Governance & Risk Management , Operational Technology (OT) , Video

Building Robust Cybersecurity Program for OT Environments

Todd Beebe of Freeport LNG on Strategies for Securing Operational Technology
Todd Beebe, ISO, Freeport LNG

Modern security challenges such as increased remote work and interconnected applications demand robust strategies. Todd Beebe, information security officer at Freeport LNG, shared insights on developing cybersecurity programs for OT environments.

See Also: OnDemand I IoT infrastructure and Retail Operations Fireside Chat I AMPOL

Beebe's background in offensive security shaped his approach to building cybersecurity programs. Visibility and control are foundational elements, giving security professionals the ability to understand system activities and identify gaps.

Threat actors exploit the same paths used by legitimate administrators, making regular validation of security controls essential. "We leverage tools such as MITRE ATT&CK and Atomic Red Team. The same commands and activity that a threat actor would use, we simulate that activity on both environments and then make sure that we are getting alerts," Beebe said.

In this video interview with Information Security Media Group at the Cyber Security for Critical Assets USA Summit in Houston, Beebe also discussed:

  • Conducting regular scans to detect compromised or reused passwords to prevent unauthorized access;
  • Why outdated technology requires specific security measures;
  • The need for industry collaboration to help avoid common pitfalls in cybersecurity.

Beebe is an information security officer, entrepreneur and investor with more than 25 years of experience. He has worked in cybersecurity for most of his career and holds eight information security-related patents.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.