Beyond the Checklist: Improving Security Maturity with the TSA Security Directives

Over the past few years, the Transportation Security Administration has released a set of Security Directives aimed at critical oil and gas pipelines, rail transit systems and the aviation sector. These directives vary slightly by industry, but at a high level, they all require owners and operators to develop and implement a cybersecurity incident response plan, identify and mitigate potential cyber risks in their systems, and report breaches to CISA within a specific timeframe.

This session will explore the balance between security requirements and the operational realities of the oil and gas and transportation sectors. Through case studies and expert discussions, we’ll offer practical strategies for implementing effective cybersecurity measures that align with the TSA's objectives, while overcoming resource limitations.  

Attendees will gain insights into:

  • The foundational principles of the cybersecurity best practices given by the TSA and why to focus on security outcomes, rather than checkbox compliance.
  • Why TSA selected the security best practices they did and the nuances of applying these controls in pipeline, rail and aviation environments.
  • Ways to improve security outcomes with smaller cybersecurity teams.
  • The cybersecurity maturity journey, including what each phase of maturity consists of and how to know when you’re ready to move up the curve.
Sign Up

Speakers

Beyond the Checklist: Improving Security Maturity with the TSA Security Directives
Webinar

Beyond the Checklist: Improving Security Maturity with the TSA Security Directives

May 15, 2024
10 am CT

Over the past few years, the Transportation Security Administration has released a set of Security Directives aimed at critical oil and gas pipelines, rail transit systems and the aviation sector. These directives vary slightly by industry, but at a high level, they all require owners and operators to develop and implement a cybersecurity incident response plan, identify and mitigate potential cyber risks in their systems, and report breaches to CISA within a specific timeframe.

This session will explore the balance between security requirements and the operational realities of the oil and gas and transportation sectors. Through case studies and expert discussions, we’ll offer practical strategies for implementing effective cybersecurity measures that align with the TSA's objectives, while overcoming resource limitations.  

Attendees will gain insights into:

  • The foundational principles of the cybersecurity best practices given by the TSA and why to focus on security outcomes, rather than checkbox compliance.
  • Why TSA selected the security best practices they did and the nuances of applying these controls in pipeline, rail and aviation environments.
  • Ways to improve security outcomes with smaller cybersecurity teams.
  • The cybersecurity maturity journey, including what each phase of maturity consists of and how to know when you’re ready to move up the curve.

Over the past few years, the Transportation Security Administration has released a set of Security Directives aimed at critical oil and gas pipelines, rail transit systems and the aviation sector. These directives vary slightly by industry, but at a high level, they all require owners and operators to develop and implement a cybersecurity incident response plan, identify and mitigate potential cyber risks in their systems, and report breaches to CISA within a specific timeframe.

This session will explore the balance between security requirements and the operational realities of the oil and gas and transportation sectors. Through case studies and expert discussions, we’ll offer practical strategies for implementing effective cybersecurity measures that align with the TSA's objectives, while overcoming resource limitations.  

Attendees will gain insights into:

  • The foundational principles of the cybersecurity best practices given by the TSA and why to focus on security outcomes, rather than checkbox compliance.
  • Why TSA selected the security best practices they did and the nuances of applying these controls in pipeline, rail and aviation environments.
  • Ways to improve security outcomes with smaller cybersecurity teams.
  • The cybersecurity maturity journey, including what each phase of maturity consists of and how to know when you’re ready to move up the curve.
IN PARTNERSHIP WITH
No items found.
SPEAKERS
Vivek Ponnada
Technical Solutions Director, Nozomi Networks
Ted Gutierrez
CEO, SecurityGate
Omar Sikander
Solutions Engineer at SecurityGate

Beyond the Checklist: Improving Security Maturity with the TSA Security Directives

Over the past few years, the Transportation Security Administration has released a set of Security Directives aimed at critical oil and gas pipelines, rail transit systems and the aviation sector. These directives vary slightly by industry, but at a high level, they all require owners and operators to develop and implement a cybersecurity incident response plan, identify and mitigate potential cyber risks in their systems, and report breaches to CISA within a specific timeframe.

This session will explore the balance between security requirements and the operational realities of the oil and gas and transportation sectors. Through case studies and expert discussions, we’ll offer practical strategies for implementing effective cybersecurity measures that align with the TSA's objectives, while overcoming resource limitations.  

Attendees will gain insights into:

  • The foundational principles of the cybersecurity best practices given by the TSA and why to focus on security outcomes, rather than checkbox compliance.
  • Why TSA selected the security best practices they did and the nuances of applying these controls in pipeline, rail and aviation environments.
  • Ways to improve security outcomes with smaller cybersecurity teams.
  • The cybersecurity maturity journey, including what each phase of maturity consists of and how to know when you’re ready to move up the curve.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.