{"id":20181,"date":"2022-10-06T09:05:06","date_gmt":"2022-10-06T07:05:06","guid":{"rendered":"https:\/\/nr.no\/en\/?post_type=bc_project&#038;p=20181"},"modified":"2025-10-03T09:38:51","modified_gmt":"2025-10-03T07:38:51","slug":"delautomatisering-av-digital-risikostyring","status":"publish","type":"bc_project","link":"https:\/\/nr.no\/en\/projects\/delautomatisering-av-digital-risikostyring\/","title":{"rendered":"Semi-Automated Cyber Risk Management\u00a0"},"content":{"rendered":"\n<p class=\"has-sizing-medium\"><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-sizing-large\">Over the last several decades, our society has become increasingly digitalised. Critical infrastructures depend on digital infrastructures, and these dependencies increases our digital risk: we can no longer go back to using pen and paper.&nbsp;<\/p>\n\n\n\n<p class=\"has-sizing-medium\">We no longer believe that we can prevent all unwanted incidents. We have limited resources, and we have to prioritise how to use them. Risk management is the method used to make these priorities. <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-sizing-medium\">Rapid changes<\/h2>\n\n\n\n<p class=\"has-sizing-medium\">The risk landscape changes rapidly, and it is increasingly difficult to keep track of every new potential risk. We have large amounts of data from existing security monitoring systems, but this data is rarely used to determine risk. Risk assessment is currently a manual process: humans make subjective assessments based on reports and situational awareness rather than data and threat intelligence.&nbsp;<\/p>\n\n\n\n<p class=\"has-sizing-medium\">Our project goal is to increase the use of security data in risk assessments, and to develop tools that can automate or semi-automate the cyber risk management process. <\/p>\n\n\n\n<p class=\"has-sizing-medium\">As a result, we expect more accurate risk assessments and an improved situational awareness for decision makers. This will improve the decisions on how to prioritise the use of resources for cyber defence. Our intended effect is to improve the defensive ability and reduce costs for both industry and public sector.\u00a0<\/p>\n\n\n\n<p class=\"has-sizing-medium\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p class=\"has-sizing-medium\"><strong>To learn more about this project, please contact:<\/strong><\/p>\n\n\n\t\t<div id=\"post-type-multi-block_08fa36ffaadc523250f2882c8ef0fb8b\" class=\"wp-block-post-type-multi type-manual style-card-bc_employee t2-grid\">\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-12\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.no\/en\/employees\/pierre-lison\/\" class='card-employee'>\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.no\/content\/uploads\/sites\/2\/2024\/05\/pierre-lison-24.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-employee__content\">\n\t\t\t<p class=\"card-employee__name\">Pierre Lison<\/p>\n\t\t\t\t\t\t\t<p class=\"card-employee__position\">Chief Research Scientist<\/p>\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon t2-icon-arrowforward\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.9 4.259a1.438 1.438 0 0 1-.147.037c-.139.031-.339.201-.421.359-.084.161-.084.529-.001.685.035.066 1.361 1.416 2.947 3l2.882 2.88-10.19.02c-8.543.017-10.206.029-10.29.075-.282.155-.413.372-.413.685 0 .313.131.53.413.685.084.046 1.747.058 10.29.075l10.19.02-2.882 2.88c-1.586 1.584-2.912 2.934-2.947 3-.077.145-.085.521-.013.66a.849.849 0 0 0 .342.35c.156.082.526.081.68-.001.066-.035 1.735-1.681 3.709-3.656 2.526-2.53 3.606-3.637 3.65-3.742A.892.892 0 0 0 23.76 12a.892.892 0 0 0-.061-.271c-.044-.105-1.124-1.212-3.65-3.742-1.974-1.975-3.634-3.616-3.689-3.645-.105-.055-.392-.107-.46-.083\"\/><\/svg>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\n<div class=\"wp-block-group has-large-padding has-nr-dark-yellow-background-color has-background\">\n<p class=\"has-sizing-medium\">Project: Semi-Automated Cyber Risk Management\u00a0<\/p>\n\n\n\n<p class=\"has-sizing-medium\">Partners: mnemonic (project leader), DNB, Avinor<\/p>\n\n\n\n<p class=\"has-sizing-medium\">Funding: mnemonic, The Research Council of Norway <\/p>\n\n\n\n<p class=\"has-sizing-medium\">Period: 2022 &#8211; 2026<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":20183,"template":"","meta":{"_acf_changed":false,"_trash_the_other_posts":false,"editor_notices":[],"footnotes":""},"class_list":["post-20181","bc_project","type-bc_project","status-publish","has-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/20181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project"}],"about":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/types\/bc_project"}],"version-history":[{"count":5,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/20181\/revisions"}],"predecessor-version":[{"id":36899,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/20181\/revisions\/36899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/media\/20183"}],"wp:attachment":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/media?parent=20181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}