3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security

Colonial Pipeline Attack: 'We're Simply Unprepared'

CISO Bernie Cowens on Mitigating the Vulnerabilities of Critical Infrastructure Facilities
Bernie Cowens, EVP, CSO, Utility Technology Solutions

As former CISO of Pacific Gas & Electric, Bernie Cowens knows plenty about cyber securing the nation's critical infrastructure. He shares his informed opinion on the Colonial Pipeline ransomware attack and what public and private sector entities must do to shore up key defenses.

See Also: Core Elements of Modern Workforce Identity Security

In this video interview, Cowens, now executive vice president and CSO of Utility Technology Solutions, discusses:

  • The significance of this latest hit to critical infrastructure;
  • How security leaders can help mitigate the biggest risks;
  • What needs to be done to ward off such attacks.

Cowens, EVP and CSO at Utility Technology Solutions, a startup organization, was formerly vice president and CISO at Pacific Gas and Electric Co., where he was responsible for leading companywide efforts to identify and manage cybersecurity risk to protect critical infrastructure and information assets. Earlier, Cowens was CISO for First American, where he oversaw all aspects of information security for the company and its global business units. He also has held senior security executive positions at PricewaterhouseCoopers, Experian and the Automobile Club of Southern California and served as the vice president and CISO for SafeNet, a global encryption technology manufacturing company.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.