Header image

G7 Aims to Better Protect Energy Systems from Cyber Attack

G7  leaders commit to strengthen the cybersecurity of the global supply chain.

The G7 is to establish a collective cybersecurity framework around operational technologies for both manufacturers and operators.

US National Security Advisor Jake Sullivan said that G7 leaders “committed to taking critical action to strengthen the cybersecurity of the global supply chain of key technologies used to manage and operate electricity, oil, and natural gas systems across the world” in a statement.

According to media reports, the initiative will seek to address the continuous cyberattacks targeting energy systems around the world, noting that the energy sector continues to be “heavily targeted by adversarial countries and criminals” with cyberattacks, and the G7 has pledged to increase resilience and security while also encouraging manufacturers to build more secure products. 

“To incentivize tech companies to build more secure Internet of Things products we will promptly explore avenues towards establishing mutual recognition of schemes for reliable cyber-safe products,” they said. 

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

11
Jul

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image