If you weren’t one of the 3,000 security leaders who attended the Gartner Security & Risk Management Summit 2019 in National Harbor, you missed an important talk.
During her session on “Accelerating Industrial Cyber Security; Protecting Production & Profits”, Suzanne Spaulding, former Under Secretary at the US Department of Homeland Security (DHS), shared her suggestions for effectively building resiliency against cyberattacks. Read on to find out what role an asset inventory and automated threat detection play.
Malicious hackers are threatening public safety all over the world. Cyberattacks could cut off the supply of electricity to hospitals, homes, schools and factories. A loss of electricity would also have heavy implications for other vital services.
To learn why secure-by-design power system are essential to cyber resiliency, read on.
Leading a successful cyber security solution PoC takes a laser-like focus on project management (aka scoping, scheduling and herding cats), along with softer skills like relationship building, negotiation and patience. I’ve often been asked about the most important considerations in planning for an ICS Proof of Concept. From use cases to subjective metrics to scope creep, read on to learn what I think matters the most.
I’m thrilled to share with you that Nozomi Networks existing investors are committing further funds to back us as the leading industrial cyber security company. We have just announced a Series C round of funding of $30 million, bringing our total investment to $54 million.
Our momentum is accelerating across key areas: customer acquisition, technology innovation, partnerships and global expansion.
Many organizations still view IT and OT cyber security as unique issues to address, yet the need for convergence has never been more important. Attackers exploit the security gaps between IT and OT technologies exactly because those responsible for their defense have different priorities.
While challenging to achieve, IT / OT convergence will eliminate security gaps and reduce overall cyber risk. Read on to learn more.