If you weren’t one of the 3,000 security leaders who attended the Gartner Security & Risk Management Summit 2019 in National Harbor, you missed an important talk.
During her session on “Accelerating Industrial Cyber Security; Protecting Production & Profits”, Suzanne Spaulding, former Under Secretary at the US Department of Homeland Security (DHS), shared her suggestions for effectively building resiliency against cyberattacks. Read on to find out what role an asset inventory and automated threat detection play.
Defining ICS cyber security needs and selecting a trusted partner can be challenging for industrial operators, so Kim Legelis sat down with ARC Advisory Group VP Research Larry O’Brien to see if he could help simplify the process.
From the challenges of IT/OT convergence to ensuring asset visibility, read on to learn what that Larry thinks are important considerations, and ways to streamline the selection process.
Concerns about cyber attacks on the U.S. critical infrastructure have reached a new level with The Wall Street Journal reporting “an evolution in the U.S. government’s thinking about how to deter malicious cyberactors”.
Find out ten actions that can be done quickly to monitor and secure the electrical grid against determined threat actors.
We’re excited to tell you that Nozomi Networks and IBM Security have teamed up to address the exploding demand for effective, integrated IT/OT cyber security services and solutions. Read on to see how industrial organizations around the world now get easy access to deep OT network visibility and continuous threat detection.
Cyber security threats to the power grid are a continuous danger nowadays, and because of this, regulation in North America may expand from covering bulk electricity carriers to low-impact carriers. Last month FERC, the U.S. Federal Energy Regulatory Commission, proposed a new rule for low-impact carriers, covering transient electronic devices such as USBs and laptops, and incident response policies. While the regulation is still in the review stage, some low-impact utilities are not waiting to improve their cyber security posture and get a head start on compliance. They are taking advantage of the latest innovation for cyber threat monitoring and detection systems. Vermont Electric Coop is one such entity, and they have realized multiple benefits from their proactive approach.