01.05.2022 Views

Cyber Defense eMagazine May Edition for 2022

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

understand the control system processes, the engineering, industrial protocols, safety factors,<br />

and ICS-specific cyber threats and maintain response plans that fit their organization.<br />

• Employ an active cyber defense cycle (ACDC) whereby they can secure, maintain, monitor <strong>for</strong><br />

and respond to threats. This repeatable process is driven by human cyber defenders who have<br />

both the necessary engineering knowledge of the OT environment and a background in<br />

cybersecurity defense. An active defense keeps security personnel engaged in identifying<br />

vulnerabilities and takes a more proactive than reactive approach with the focus on understanding<br />

not just the last attack but looking ahead to the next one.<br />

• Bring in a third-party organization to aid in identifying vulnerabilities, setting up a robust security<br />

program, and advising on maintaining OT protection moving <strong>for</strong>ward. These experts can provide<br />

support <strong>for</strong> companies as they make key hires and set up an in-house cybersecurity program.<br />

<strong>Cyber</strong>security now or <strong>for</strong>ever hold your peace<br />

OT environments are still playing catch up in terms of cybersecurity as 45% of survey participants<br />

estimate threats to their control systems are at high risk. And they’re right. The effect on operations,<br />

human safety and the environment could all prove costly when OT systems are exploited.<br />

Many companies are not prepared <strong>for</strong> the potential onslaught of attacks that could be headed their way.<br />

While many are coming around to the necessities of building a more robust cybersecurity program <strong>for</strong><br />

their OT environments, they are fighting an uphill battle to prepare <strong>for</strong> these attacks. Threat actors are<br />

actively plotting their next OT/ICS attack, looking to disrupt critical infrastructure either <strong>for</strong> profit or political<br />

gain. Without a proper plan <strong>for</strong> how to identify, respond to and recover from an attack be<strong>for</strong>e the attack<br />

occurs, organizations could find themselves in costly and dangerous situations.<br />

About the Author<br />

Ian Bramson is Global Head of Industrial <strong>Cyber</strong>security at ABS<br />

Group and a recognized leader in the emerging threat landscape<br />

of attacks on industrial operations and critical infrastructure. With<br />

more than 20 years of experience in cybersecurity and technology,<br />

Ian works directly with executives in the energy, industrial and<br />

maritime sectors to help minimize their cybersecurity risks. Ian can<br />

be reached online through his LinkedIn page at<br />

https://www.linkedin.com/in/ianbramson/ and at our company<br />

website https://www.abs-group.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!