cybersecurity, CISO, OT, ICS

Protecting OT from Cyber Threats: A CISO Perspective

Traditional industrial control systems (ICS) tend to be “insecure by legacy / design” which presents great challenges to secure. To add insult to injury, it is also proprietary, highly bespoke, and often managed by third-party vendors. As practitioners of cybersecurity, “one of everything” resonates. IT focuses on CIA (confidentiality, integrity, and availability) which is counterintuitive in ICS... Read more

OT Cybersecurity Experts Share Best Practices in 4-Part eBook and Webinar Series

Digitalization and Industrie 4.0 initiatives require tight integration between the complex, heterogeneous, and highly complex Industrial Control Systems (ICS) and the enterprise IT. However, the very components that enable digitalization—sensors, connectivity and smart applications—also increase risk. Digitalization enhances efficiency, improves safety, and optimizes production, but it also creates more... Read more

Codifying the Process: Outsiders Gain Insider Advantage

I was at Black Hat 2017 last week and was impressed with the Industroyer /Crashoverride: Zero Things Cool About a Threat Targeting the Power Grid  presentation by ESET and Dragos Security. The teams outlined well how the attack was executed. One of the big takeaways was that attackers did not exploit a vulnerability or zero day to bring down Ukrainian power. Robert Lee from Dragos Security put it well when he said that... Read more

Fixing Your Nuisance Alarms Just Got a LOT Easier

The most popular alarm management presentation we have ever done has been the one on fixing “Bad Actor” alarms. I like it because I get to refer to some of my favorite schlocky sci-fi movies – and it turns out that lots of engineers like those as well!   Nuisance alarm reduction is an important step. We recommend it at the beginning of an alarm improvement effort because it is easy, fast, cheap, and... Read more

ICS Cybersecurity Cognitive Dissonance

ICS Cybersecurity's Cognitive Dissonance

In the recently released survey from SANS, Securing Industrial Control Systems—2017, there were two results that stood out more than most. The first came from a question assessing which control systems had the greatest impact if compromised and exploited; the second related to which systems had the strongest data collection and analysis. In the case of impact, survey respondents ranked computer assets with... Read more

Displaying results 6-10 (of 42)
 |<  <  1 2 3 4 5 6 7 8 9  >  >| 

This site would like to place a cookie on your browser to help us better deliver relevant and valuable content to you.