Cybersecurity workforce development is critical as IT and OT converge. Sean McBride, director of the informatics research institute at Idaho State University, advises organizations to train people with the "skills, attitudes and behaviors" to manage and protect critical systems.
The U.S. National Institute of Standards and Technology wants public feedback on the first draft publication of a new project that aims to better secure the water and wastewater sectors from emerging cyberthreats by focusing on common concerns affecting operational technology assets.
Cyber Florida: The Florida Center for Cybersecurity helps enhance cybersecurity resilience by assisting understaffed critical infrastructure entities across Florida. Ambassador Roland Miller emphasized the importance of helping smaller entities improve their cybersecurity defenses.
Modern security challenges such as increased remote work and interconnected applications demand robust strategies. Todd Beebe, information security officer at Freeport LNG, shared insights on developing cybersecurity programs for OT environments.
Anthony Perry, director IT and OT/IoT security at FedEx, shared strategies for developing robust OT security programs. At FedEx, the focus on OT and IoT security has grown over the past several years, driven by the need to protect the company's automation processes, Perry said.
Security leaders face significant challenges in securing OT environments, especially with increasing geopolitical disruptions and psychological barriers. Trish McGill, IT and OT cybersecurity expert at Ilionx, emphasized the importance of addressing these psychological factors to bridge the IT-OT divide.
Managing security in the oil and gas industry involves unique challenges as firms rely on both legacy systems and modern technologies. Many devices in use were built decades ago without current security guidelines, making them vulnerable to cyberattacks, said Bemi Anjous, CISO at Noble Drilling.
U.S. federal authorities are alerting healthcare entities about critical vulnerabilities in two medical device products from manufacturer Baxter. Both flaws can be exploited remotely, potentially jeopardizing patient care. Some experts say such disclosures in general need more attention.
Lorena Nunes, industrial cybersecurity specialist at Braskem, discusses how to bridge the cultural gap between IT and OT. She emphasizes the importance of building a cybersecurity culture and getting buy-in from leadership and rank-and-file employees.
The Port Authority of New York and New Jersey is a major transportation hub that oversees regional infrastructure. Initially lacking an OT security program, John Ballentine of PANYNJ recognized the need to adapt security strategies to the unique demands of operational technology environments.
Joseph Couture, regional information security officer for the Americas and CISO for the United States at Ørsted, discusses the unique regulatory challenges in the energy sector, the importance of risk management, and how Ørsted addresses cybersecurity to ensure safe and reliable energy delivery.
As the Biden administration pours money into grid-enhancing technologies and announces a new federal-state initiative to modernize the U.S. electric grid, experts say security should be considered at every stage to avoid potentially creating even worse problems for the already-strained grid.
Durgesh Kalya, OT network security expert at Covestro LLC, emphasizes the need for robust incident management and life cycle upgrades for critical infrastructures. He shares insights on integrating the incident command system with industrial automation.
Australian critical infrastructure organizations must enable greater convergence between their information technology and operational technology teams to better respond to cybersecurity threats to their OT infrastructure, according to a new study by Palo Alto Networks.
Defenders of operational technology environments should look beyond the technical controls and incident response plans they've put in place. They also need to consider how attackers might undermine confidence in the service itself, says Ian Thornton-Trump, CISO of Cyjax.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.