Request a Demo

Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.

The Noggin Platform

The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.

Learn More
Resilience Management Buyers Guide - Thumbnail
A Resilience Management Software Buyer's Guide
Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More

Buyer’s Guide to Critical Infrastructure Protection Software

Best Practice Guide

Risks to critical infrastructure assets are increasing

The COVID-19 pandemic has demonstrated society’s dependence on so-called critical infrastructure assets – the physical facilities, supply chains, information technology and communication (ICT) networks that if destroyed or disabled would significantly impact the social and economic wellbeing of their respective nations. The pandemic also revealed the sheer number of such assets: in not just traditional sectors like energy, defence, and water, but also public health and education, research and innovation, as well as food and grocery.

Sure, publics and governments are becoming aware of their critical dependence on these (numerous) assets. So too are less scrupulous actors, including hostile statebacked entities, hackers, and other cyber criminals.

Indeed, COVID-19 has turbocharged illegal cyber activity – already by June 2020, attacks had increased by a staggering 400 percent – often perpetrated by opportunistic hackers taking advantage of overwhelmed IT offices as vast swathes of the economy first went remote.

These opportunistic strikes would pale in comparison to what was to come. Announced in June 2020, coordinated, state-backed attacks against all levels of the Australian government were orders of magnitude worse. Nor did they abate. Later in the year, Defence Minister Linda Reynolds even decried a “new normal” of persistent cyberattacks on Australian targets, effectively blurring the lines between “peace and war”.

Download the full guide to continue reading >>

Download the Guide