber security, due diligence and compliance, physical and operational security, and data and information management services. Headquartered in New York with more than 50 offices across nearly 30 countries, Kroll has a multidisciplinary team of over 2,000 employees and serves a global clientele of law firms, financial institutions, corporations, non-profit institutions, government agencies, and individuals.At Kroll, we know securing and managing electronically stored information (ESI) is critical to the future of your business.

OTHER WHITEPAPERS
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

Unidirectional Security Gateways: Enabling Secure IT-OT Communications

whitePaper | June 28, 2022

Braking performance, corner analysis, pit stop strategy breakdowns. To watch a Formula 1 race today is as much about being an adrenaline junkie as it is being a data geek, thanks to the 300 sensors on an F1 car sending more than 1.1 million data points to the pits every second1.

Read More

Spotlight

Kroll

Kroll is the leading global provider of risk solutions. For more than 40 years, Kroll has helped clients make confident risk management decisions about people, assets, operations, and security through a wide range of investigations, cyber security, due diligence and compliance, physical and operational security, and data and information management services. Headquartered in New York with more than 50 offices across nearly 30 countries, Kroll has a multidisciplinary team of over 2,000 employees and serves a global clientele of law firms, financial institutions, corporations, non-profit institutions, government agencies, and individuals.At Kroll, we know securing and managing electronically stored information (ESI) is critical to the future of your business.

Events