Go offline with the Player FM app!
More than Security, Cyber Defense Is 'Life Safety'
Manage episode 364357352 series 3352216
Strategies for breaking down IT silos in learning how people, devices and networks can be attacked.
Providing a significant assist to transparency efforts in cybersecurity is the Strengthening American Cybersecurity Act, which was signed into law in March 2022.
Unlike other regulatory efforts focused on updating network security, or mandating agencies like CISA (Cybersecurity and Infrastructure Security Agency, which falls under the Department of Homeland Security) to develop cybersecurity plans, it requires “critical infrastructure entities” to report “substantial cyber incidents” within 72 hours, and any ransomware payment within 24 hours.
In addition to regulatory efforts and compliance, a bigger challenge, and one we’ve begun covering more here on Security Breach, is the significant lack of internal OT cybersecurity expertise within the industrial sector.
In general, this can be attributed to too many manufacturers feeling their IT security personnel can also be used on the OT side. This happens without an appreciation for how different the technology and operating environment is, and how a cut-and-paste approach will leave too many doors open to hackers. Recent findings from Fortinet show that 67 percent of OT security leaders come from an OT engineering background.
Knowing how to implement and connect OT technology does not make one an expert on keeping it secure.
To discuss these and other issues, like IT/OT silos and the impacts of ransomware, we're excited to have Debbie Gordon join us on this episode of Security Breach. She's the founder and CEO of Cloud Range, a leading provider of OT/ICS cyberattack simulations and training.
We’re also excited to announce that Security Breach is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to rockwellautomation.com.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
133 episodes
Manage episode 364357352 series 3352216
Strategies for breaking down IT silos in learning how people, devices and networks can be attacked.
Providing a significant assist to transparency efforts in cybersecurity is the Strengthening American Cybersecurity Act, which was signed into law in March 2022.
Unlike other regulatory efforts focused on updating network security, or mandating agencies like CISA (Cybersecurity and Infrastructure Security Agency, which falls under the Department of Homeland Security) to develop cybersecurity plans, it requires “critical infrastructure entities” to report “substantial cyber incidents” within 72 hours, and any ransomware payment within 24 hours.
In addition to regulatory efforts and compliance, a bigger challenge, and one we’ve begun covering more here on Security Breach, is the significant lack of internal OT cybersecurity expertise within the industrial sector.
In general, this can be attributed to too many manufacturers feeling their IT security personnel can also be used on the OT side. This happens without an appreciation for how different the technology and operating environment is, and how a cut-and-paste approach will leave too many doors open to hackers. Recent findings from Fortinet show that 67 percent of OT security leaders come from an OT engineering background.
Knowing how to implement and connect OT technology does not make one an expert on keeping it secure.
To discuss these and other issues, like IT/OT silos and the impacts of ransomware, we're excited to have Debbie Gordon join us on this episode of Security Breach. She's the founder and CEO of Cloud Range, a leading provider of OT/ICS cyberattack simulations and training.
We’re also excited to announce that Security Breach is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to rockwellautomation.com.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
133 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.