Excellent learning and peer-to-peer networking opportunities with a cross-section of the nuclear industry.
The world’s first certified professional development programme for individuals in nuclear security management.
An extensive archive of information on nuclear security, both from WINS and from external sources.
Helping licensees assess the maturity of their security programme and measure their security culture effectiveness.
Radioactive sources benefit human beings in a wide variety of ways—from medicine and industry to agriculture and research. However, they also have the potential to cause great harm if they are not properly managed. As the threat from terrorism has grown in the last decades, the awareness that radioactive sources can potentially pose a serious security risk has also grown. As a result, States and regulatory bodies have instituted new regulations and other mechanisms to mitigate this risk.
In response to the threat and in compliance with regulatory requirements, end users have established security programmes for their radioactive materials. The security systems implemented at the facility level have been mostly designed to deter and respond to physical attacks conducted by outsiders, including criminals and terrorists, and by employees and other individuals authorised to physically access the premises where sources are in use or storage (insiders).
One of the greatest challenges in this regard is security’s increasing reliance on digital technology at every level. For example, many elements of the physical protection systems now rely on digital technologies and associated IT infrastructures—from operations and communications to alarm monitoring stations and fundamental elements of the intrusion detection, access control and alarm assessment systems. If not properly protected, these elements are vulnerable to cyberattacks that could degrade the performance of the physical protection systems and lead to vulnerabilities in the security of the radioactive sources themselves.
Social engineering attacks, such as phishing emails, are a major cause for concern because they can give adversaries remote access to physical protection systems and the IT infrastructure. Another challenge is that end users store a variety of sensitive information on IT systems that could compromise radioactive source security. This includes information related to the security plan, access codes and alarm system codes/passwords. It also includes source inventory (including locations and amounts), operational procedures, computer systems, transport timing and routes, technical data, blueprints, schematics, designs, security procedures and emergency response plans. Such information requires protection against unauthorised disclosure.
End users may also possess business sensitive data, customer-related materials and patient health records whose disclosure could lead to negative competitive business impacts or significant liabilities for the organisation. In addition, processes that use sources or devices that contain sources might also become the target of cyberattacks that could disrupt facility operations, lead to loss of production, damage customers or adversely impact patient health.
A particular challenge for the health care industry is that medical devices are increasingly connected to the internet, hospital networks, and other medical devices to provide remote diagnostics and features that increase the ability of health care providers to treat patients. However, such features also increase cybersecurity risk. Furthermore, medical devices, like other computer systems, can be vulnerable to security breaches, potentially impacting the safety and effectiveness of the device itself.*
*https://www.washingtonpost.com/technology/2019/04/03/hospital-viruses-fake-cancerous-nodes-ct-scans-created-by-malware-trick-radiologists/?noredirect=on&utm_term=.dc1645723f01.
Understanding and mitigating the cybersecurity risks associated with radioactive sources is especially challenging. Consequently, WINS decided to conduct a two-day meeting to bring experts together to identify the magnitude of this risk and to review best practices for establishing effective cybersecurity programmes at end users’ facilities. The event gave participants the opportunity to:
The framework for the roundtable consisted of presentations and plenary and group discussions. The roundtable was conducted in English and drew only on unclassified information.
Participation was limited. Attendees were expected to meet their own costs for travel and accommodation, but the organisers met all event costs. No registration fee was required.
Pierre Legoux info@wins.org |
---|
Bettina Lock info@wins.org |
---|