r r PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-0-hoverPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTRAWMATERIALS PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-3PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCTION &OPERATION stage-4PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFEPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-5PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTLOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT

Mitigating Cyber Threats

As ICL has become more dependent on information technologies to conduct its operations, it has taken many steps to protect itself against sophisticated security and cyber threats. As cyberattacks evolve and become more sophisticated, the Group has had to strengthen its prevention and monitorization efforts. \

ICL is implementing a global program to protect its information technology (IT) and industrial control systems (ICS). This program includes separating information networks from computerized process networks, physical protection of computer rooms, servers and terminals and employee training. IT security personnel have been appointed, an integrated approach to address the issue has been formulated, and work plans have been prepared and implemented globally. In addition, risk surveys have been performed at all plants in Israel and at several plants located in other countries.

For more information see ICL 2021 Annual Report (p.119)

Each year ICL’s IT department undergoes one to three security breach simulations which are assessed by an external auditor.

ERM cybersecurity

ERM cybersecurity activities are managed and controlled by ICL’s chief information security officer (CISO) and ICL’s global chief information officer (CIO). Quantitative goals have been established for implementing a multi-year work plan to advance these issues and adapt ICL’s operations to numerous threats.

ICL has implemented a cybersecurity policy and cyber-attack and crisis procedures in all its operations.

Mobile Threat Defense

As part of ICL's global effort to maintain a high standard of information security, and support current and future needs, IT cyber security and CISO teams will implement mobile threat defense solutions. The mobile threat defense provides continuous, on-device protection for mobile devices analogous to traditional antivirus protection with advanced technology capabilities. 

Personnel Training and Awareness

All IT and OT company and contractor employees participate in several mandatory workshops and virtual training sessions on IT topics. In 2021, security awareness trainings took place in ICL plants across Israel, as did fraud and ransomware awareness training for finance, marketing, projects and IT departments. Cyber security drills took place in some of ICL’s sites in Israel. In addition, during 2020 and 2021, cyber security training was provided to the ICL IT control department in Israel and the US. 

ICL’s practices regarding data privacy are based on EU (GDPR) and Israeli regulations.

 

ICL Global ESG Week

ICL’s Global ESG Week was filled with multiple virtual events alongside in-person activities. about 7,750 participants from all around the world including Israel, Europe, the Americas and China participated. During the week, employees gained awareness on topics such as information, cyber security and data privacy, and four awareness videos in eight languages were shared. An interactive cyber quiz engaged 500 employees from around the world.

We use cookies to provide our services and for analytic and marketing purposes. To find out more about our use of cookies, please see our privacy policy.
By continuing to browse our website, you agree to our use of cookies.