Cybersecurity Leadership
21.0K views | +0 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Regulators are coming for IoT device security

Regulators are coming for IoT device security | Cybersecurity Leadership | Scoop.it

Up to now, the IoT industry has relied mainly on security by obscurity and the results have been predictable

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Protecting Critical Infrastructure Means Getting Back to Basics

Protecting Critical Infrastructure Means Getting Back to Basics | Cybersecurity Leadership | Scoop.it
Critical infrastructure organizations need to recognize that the technology and cybersecurity landscapes have changed.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Ransomware, Data Breaches Inundate OT & Industrial Sector

Ransomware, Data Breaches Inundate OT & Industrial Sector | Cybersecurity Leadership | Scoop.it
Because of the criticality of remaining operational, industrial companies and utilities are far more likely to pay, attracting even more threat groups and a focus on OT systems.
Scooped by JC Gaillard
Scoop.it!

Every Network Is Now an OT Network. Can Your Security Keep Up?

Every Network Is Now an OT Network. Can Your Security Keep Up? | Cybersecurity Leadership | Scoop.it
If you’ve been putting off redesigning your IT-OT security systems, now is the time to make it a priority.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How can manufacturers stop being the top target for cyber crime?

How can manufacturers stop being the top target for cyber crime? | Cybersecurity Leadership | Scoop.it

Historically, the financial services sector has been the most attacked by cybercriminals. Still, in 2021 there was a substantial shift, and a different industry ranked at the top for the first time – the manufacturing industry.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 Things CISOs Need to Know About Securing OT Environments

5 Things CISOs Need to Know About Securing OT Environments | Cybersecurity Leadership | Scoop.it
Traditional focus on IT security has left operational technology (OT) vulnerable. New report reveals organizations turning to CISOs for OT security.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Combatting Growing Cyber Threats to Critical Infrastructure

Combatting Growing Cyber Threats to Critical Infrastructure | Cybersecurity Leadership | Scoop.it

Cybersecurity in OT continues to lag behind IT security in terms of maturity and focus.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How We Will Win the Cyber-Physical Battle for OT Security

How We Will Win the Cyber-Physical Battle for OT Security | Cybersecurity Leadership | Scoop.it

When industrial environments integrated connected systems into their assets, attack surfaces are expanded, opening once-closed critical infrastructure sites and the companies that manage them to attacks from threat actors.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Who Owns OT Cybersecurity?

Who Owns OT Cybersecurity? | Cybersecurity Leadership | Scoop.it

As a result of this shift from the IT to OT landscape, the C-suite must educate themselves and drive change into the organization to ensure a robust cybersecurity program is in place that addresses OT separately from IT.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Are embedded devices the next ransomware target?

Are embedded devices the next ransomware target? | Cybersecurity Leadership | Scoop.it

Operational technology (OT) networks control the devices critical to the continued operations of production lines, power plants, and energy supplies, and as such are typically segmented from a company’s internet-facing IT networks to better isolate critical hardware from cyberattacks. Now security researchers are warning of the risks posed by the embedded devices that sit on those OT networks.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The top 5 cybersecurity threats to OT security

The top 5 cybersecurity threats to OT security | Cybersecurity Leadership | Scoop.it

What keeps OT security specialists up at night? It’s mostly problems from the IT world, says Andy Norton, European Cyber Risk Officer at Armis.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Managing the Cyber-Physical Security Risks to Critical Infrastructure and Healthcare

Managing the Cyber-Physical Security Risks to Critical Infrastructure and Healthcare | Cybersecurity Leadership | Scoop.it

The critical infrastructure and healthcare industries are key targets for cyberattacks because of their extensive use of cyber-physical systems. Here are best practices for cyber-physical security.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Critical infrastructure companies and the global cybersecurity threat

Critical infrastructure companies and the global cybersecurity threat | Cybersecurity Leadership | Scoop.it
How the energy, mining, and materials industries can meet the unique challenges of operational technology cybersecurity.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Critical infrastructure attacks aren’t all the same: Why it matters to CISOs

Critical infrastructure attacks aren’t all the same: Why it matters to CISOs | Cybersecurity Leadership | Scoop.it
Recent warnings about advanced persistent threats from China against critical infrastructure suggest a shift in goals, but other nation-state adversaries have their own agendas.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Unlocking Cyber Resilience in Industrial Environments: Five Principles

Unlocking Cyber Resilience in Industrial Environments: Five Principles | Cybersecurity Leadership | Scoop.it
How to ensure cybersecurity in the operational technology environment, at a time of increasing digitalization and convergence of the OT and IT environments.
Scooped by JC Gaillard
Scoop.it!

How to Manage the Rising Cost of OT Cyber Insurance

How to Manage the Rising Cost of OT Cyber Insurance | Cybersecurity Leadership | Scoop.it
Here’s how OT cybersecurity practitioners should protect their industrial environments to improve security posture and meet insurance coverage requirements.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Rising OT/ICS cybersecurity incidents reveal alarming trend

Rising OT/ICS cybersecurity incidents reveal alarming trend | Cybersecurity Leadership | Scoop.it
OT/ICS cybersecurity incidents are increasing in volume and frequency, and are targeting critical infrastructure, such as energy producers.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Hiding in plain sight: The risks posed by OT systems and how to secure them

Hiding in plain sight: The risks posed by OT systems and how to secure them | Cybersecurity Leadership | Scoop.it
While securing OT systems can seem overwhelming…the task is not impossible. The power of attack surface management provides the technology needed to lock down assets in your organization.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Five ways to keep industrial control systems safe from cyberattacks

Five ways to keep industrial control systems safe from cyberattacks | Cybersecurity Leadership | Scoop.it

Innovation in Industrial Control Systems (ICS) may well be helping businesses get the best from their data, but it’s also helping cyber attackers see new ways to attack these critical systems.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The increasing impact of ransomware on operational technology

The increasing impact of ransomware on operational technology | Cybersecurity Leadership | Scoop.it
Dragos research has found a surge in ransomware attacks on operational technology, disproving that such threats only target IT
No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 security musts for industrial control systems

5 security musts for industrial control systems | Cybersecurity Leadership | Scoop.it
OT involves a collection of dedicated systems and physics, and that creates distinct security requirements, said Robert M. Lee, CEO and co-founder at Dragos.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why the energy sector's latest cyberattack in Europe matters

Why the energy sector's latest cyberattack in Europe matters | Cybersecurity Leadership | Scoop.it
A cyberattack on Amsterdam-Rotterdam-Antwerp (ARA) will have cascading effects across Europe and shows collaboration is needed to challenge future attacks.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Report says cybersecurity is top priority for operational tech systems

Report says cybersecurity is top priority for operational tech systems | Cybersecurity Leadership | Scoop.it
According to a report released by Honeywell, 71% of surveyed facility managers in the US, Germany, and China consider OT cybersecurity a concern or worry
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Ransomware and Returning to the Basics of Cybersecurity

Ransomware and Returning to the Basics of Cybersecurity | Cybersecurity Leadership | Scoop.it

Far from sensationalizing ransomware attacks, our response should be to return to the basics of cybersecurity. This requires a converged IT-OT security strategy to limit damage and protect valuable assets.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Is OT Cybersecurity Better Bolted-On or Designed-In?

Is OT Cybersecurity Better Bolted-On or Designed-In? | Cybersecurity Leadership | Scoop.it

A cybersecurity solution in business IT, often requiring the use of active components and intrusive techniques, may be highly unsuitable for industrial systems and networks. Not only will it fail to recognize specific industrial protocols and interactions.

No comment yet.