Governance & Risk Management , Legacy Infrastructure Security , Operational Technology (OT)

Why Critical Infrastructure Requires Proactive OT Defense

Port Authority ICS Cyber Professional John Ballentine on Strategies for OT Security
John Ballentine, ICS security program manager, Port Authority of New York and New Jersey

The Port Authority of New York and New Jersey is a major transportation hub that oversees regional infrastructure. Initially lacking an OT security program, John Ballentine of PANYNJ recognized the need to adapt security strategies to the unique demands of operational technology environments.

See Also: From Data to Decisions: Maximizing Operational Efficiency Through IT-OT Integration

Cybercriminals have been attacking ports around the world and causing major disruptions, which is why organizations need to prioritize cybersecurity efforts based on potential impacts on human life.

"We are acutely aware of what target we have on our back, not just with the World Trade Center but also the assets that we have. We recognize how vulnerable we are. We recognize the extent of that vulnerability from a human standpoint and an economic standpoint," Ballentine said.

In this video interview with Information Security Media Group at the Cyber Security for Critical Assets Summit in Houston, Ballentine also discussed:

  • Transitioning from an IT-focused approach to an OT-specific approach;
  • The need to maintain an accurate and up-to-date asset inventory;
  • Proactive defense strategies to use against sophisticated adversaries.

Ballentine is an OT security professional with expertise in identifying, proposing and reviewing key ICS/OT information security program priorities, initiatives, plans, practices and tools to enhance security posture effectively.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.