Archive

All entries

nexus25vid_carmakal.png
Cyber Resilience
Internet of Things
Operational Technology
Operational Resilience
Risk Management
Ransomware
Nexus Conference

Charles Carmakal on China's Cyber Threat to Critical Infrastructure

Charles Carmakal, Chief Technology Officer at Mandiant (Part of Google Cloud), explains how China-nexus threat actors such as Volt Typhoon, Salt Typhoon, and…
Michael Mimoso
The congressional delay in hammering out a federal budget has added another layer of pain to the ongoing crisis for the Cybersecurity and Infrastructure Security Agency (CISA). Not only are there funding concerns., but it's the expiration of critical information-sharing legislation and a regulatory compliance vacuum that has left enterprises unsure about their next steps.
Cyber Resilience
Operational Resilience
Risk Management
Internet of Things

Threat Intelligence Goes Dark, CISA Crisis Leaves Enterprise Security Blind

George V. Hulme
Building management systems (BMS) are centralized platforms that oversee a building’s mechanical, electrical, and environmental systems. Yet they are often overlooked with regard to an organization’s cybersecurity planning. Expert Dan Ricci explains why and provides six strategies for securing BMS.
Operational Resilience
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

The Overlooked Cyber Risk: Building Management Systems in Critical Infrastructure

Dan Ricci
Converged IT/OT operations often run into decision-making gridlock when it comes to exposure management and vulnerability management of OT. Without clearly established governance, organizations are experiencing prolonged periods of time exposed to attacks.
Cyber Resilience
Industrial
Operational Technology
Operational Resilience
Risk Management

Bridging the Divide: Overcoming Security Deadlocks in IT/OT Convergence

George V. Hulme
Adm. Michael S. Rogers, USN (Ret.) joins the Nexus podcast to discuss the Biden administration's National Cybersecurity Strategy, and its themes of cyber resilience and critical infrastructure protection.
Cyber Resilience
Healthcare
Industrial
Operational Resilience
Risk Management

Nexus Podcast: Adm. Michael Rogers on Deterrence in Cyberspace

Michael Mimoso
Threat intelligence for operational technology environments differs from traditional IT threat intelligence. OT threat intelligence requires contextual, situational awareness that identifies vulnerabilities and anomalies, and also which assets, and in what part of the process, are exposed. It must also note what the safety and operational consequences would be if exploited. This context enables security teams to prioritize risk mitigation according to real-world impact rather than theoretical severity.
Vulnerability Management
Risk Management
Operational Technology
Operational Resilience
Cyber Resilience

Why Traditional Threat Intelligence Falls Short For Operational Technology

George V. Hulme
black-hat-media-panel-1.jpeg
Cyber Resilience
Operational Resilience
Vulnerability Management
Risk Management

Panel: Nation-States Leveraging CPS to Damage Confidence in Resilience, Response

Michael Mimoso
nexus_labonty-manuf-and-cloud.jpg
Risk Management
Operational Resilience
Operational Technology
Cyber Resilience

Navigating Manufacturing Cybersecurity and the Cloud

Jim LaBonty
With Federal policy changes pushing more cybersecurity and AI regulation to the state level, CISOs should prepare for even more fragmentation of cybersecurity laws and more jurisdictions to contend with, writes Cristin Flynn Goodwin.
Risk Management
Cyber Resilience
Operational Resilience

50 States of Cybersecurity Complexity

Cristin Flynn Goodwin
The convergence of IT and OT systems, primarily driven by the deployment of IIoT (industrial Internet of Things), cloud computing, and the need for remote monitoring, has fundamentally altered the OT architecture that the Purdue Model was initially designed to help manage.
Zero Trust
Risk Management
Operational Resilience
Operational Technology

Is It Time to Rethink the Purdue Model?

George V. Hulme
Mike Ratliff, CISO at Providence, one of the country's largest not-for-profit healthcare providers, writes about his organization's attempt to re-think GRC as Governance, Risk, Attack Surface Management, and Compliance (GRAC). Ratliff describes five areas GRAC improves the overall security program, including the quantification and prioritization of risk, the integration of attack surface management, and an architecture that supports secure-by-design principles.
Healthcare
Risk Management
Cyber Resilience
Operational Resilience

Rebuilding Legacy GRC from the Ground Up

Mike Ratliff
ASL Roma 1’s HOPE (Healthcare Operational Protection & Excellence) project stands as a cutting-edge initiative in healthcare cybersecurity, leveraging advanced technologies and innovative methodologies to strengthen organizational resilience. Here we lay the foundation for explaining how our CMDB becomes a key tool for proactively managing vulnerabilities, especially during waves of CVEs (Common Vulnerabilities and Exposures) that can quickly disrupt complex environments.
Healthcare
Operational Resilience
Cyber Resilience
Vulnerability Management

ASL Roma 1’s HOPE: Innovation and Resilience to Vulnerability Waves

Stefano Scaramuzzino
Fabio Battelli
Latest on Nexus Podcast