Managing security in the oil and gas industry involves unique challenges as firms rely on both legacy systems and modern technologies. Many devices in use were built decades ago without current security guidelines, making them vulnerable to cyberattacks, said Bemi Anjous, CISO at Noble Drilling.
U.S. federal authorities are alerting healthcare entities about critical vulnerabilities in two medical device products from manufacturer Baxter. Both flaws can be exploited remotely, potentially jeopardizing patient care. Some experts say such disclosures in general need more attention.
Lorena Nunes, industrial cybersecurity specialist at Braskem, discusses how to bridge the cultural gap between IT and OT. She emphasizes the importance of building a cybersecurity culture and getting buy-in from leadership and rank-and-file employees.
The Port Authority of New York and New Jersey is a major transportation hub that oversees regional infrastructure. Initially lacking an OT security program, John Ballentine of PANYNJ recognized the need to adapt security strategies to the unique demands of operational technology environments.
Joseph Couture, regional information security officer for the Americas and CISO for the United States at Ørsted, discusses the unique regulatory challenges in the energy sector, the importance of risk management, and how Ørsted addresses cybersecurity to ensure safe and reliable energy delivery.
As the Biden administration pours money into grid-enhancing technologies and announces a new federal-state initiative to modernize the U.S. electric grid, experts say security should be considered at every stage to avoid potentially creating even worse problems for the already-strained grid.
Durgesh Kalya, OT network security expert at Covestro LLC, emphasizes the need for robust incident management and life cycle upgrades for critical infrastructures. He shares insights on integrating the incident command system with industrial automation.
Australian critical infrastructure organizations must enable greater convergence between their information technology and operational technology teams to better respond to cybersecurity threats to their OT infrastructure, according to a new study by Palo Alto Networks.
Defenders of operational technology environments should look beyond the technical controls and incident response plans they've put in place. They also need to consider how attackers might undermine confidence in the service itself, says Ian Thornton-Trump, CISO of Cyjax.
Rockwell Automation warned customers to disconnect industrial control systems from the internet, citing escalating cyberthreats and rising global geopolitical tensions. Disconnecting these systems is a proactive measure to reduce the attack surface.
Chuck Markarian, CISO, PACCAR, and Jerry Cochran, deputy CIO, Pacific Northwest National Laboratory, discuss practical approaches to bolstering cyber resilience in manufacturing, including mitigating risks, enhancing preparedness and fostering collaboration across technical and nontechnical teams.
Edgard Capdevielle, president and CEO, Nozomi Networks, discusses how new SEC disclosure regulations are reshaping cybersecurity strategies in industrial organizations. He also shares insight on legacy OT systems, IT-OT convergence and the need for industry collaboration.
The widespread use of internet of things devices today presents challenges, as most of those devices are insecure. IoT devices are different from IT devices, but artificial intelligence can address IoT security challenges, said May Wang, CTO of IoT security at Palo Alto Networks.
While critical infrastructure operators have historically focused on securing their operational technology networks by preventing intrusions, the ongoing increase in nation-state attacks demands they master the ability to "identify, detect, respond and recover," said Robert M. Lee, CEO of Dragos.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.