
John Livingston
Articles
Respond to growing OT vulnerabilities with endpoint systems management
A recent cybersecurity advisory alert details the Top 15 Common OT Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.
Adapting XDR for OT cybersecurity
These five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.
Five principles for guiding OT cybersecurity governance
Five principles to establish the right operational technology (OT) cybersecurity governance model for an industrial organization can create a more secure environment.
Lack of qualified cybersecurity personnel for wastewater facilities
Many water, wastewater, and other critical infrastructure organizations lack OT personnel skilled in cybersecurity and this could be dangerous when facing ransomware attacks such as BlackMatter
Reducing risk and responding to industrial environment threats
Many industrial organizations want “visibility” or “detection” but aren’t clear on the ultimate objective or how to measure it.
Five steps for OT endpoint security success
Organizations need endpoint security and protection to stop ransomware in its tracks, but also to demonstrate improvement and secure baselines to various stakeholders.
Reducing risk and responding to threats in industrial environments
Know the overall objectives of operational technology (OT) cybersecurity and to ensure progress against risk reduction and threat response. Three steps for reducing risk and threat response are highlighted.
Four key steps to help your organization achieve IT-OT convergence
IT and OT teams often seem like they're in different worlds. To bring true IT security into the OT environment, here are four key steps to help organizations create IT-OT convergence.
Managing the costs of OT cyber insurance
Cybersecurity insurance is a major aspect of risk management for many companies as attacks against operational technology increase. Four safeguards against ransomware are highlighted.
Companies need to reassess their cyber-physical security risk
Chief financial officers (CFOs) and audit committees need to have a radical reimagining of what cyber-physical security risk means for their organizations.
Benefits of a multifunction platform for IT/OT security in the age of CMMC
As the Cybersecurity Maturity Model Certification (CMMC) rolls out, it’s important for manufacturing companies to think more broadly than just CMMC.
The importance of ICS security
Industrial control system (ICS) cybersecurity is growing in importance as cyber attacks increase and there are some basic tenets companies can follow in their journey.
Benefits of OT system management for cybersecurity plans
Operational technology (OT) systems and networks needs to adopt the core elements of information technology system management (ITSM).
What OSHA can teach us about cybersecurity
Many of the lessons and changes applied to manufacturing after the Occupational Safety and Health Act of 1970 can be applied to the growing challenge manufacturers face with industrial cybersecurity. Three keys to improving cybersecurity are highlighted.
How COVID-19 is affecting manufacturing cybersecurity
Forward-looking organizations realize they need the same level of aggressiveness to protect assets as they have done for COVID-19 risk reduction. A three-pronged strategy on securing essential infrastructure is highlighted.