John Livingston
5 steps for successful OT endpoint cybersecurity risk management
· Cybersecurity

5 steps for successful OT endpoint cybersecurity risk management

Operational Technology (OT) has become a heightened target for cybersecurity attacks. The need to address OT (operational technology) cyber risks has never been greater. New threats are emerging every day – both targeted as well as untargeted collateral damage risks. According to IBM, the manufacturing and energy sectors are now the second and third most […]

Read more →
3 Steps to Reduce Risk and Respond to Threats in Industrial Environments
· Cybersecurity

3 Steps to Reduce Risk and Respond to Threats in Industrial Environments

Industrial cyber security leaders – including the C-suite, CISOs, security teams, and operational leaders – are increasingly realizing the potential financial, operational and safety impact of cyber events. Attempting to get their hands around securing this challenging part of their networks, many leaders have kicked off efforts by separating their IT and OT networks, gaining […]

Read more →
How to Get Started with Vulnerability Management in OT Cyber Security
· Cybersecurity

How to Get Started with Vulnerability Management in OT Cyber Security

Vulnerability Management in OT or ICS cyber security is a challenge, but with an actionable strategy and existing IT/ OT cyber security tools, we can make a significant difference. What is OT/ICS vulnerability management? Vulnerability management in OT/ICS security is the process of identifying, evaluating, treating and monitoring/reporting on software insecurities and misconfigurations of endpoints. […]

Read more →