Last month, as governments were increasingly directing their citizens to social distancing and self-isolation measures as a step towards reducing the spreading rate of the novel coronavirus, (CS)2AI conducted a flash poll to gauge our members’ perspectives on this unprecedented situation. Here’s what you told us:
The need for business to become more efficient by leveraging the data available in their manufacturing networks, already had us on a high-speed chase to connect those systems. Now with the current COVID-19 pandemic, manufacturers are racing to make those systems available remotely to support work-from-home for configuration and troubleshooting. So how do you keep systems secure when time is of the essence?
The CyberPatriot program is an established IT cyber security exemplifying one of the outreach efforts on the (CS)2AI projected developments board. We asked Andrew Hall to submit this article on his experience in order to provide some insight into the program for those (CS)2AI members not familiar with it, and also a greater understanding of our organizational objectives in this area.
SME Thoughts on Cybersecurity During a Pandemic Derek Harp, Founder of (CS)²AI sits down with subject matter experts Dr. Eric Cole: CEO of Secure Anchor Consulting; Rick Peters: CISO Operational Technology at Fortinet North America; Brad Raiford: Director Cyber Security KPMG; Paul Forney: Chief Security Architect at Schneider Electric; Andrew Ginter: VP Industrial Security at Waterfall; and John Cusimano: VP Industrial Security at aeSolutions; weigh in with thoughts and suggestions on how to stay safe during the current crisis.
5 Things the Hoodie & the Hard Hat Need to Know About Each Other
A key challenge to improving industrial cybersecurity is the different worlds IT and operations practitioners come from – specifically, the different strategic priorities in their respective areas, the different toolsets they are familiar with, and even the different vocabularies they use. To improve understanding of these different perspectives, this article, recently published in the cybersecurity journal Dark Reading, outlines five items IT and OT should know about and learn from one another. The authors draw on their deep expertise in both IT and OT to provide practical advice that all members should find helpful.