Protecting OT Networks and Safeguarding Critical Operations

October is National Cybersecurity Awareness Month (NCSAM). The annual collaborative effort between government and industry aims to raise awareness about the importance of cybersecurity and ensure all have the resource to be safe and secure.

Led by the United States’ Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), this year’s theme—Do your part. #BeCyberSmart— encourages individuals and organizations to own their role in protecting their part of cyberspace, stressing personal accountability, and the importance of taking proactive steps to enhance cybersecurity. At Mission Secure, cybersecurity is what we do. In support of NCSAM 2020, we’ve put together short “Interview Bytes” to discuss cybersecurity from an operational technology (OT) and industrial control system (ICS) perspective.


Interview Bytes |Week 4: The Future of Connected Devices.

NCSAM 2020 Video 4


“It’s just a crazy attack surface and exploits. It’s ‘an ounce of prevention is worth a pound of cure’ type situation.”

Autonomous vehicles, drone delivery, smart cities, AI, and machine-learning—the outlook of connected devices and a more interconnected existence look nearly certain. But how can we achieve new technological heights while staying secure?

As operations across industries digitally transform, they leave critical operational technology (OT) networks exposed. In the final segment in our National Cybersecurity Awareness Month series, Ed Suhler, VP of Defense Services, Mark Baggett, VP of Industrial Control Systems, and Weston Hecker, Ethical Hacker, share their words of advice for protecting critical operations today and into the future.

Question: What are some words of advice to protect critical operations from cyber threats?

From a Defense Perspective | Ed Suhler, VP of Defense Services: Don’t rely on outdated ways of thinking about cybersecurity to protect you. Air-gapping doesn’t work anymore. And make sure that the critical things you make sure work in your environment will work (Read more...)

*** This is a Security Bloggers Network syndicated blog from The Mission Secure Blog authored by Mission Secure. Read the original post at: