r r PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-0-hoverPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTRAWMATERIALS PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-3PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCTION &OPERATION stage-4PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFEPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-5PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTLOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT
Mitigating Cyber Threats

Mitigating Cyber Threats

As ICL becomes more dependent on information technologies to conduct its operations, and as the number and sophistication of cyber-attacks increase, the risks associated with cyber security increase. ICL has taken many steps in recent years in response to the steady increase in the number and severity of security and cyber threats. \

ICL is implementing a global program to protect the Company’s IT and ICS (industrial control systems). This program includes separating information networks from computerized process networks, physical protection of computer rooms, servers and terminals and employee training. IT security personnel have been appointed, an integrated approach for addressing the issue has been formulated and work plans have been prepared and implemented globally. In addition, risk surveys were performed at all plants in Israel and at several plants located in other countries.

These activities are managed and controlled by ICL’s CISO (Chief Information Security Officer) and ICL’s global CIO. Quantitative goals have been established for implementing a multi-year work plan to advance these issues and to adapt ICL’s operations to numerous threats.

We use cookies to provide our services and for analytic and marketing purposes. To find out more about our use of cookies, please see our privacy policy.
By continuing to browse our website, you agree to our use of cookies.