Archive

All entries

Operational technology’s (OT) exposure to cyber threats extends beyond the confines of technical software and firmware vulnerabilities. The supply chain and insiders are two significant areas of concern, where risks can originate from third-party vendors or suppliers with inadequate cybersecurity measures or those inside the firewall with similarly privileged access.
Cyber Resilience
Operational Resilience

Mitigating Exposures the Key to Cyber Resilience

Dan Ricci
Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.
Operational Technology
Operational Resilience
Vulnerability Management

Architecting Safety Using Cybersecurity Requirements and Assessments

Don C. Weber
Operational Resilience

Nexus Podcast: Adam Gluck on Industrial DevOps

Michael Mimoso
Cyber Resilience
Operational Resilience
Risk Management

Think Like an Attacker: Be Frogger

John Frushour
The U.K.'s enhanced Cyber Assessment Framework is designed to help critical infrastructure organizations comprehensively assess and improve their ability to defend against, and respond to, cyberattacks.
Cyber Resilience
Operational Technology
Operational Resilience

UK Critical Infrastructure Sectors Brace for Enhanced Cyber Assessment Framework

George V. Hulme
Expert Dan Ricci explains how IT security and operational technology engineers and asset operators must collaborate to properly address risk within industrial environments.
Operational Technology
Risk Management
Operational Resilience

Three Ways to Foster Collaboration, Understanding Between IT, OT Security, Part 2

Dan Ricci
The U.S. Dept of Health and Human Services Cybersecurity Performance Goals sets expectations on healthcare delivery organizations to protect their data and technology environments.
Healthcare
Operational Resilience
Risk Management

What HHS's New Cybersecurity Performance Goals Mean to Healthcare Organizations

George V. Hulme
Understanding the nuances of OT cybersecurity vulnerabilities becomes imperative for IT cybersecurity teams to develop comprehensive defense strategies that safeguard both IT and OT environments.
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

What IT Cybersecurity Teams Need to Know about OT Vulnerabilities (Part 1)

Dan Ricci
In this episode of the Claroty Nexus podcast, Hormel Foods CISO and Director of Security and Compliance Mike Rogers explains that CISOs should understand their level of exposure in the event of a cybersecurity incident and proactively seek personal liability protection.
Risk Management
Food & Beverage
Operational Resilience

Nexus Podcast: Mike Rogers on CISO Exposure During Incidents

Michael Mimoso
Operational Technology
Vulnerability Management
Operational Resilience

OT Patch Management Truths

George V. Hulme
Food & Beverage
Operational Resilience

Michael Rogers on Managing Risk and Digital Transformation

Michael Rogers, CISO and Director of Information Security and Compliance, at Hormel explains how his role as a security leader has changed as digital…
Michael Mimoso
Operational Resilience

Michael MacKenzie on Digital Transformation Success Stories

AWS GM, Enterprise and Industrial IoT Michael MacKenzie explains the keys to being a digital transformation success story, including obtaining the necessary…
Michael Mimoso

Latest on Nexus Podcast