Through ISMG’s Lens: OT Security | Edition 18
Information Security Media Group (ISMG)
Inform. Educate. Connect. ISMG is a Global Leader in Cybersecurity Education, Intelligence and Research.
With the evolution of the threat landscape, managing organizational #cybersecurity risk is becoming increasingly challenging. The stakes are even higher in environments where operational technology (OT) is involved.
OT uses hardware and software to directly monitor industrial equipment, devices and assets that play a crucial role in our everyday lives. These are the systems that drive electricity, water, manufacturing, transportation, pharmaceuticals and more. Prior to this, #OTsecurity was largely centered around access and system controls within plant environments. However, digital transformation has played a critical part in how we approach OT and also keep industrial assets secure from ransomware, data breaches and other cybersecurity attacks.
The importance of building an OT cybersecurity program is overwhelming, especially if you don’t already have those resources in place.
Most OT systems are designed with little consideration for security. With increased cyber risk in this new digital transformation era, any approach to converge IT and OT is mission-critical for enterprise security.
As a CISO, can you reduce security and risk management function silos to bridge the security gaps? Can you deploy suitable asset inventory methods and map the IT/OT risks?
Here's ISMG's global coverage on OT security:
OT Security:?Has?the?Industry?Made Progress? by Suparna Goswami
OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go. Listen to the full interview
"We are the person chasing the ambulance at the moment. Whether it is manufacturing, energy, or water - many of these verticals are scratching their heads trying to conceptualize the range of security issues that we face and what we need to do about them" - Scott Flower, founder of Pareto Cyber and former global intelligence officer at FS-ISAC
Overcoming?Digital?Challenges?of?OT?Security, by Rafael Narezzi
Nozomi Networks Sales Director Nycholas Szucko discusses the pursuit of cybersecurity education for OT and how digital transformation has brought a huge challenge to the industry. He says we cannot protect what we cannot see. The ideal approach is always to start with the basics, ensuring visibility. Watch the full interview
Proof?of?Concept:?Key?Steps?for?Improving?OT?Security, by Anna Delaney
In the latest "Proof?of?Concept," VP and CISO Nicole Darden Ford shares findings from 罗克韦尔自动化 's new survey report on cybersecurity preparedness in critical infrastructure,?OT?security?gaps, the state?of?critical infrastructure, and insights into preparedness and best practices. Watch the full episode
New?Survey?Shows?6?Ways?to?Secure?OT?Systems, by Cal Harrison
A recent survey sponsored by 罗克韦尔自动化 finds that critical infrastructure organizations miss basic protections for operational technology, with 80% failing to conduct frequent asset inventory audits, 63% lacking real-time threat monitoring and 42% needing effective patch management. Read the full story
Know your Editor:
ISMG is one of the world’s largest media organizations devoted solely to information security and risk management with reportage and analysis from the industry’s award-winning journalists. A look at who's behind the wire:
领英推荐
Here’s putting the spotlight on Mihir Bagwe , senior correspondent - global news desk, Information Security Media Group (ISMG)
Playing cricket, trekking, swimming and experimenting with my culinary skills.
Start the day by setting your “Goals for the Day.” This makes life easy. Try it!
“Stay Hungry, Stay Foolish.” Always stay hungry to know more simply because cybersecurity is an evolving field. What’s a breakthrough today might be stale tomorrow. Also, one needs to stay foolish because it will help you break down the impossible of cybersecurity into “I am possible.”
The complete series of Sherlock Holmes. Mystery has always fascinated me, and who better than the Holmes-Watson duo when it comes to that? 56 stories and 4 novels. The best of mystery that you can get. I am also a Marvel fanatic who still enjoys reading comics.
If you still haven’t heard our executive editor Jeremy Kirk’s podcast “The Ransomware Files,” then you are certainly missing out on a lot of knowledge on the hottest topic - ransomware. Also, Mathew Schwartz’s ransomware coverage and the cyberwarfare in the Russia-Ukraine war is noteworthy.
I have always played team sports. The importance of succeeding as a team has been ingrained in me since childhood. One of the most well-known industrialists, and my favorite, Ratan Tata sir, also values and abides by the same. I have a poster of his quote in my drawing room, which reads, “If you want to walk fast, walk alone. But if you want to walk far, walk together.”
I have been with ISMG for just over a year, and it's been an incredible journey so far. But the fondest memory I have is from the recently concluded Cybersecurity Summit: Mumbai. This was the first time that I attended, hosted and interviewed security leaders in person, and the adrenaline rush this experience gave me has been unmatched.
Know more at #MumbaiSummit2022
With the advent and growth of 5G networks, a new era of interconnectivity is at the dawn with the IoT. But with great power, come great responsibilities; and since 5G architecture is comparatively at a nascent stage in the industry, it will require a lot of research to find loopholes and make the system secure from both internal and external attacks. Every step of the 5G network might bring a plethora of network attacks that we might not be aware of. So, certainly, 5G one of the many things to keep an eye on in the immediate future.
That's all for today. We will be back next week.
Until then, stay current with the latest happenings in cybersecurity by subscribing to our newsletter.
?Have a nice day ahead.
-- ISMG Social Media Desk
President of cultural Club||Graphic designer at Network BIT forum|| Power BI ||Member of ISTE student Chapter||Grand finalist of SIH'22 @ first year|| Founder of Dyunetra || CCIO@NSD|| Digital Forensic Investigator ||
2 年??
Next Trend Realty LLC./wwwHar.com/Chester-Swanson/agent_cbswan
2 年Thanks for Posting.