Courtesy: Verve Industrial Protection

John Livingston

John Livingston leads Verve Industrial's mission to protect the world’s infrastructure. He brings 20+ years of experience from McKinsey & Co., advising large companies in strategy and operations. Recognizing the challenges of greater industrial connectivity, John joined Verve Industrial to help companies find the lowest cost and simplest solutions to their controls, data and ICS security challenges.

Articles

Hardening acts by remediating known vulnerabilities, by positioning the system to reject certain classes of attack, and by documenting system activities. Courtesy: Maverick Technologies
System Integration August 3, 2022

Respond to growing OT vulnerabilities with endpoint systems management

A recent cybersecurity advisory alert details the Top 15 Common OT Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.

By John Livingston
Courtesy: Brett Sayles
Cybersecurity April 26, 2022

Adapting XDR for OT cybersecurity

These five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.

By John Livingston
Courtesy: Brett Sayles
Cybersecurity February 11, 2022

Five principles for guiding OT cybersecurity governance

Five principles to establish the right operational technology (OT) cybersecurity governance model for an industrial organization can create a more secure environment.

By John Livingston
Courtesy: Control Engineering, CFE Media and Technology, www.controleng.com 
Cybersecurity February 4, 2022

Lack of qualified cybersecurity personnel for wastewater facilities

Many water, wastewater, and other critical infrastructure organizations lack OT personnel skilled in cybersecurity and this could be dangerous when facing ransomware attacks such as BlackMatter

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity January 27, 2022

Reducing risk and responding to industrial environment threats

Many industrial organizations want “visibility” or “detection” but aren’t clear on the ultimate objective or how to measure it.

By John Livingston
Courtesy: Brett Sayles
Cybersecurity January 20, 2022

Five steps for OT endpoint security success

Organizations need endpoint security and protection to stop ransomware in its tracks, but also to demonstrate improvement and secure baselines to various stakeholders.

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity October 20, 2021

Reducing risk and responding to threats in industrial environments

Know the overall objectives of operational technology (OT) cybersecurity and to ensure progress against risk reduction and threat response. Three steps for reducing risk and threat response are highlighted.

By John Livingston
Cybersecurity September 3, 2021

Four key steps to help your organization achieve IT-OT convergence

IT and OT teams often seem like they're in different worlds. To bring true IT security into the OT environment, here are four key steps to help organizations create IT-OT convergence.

By John Livingston
Cybersecurity September 3, 2021

Four key steps to help your organization achieve IT-OT convergence

IT and OT teams often seem like they're in different worlds. To bring true IT security into the OT environment, here are four key steps to help organizations create IT-OT convergence.

By John Livingston
Cybersecurity September 3, 2021

Four key steps to help your organization achieve IT-OT convergence

IT and OT teams often seem like they're in different worlds. To bring true IT security into the OT environment, here are four key steps to help organizations create IT-OT convergence.

By John Livingston
All Articles