Digital media reigned supreme in the first month of 2024, with a pair of podcasts and a video interview as our highest-performing content? Industrial Cybersecurity Pulse’s top 5 articles from January 2024 covered everything from SCADA security to IT/OT convergence to operational lifecycle management. Here is our top-performing content from the past month.
1. Podcast Ep. 40: Xavier Mesrobian on SCADA Security
By Gary Cohen and Tyler Wall, CFE Media and Technology
SCADA systems have evolved over the last 25 years. Today, more and more companies are talking about cloud-based SCADA. Given recent compromises, what steps should companies take to secure cloud-based SCADA? On this podcast, Xavier Mesrobian of Skkynet Cloud Systems discusses how you should manage the cloud when it comes to security. Sponsored by: Skkynet
2. Podcast Ep. 41: Itzik Kotler on the ABC’s of Cybersecurity
By Gary Cohen and Tyler Wall, CFE Media and Technology
Advancing technology has given the world multitudes of business improvements, but it also brings complexity, which opens up new vulnerabilities. How can you keep up your cyber hygiene so you’re prepared for the next inevitable cyberattack? On this podcast, Itzik Kotler of SafeBreach discusses
legacy systems, incident response and why cybersecurity is no longer the “department of no.”
3. eBook: IT/OT Convergence – Winter Edition
By CFE Media and Technology
Historically, information technology (IT) and operational technology (OT) have functioned independently in industrial manufacturing, but digital transformation and the industrial Internet of Things (IIoT) have made the relationship between the two sides closer than ever. In this new environment, IT and OT must work together to secure systems, protect information and ensure safety. This eBook includes stories on how SOC and SOAR standards can help protect OT, what the U.S. government can do to impact cyber risk and why the holidays are a merry time for hackers.
4. How frameworks can improve operational lifecycle management
By Gary Cohen, CFE Media and Technology
Creating a comprehensive security strategy for your business requires a basic understanding that IT and OT systems are inherently different. You may have a solid IT security program in place designed to manage and monitor your networks, but if you’re ignoring the operational side of the house, some of your most important assets are probably insecure. This is even more essential with the proliferation of IoT and as more legacy OT devices get connected. So how can you get your operational security up to snuff? We talked to Marty Wachi, product marketing manager for Moxa America’s industrial cybersecurity.
5. What you need to know about secure default configuration, insecure by design and secure by design
By Dale Peterson, Digital Bond
My initial impression of the U.S. Department of Energy’s Cyber Informed Engineering and CISA’s Secure by Design effort is they are well meaning, not wrong, and unlikely to make a difference in the next three years. I hope I’m wrong. For the operational technology (OT) and industrial control system (ICS) security world, we would be better off focusing on two areas where progress is achievable in the near term and would result in large cyber risk reduction.
Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.