Here’s a summary of an in-depth article published yesterday by Scott Shane, Nicole Perloth, and David Sanger of the New York Times.
It’s clear from recent news that a number of adversaries are attempting to compromise our critical industrial networks. That’s why CyberX has prepared a data-driven analysis of vulnerabilities in real-world OT networks after analyzing 375 real-world industrial control networks via Network Traffic Analysis (NTA), across multiple industrial sectors in the US, EMEA and APAC.
It’s one thing to mandate industrial cybersecurity by edict; it’s quite another to create a culture that makes everyone prioritize cybersecurity in their routine actions. It starts with educating all employees – from plant managers to control engineers, SCADA managers, and field employees — that the risk is real and it can have a devastating impact on your ability to service customers, and ultimately, on everyone’s livelihoods.
Join Mike Assante, SANS Director of Critical Infrastructure & ICS — described in Wired as “one of the most respected experts in the world” when it comes to cyber and power grids — as he discusses new ICS/SCADA attack vectors including:
• WannaCry & Petya ransomware
• Cyber-espionage targeting corporate IP
In 2012, General Keith Alexander, who was NSA Director and commander of U.S. Cyber Command at the time, assessed the financial value of cyberespionage losses at about $338 billion a year, including intellectual property losses and downtime due to cyberattacks. He called it “the greatest transfer of wealth in history.”
Bruce Schneier recently published an article (or more accurately, at nearly 6,000 words, a manifesto) entitled Security and the Internet of Things. It’s an incredibly insightful and well-thought-out case for why government needs to get involved to regulate the security aspects of the Internet. This article summarizes some of his key points, but if you […]