Archive

All entries

Adm. Michael S. Rogers, USN (Ret.) joins the Nexus podcast to discuss the Biden administration's National Cybersecurity Strategy, and its themes of cyber resilience and critical infrastructure protection.
Cyber Resilience
Risk Management

Nexus Podcast: Adm. Michael Rogers on Geopolitics and Defending Critical Infrastructure

Michael Mimoso
Operational technology’s (OT) exposure to cyber threats extends beyond the confines of technical software and firmware vulnerabilities. The supply chain and insiders are two significant areas of concern, where risks can originate from third-party vendors or suppliers with inadequate cybersecurity measures or those inside the firewall with similarly privileged access.
Cyber Resilience
Operational Resilience

Mitigating Exposures the Key to Cyber Resilience

Dan Ricci
Cybersecurity experts are cautious about the new National Security Memorandum (NSM), which replaces the decade-old Presidential Policy Directive. Proponents say, will help strengthen the security of critical infrastructure within the United States, but because it's short on prescriptive details, security experts are unsure of the path forward.
Cyber Resilience
Risk Management

White House Signs Critical Infrastructure Memorandum, Details Remain Unclear

George V. Hulme
Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.
Operational Technology
Operational Resilience
Vulnerability Management

Architecting Safety Using Cybersecurity Requirements and Assessments

Don C. Weber
OT and ICS asset owners must consider non-traditional OT exposures beyond software vulnerabilities—a comprehensive exposure management approach to risk reduction—to understand the multifaceted challenges and the proactive measures necessary to safeguard critical infrastructure.
Cyber Resilience
Operational Technology
Risk Management

Operational Technology Exposure: Beyond Software Vulnerabilities

Dan Ricci
In this episode of the Claroty Nexus Podcast, Istari Chief Technology Officer and Head of Advisory Abel Archundia joins to discuss the implications of complexity within critical infrastructure. Companies struggle with technical debt and are largely accumulated assets that are still part and parcel of their core businesses, and challenge their ability to proactively secure them and manage risk.
Risk Management
Healthcare

Nexus Podcast: Abel Archundia on Complexity in Critical Infrastructure

Michael Mimoso
Operational Resilience

Nexus Podcast: Adam Gluck on Industrial DevOps

Michael Mimoso
The Change Healthcare cyberattack has spurred the proposal of new legislation from Sen. Mark Warner to demand minimum cybersecurity standards of hospitals and healthcare delivery organizations, or face financial penalties.
Healthcare

Change Healthcare Attack May Spur New Cybersecurity Laws

George V. Hulme
The UK's National Cyber Security Centre (NCSC) reacts to growing cloud implementations for operational technology, SCADA, and industrial control systems. The shift to cloud computing has caused the NCSC to be concerned that organizations aren't properly managing the new connectivity, including security boundaries and access control mechanisms.
Risk Management
Cyber Resilience
Operational Technology

UK NCSC Urges OT/ICS Operators to Secure Cloud Migrations

George V. Hulme
Healthcare
Cyber Resilience
Vulnerability Management

Nexus Podcast: Greg Garcia on the Change Healthcare Cyberattack

Michael Mimoso
Healthcare
Vulnerability Management
Risk Management

FDA Sets Sights on Medical Device Vulnerability Management

George V. Hulme
Cyber Resilience
Operational Resilience
Risk Management

Think Like an Attacker: Be Frogger

John Frushour

Latest on Nexus Podcast