Martin Roesch, CEO of Netography, discusses the company's platform, which is for dispersed, ephemeral, encrypted and diverse - what he refers to as "DEED" - environments. DEED works with the multi-cloud, hybrid and on-premises, IT and OT environments that modern large enterprises have today.
Dragos has axed 50 workers after longer sales cycles and smaller initial deployment sizes caused the industrial cybersecurity vendor to miss its first quarter revenue target. Dragos revealed plans to reduce its staff by 9% to ensure the company can stay independent through an IPO or Series E round.
In this episode of "Cybersecurity Insights," Antoinette Hodes of Check Point Research discusses the need to consolidate an organization's cybersecurity posture, gain visibility into OT and IT assets, and use cybersecurity education to increase worker safety.
CISOs now understand the importance and complexity of protecting the OT environment and how it differs from the IT attack surface. IT leaders in critical infrastructure and even the food industry increasingly want to get their arms around OT threats, said Rockwell Automation's Mark Cristiano.
Risk management, operations, security - each organization and more play a role in ensuring OT security across the enterprise. Qiang Huang of Palo Alto Networks talks about new strategies to embrace and improve security of operational technology and connected devices.
With an ever-expanding threat landscape, organizations need to possess the right tools and knowledge to deal with cyberattacks. Dawn Cappelli, head of OT-CERT at Dragos, recommends training small and medium-sized businesses that are just starting their operation technology journey.
Public sector organizations often lack the resources needed to protect against nation-state attacks and espionage, while private sector entities often struggle in defending against ransomware and similar threats, said Yaniv Vardi, CEO of Claroty, who explained why more collaboration is needed.
IT-OT convergence has created interconnection between components that were historically separate and have different maturity levels. But attacks on OT can have a kinetic impact that can lead to very grim scenarios, said Ashish Thapar, vice president and head of cybersecurity consulting at NTT.
This is the time and place in which geopolitical interests, hacktivism, espionage and all of the crime syndicates are coming together, and we're amateurs showing up at that gunfight with a knife, said Jeff Multz, senior vice president of sales in North America at Radware.
OT security programs continue to be underfunded and understaffed, although rapid growth in this sector and new focus from government and organizations show hope, said Alexander Antukh, CISO of AboitizPower, and Mex Martinot, vice preisdent and global head of industrial cybersecurity, Siemens Energy.
Threat intelligence is an important component of OT security because it maps the techniques and tactics of threat actors to what they are likely to attack, and it collaborates across teams to cover potential vulnerabilities, according to CISOs Susan Koski and Sapan Talwar.
IT and OT security are more different than most realize. IT focuses on digital systems and data, and OT concerns itself with physical systems and their interconnectivity, said Dragos CEO Robert Lee. The stark differences between IT and OT security are laid bare around vulnerability patching.
Critical infrastructure attacks during 2022 focused primarily on Eastern Europe and Ukraine given fears of reprisal from attacking the U.S., said Optiv CEO Kevin Lynch. The amount of OT security investment needed to defend against adversaries is bigger than what many organizations can handle today.
Offense is what paces innovation in cybersecurity since threat actors constantly look for new ways to compromise systems, said AllegisCyber Capital's Bob Ackerman. Many offensive cyber capabilities developed by the national intelligence community make their way into the wild and become exploitable.
Many infrastructures have both OT and IT systems, making data and device transfer between the two systems difficult. Also, some OT devices are outdated while IT systems use modern cloud devices. And the shortage of training is another important hurdle, said OPSWAT CEO Benny Czarny.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.