As OT systems become more interconnected, traditional air gaps disappear, creating new risks, said Joseph Carson, chief security scientist and advisory CISO at Delinea. The convergence of IT and OT environments requires a stronger focus on protecting digital identities and access controls.
Organizations mistakenly believe their operational technology systems are air-gapped and immune to cyberthreats. Dawn Cappelli, director of OT-CERT at Dragos, discusses why these assumptions are dangerous security gaps and why organizations need to rethink their approach to OT security.
Dennis Giese, a security researcher and engineer, built his first computer at around age 8 using spare parts. Years later, he hacked his first robotic vacuum cleaner. Giese reflects on his journey as a researcher and ethical hacker during HardPwn, a hardware hackathon hosted by Hardwear.io in Amsterdam.
A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
ISMG's Cybersecurity Pulse Report: ManuSec USA 2024 Edition is an essential resource for senior cybersecurity leaders and marketers navigating the complex landscape of operational technology security in manufacturing. This exclusive report distills critical insights from 61 industry pioneers.
Ken Soh, group CIO at BH Global, and John Lee, managing director at GRF, discuss how the rise of smaller renewable energy producers and smart grid initiatives is forcing a rethink of traditional cybersecurity frameworks.
The maritime industry faces several challenges from cyberattacks, pushing it to quickly adapt to an evolving threat landscape while complying with new regulatory requirements. Ken Soh, group CIO at BH Global, outlines key strategies to protect offshore operations from escalating cyber risks.
Healthcare has become the number one target for cyberattacks, with organizations spending an average of $11 million per ransomware incident, says Jojo Nufable, vice president at St. Luke's Medical Center. He shares why traditional security approaches fall short as AI-powered devices proliferate.
The growing convergence of operational technology with business networks creates new attack vectors requiring CISO attention. Smart building components and industrial systems now pose risks to critical business functions, said Steven Sim, chair, executive committee at OT-ISAC.
As OT becomes increasingly connected to the internet, critical infrastructure operators must rethink their approach to cybersecurity while managing legacy systems that were not designed with security in mind, said John Lee, managing director, Global Resilience Federation Asia-Pacific.
Armis has closed a $200 million Series D funding round on a $4.2 billion valuation to drive growth in cyber exposure management with a focus on acquisitions and federal expansion. CEO Yevgeny Dibrov says the funds will accelerate Armis' work in operational technology and medical device security.
Andre Shori, CISO for APAC governance at Schneider Electric, shares how aligning OT and IT under a unified cybersecurity framework is key to resilience. Our goal is to embed security across the product life cycle, he said, while highlighting the company's commitment to protecting customer assets.
Adopting standards like ISO 27000 can help organizations align with national security goals and regional cooperation, but simply following compliance checklists falls short, said Anthony Lim, fellow, cybersecurity, governance and fintech, Singapore University of Social Sciences.
Researchers demonstrated that multiple brands of EV charging stations have vulnerabilities due to manufacturers often leaving open and unsecured SSH and HTTP ports. The risks of these vulnerabilities range from an expanded attack surface to a launching pad for assaults on the power grid.
While ransomware attacks against medical devices don't happen often, disruptive cyber incidents that affect the availability of the IT systems that medical devices rely on are a big concern that needs the industry's critical attention, said Jessica Wilkerson of the FDA.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.