Security Operations Centers (SOCs) face unprecedented demands, from managing vast amounts of threat data to reducing alert fatigue and enhancing threat detection speed. With mounting pressures on teams to detect and respond swiftly, efficiency is more crucial than ever. This guide outlines strategies to boost SOC...
More incidents, vulnerability remediation timelines that can stretch into a year and mismatched budget priorities - such is the state of operational technology cybersecurity in 2024, according to participants in an annual SANS survey. Incident response remains a weak point.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.
David Ortiz, Global CISO of Church & Dwight, stresses the importance of comprehensive preparedness, including cybersecurity, disaster recovery, business continuity and crisis management, to build resiliency in OT manufacturing security practices.
Chemical companies have significantly boosted their cyber budgets over the past five years, according to a 2023 cyber survey published Monday, as awareness of cybersecurity vulnerabilities has steadily risen across the industry and new U.S. and E.U. regulations loom on the horizon.
Anthony Perry, director IT and OT/IoT security at FedEx, shared strategies for developing robust OT security programs. At FedEx, the focus on OT and IoT security has grown over the past several years, driven by the need to protect the company's automation processes, Perry said.
Managing security in the oil and gas industry involves unique challenges as firms rely on both legacy systems and modern technologies. Many devices in use were built decades ago without current security guidelines, making them vulnerable to cyberattacks, said Bemi Anjous, CISO at Noble Drilling.
The Port Authority of New York and New Jersey is a major transportation hub that oversees regional infrastructure. Initially lacking an OT security program, John Ballentine of PANYNJ recognized the need to adapt security strategies to the unique demands of operational technology environments.
Defenders of operational technology environments should look beyond the technical controls and incident response plans they've put in place. They also need to consider how attackers might undermine confidence in the service itself, says Ian Thornton-Trump, CISO of Cyjax.
From malware analyst and ethical hacker to CISO of AboitizPower, Alexander Antukh's cybersecurity journey has shaped his leadership style. He discusses strategies for addressing cybersecurity threats in critical infrastructure and ensuring secure remote access.
It's not just the critical cybersecurity vulnerabilities; it's the speed at which adversaries are attacking them. This is one of the key findings of Fortinet's new FortiGuard Labs Global Threat Landscape Report. Fortinet's Derek Manky shares takeaways and analysis.
While critical infrastructure operators have historically focused on securing their operational technology networks by preventing intrusions, the ongoing increase in nation-state attacks demands they master the ability to "identify, detect, respond and recover," said Robert M. Lee, CEO of Dragos.
In the wake of geopolitical tensions, nation-state threats have "crossed the line more often than they ever have," said Dawn Cappelli, head of OT-CERT at Dragos, warning of the growing threat to critical infrastructure and emerging challenges for small and medium enterprises.
Legacy systems that coexist with modern cloud-based applications complicate the arduous process of implementing cybersecurity measures. "When you get a company that is over 100 years old, you get some things that came along at different eras of the business," said Vaughn Hazen, CISO of CN Rail.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ot.today, you agree to our use of cookies.