Archive

All entries

If we are indeed at the full outset of Industry 4.0, the fourth industrial revolution, initiatives such as smart manufacturing will not truly succeed without keen awareness of new cybersecurity risks introduced by IT/OT connectivity and advanced technologies.
Cyber Resilience
Internet of Things
Operational Resilience
Operational Technology

Smart Manufacturing Requires Proactive Cybersecurity

Jim LaBonty
On Nexus, former NSA Director Adm. Michael Rogers writes about the current legislative and personal liability changes that are impacting the CISO office. But Rogers urges security leaders to view these times as an opportunity to refine their business acumen and ensure cybersecurity is a priority across the enterprise.
Risk Management
Operational Resilience
Cyber Resilience

CISO Unrest is an Opportunity

ADM. Michael S. Rogers, USN (Ret.)
Operational technology’s (OT) exposure to cyber threats extends beyond the confines of technical software and firmware vulnerabilities. The supply chain and insiders are two significant areas of concern, where risks can originate from third-party vendors or suppliers with inadequate cybersecurity measures or those inside the firewall with similarly privileged access.
Cyber Resilience
Operational Resilience

Mitigating Exposures the Key to Cyber Resilience

Dan Ricci
Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.
Operational Technology
Operational Resilience
Vulnerability Management

Architecting Safety Using Cybersecurity Requirements and Assessments

Don C. Weber
Operational Resilience

Nexus Podcast: Adam Gluck on Industrial DevOps

Michael Mimoso
Cyber Resilience
Operational Resilience
Risk Management

Think Like an Attacker: Be Frogger

John Frushour
The U.K.'s enhanced Cyber Assessment Framework is designed to help critical infrastructure organizations comprehensively assess and improve their ability to defend against, and respond to, cyberattacks.
Cyber Resilience
Operational Technology
Operational Resilience

UK Critical Infrastructure Sectors Brace for Enhanced Cyber Assessment Framework

George V. Hulme
Expert Dan Ricci explains how IT security and operational technology engineers and asset operators must collaborate to properly address risk within industrial environments.
Operational Technology
Risk Management
Operational Resilience

Three Ways to Foster Collaboration, Understanding Between IT, OT Security, Part 2

Dan Ricci
The U.S. Dept of Health and Human Services Cybersecurity Performance Goals sets expectations on healthcare delivery organizations to protect their data and technology environments.
Healthcare
Operational Resilience
Risk Management

What HHS's New Cybersecurity Performance Goals Mean to Healthcare Organizations

George V. Hulme
Understanding the nuances of OT cybersecurity vulnerabilities becomes imperative for IT cybersecurity teams to develop comprehensive defense strategies that safeguard both IT and OT environments.
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

What IT Cybersecurity Teams Need to Know about OT Vulnerabilities (Part 1)

Dan Ricci
In this episode of the Claroty Nexus podcast, Hormel Foods CISO and Director of Security and Compliance Mike Rogers explains that CISOs should understand their level of exposure in the event of a cybersecurity incident and proactively seek personal liability protection.
Risk Management
Food & Beverage
Operational Resilience

Nexus Podcast: Mike Rogers on CISO Exposure During Incidents

Michael Mimoso
Operational Technology
Vulnerability Management
Operational Resilience

OT Patch Management Truths

George V. Hulme

Latest on Nexus Podcast