If you need to know what the pulse of the European cybersecurity community is, where do you go? Like most of us, you turn to Black Hat and Dark Reading. This November, Black Hat issued a new report, The Cyberthreat in Europe, based on survey responses from 127 Black Hat Europe attendees.
Here’s a summary of an in-depth article published yesterday by Scott Shane, Nicole Perloth, and David Sanger of the New York Times.
It’s clear from recent news that a number of adversaries are attempting to compromise our critical industrial networks. That’s why CyberX has prepared a data-driven analysis of vulnerabilities in real-world OT networks after analyzing 375 real-world industrial control networks via Network Traffic Analysis (NTA), across multiple industrial sectors in the US, EMEA and APAC.
It’s one thing to mandate industrial cybersecurity by edict; it’s quite another to create a culture that makes everyone prioritize cybersecurity in their routine actions. It starts with educating all employees – from plant managers to control engineers, SCADA managers, and field employees — that the risk is real and it can have a devastating impact on your ability to service customers, and ultimately, on everyone’s livelihoods.
In 2012, General Keith Alexander, who was NSA Director and commander of U.S. Cyber Command at the time, assessed the financial value of cyberespionage losses at about $338 billion a year, including intellectual property losses and downtime due to cyberattacks. He called it “the greatest transfer of wealth in history.”