Former Defence CISO to government: Get the basics right on cyber security

CIO | February 18, 2019

Former Defence CISO to government: Get the basics right on cyber security
Former Department of Defence chief information security officer Lynwen Connick has called on the government to "get the basics right" around digital security in the wake of a cyber attack on the parliamentary computer network. The Department of Parliamentary Services earlier this month reset the passwords of MPs and staff after the Australian Cyber Security Centre (ACSC) identified what the Prime Minister Scott Morrison described as a “malicious intrusion" into the Australian Parliament House network. An investigation into the attack has led the ACSC to believe it was conducted by a "sophisticated state actor" that also penetrated the networks of the Liberal, Labor and National parties. Connick, who joined ANZ bank in 2017 as CISO from a role advising then prime minister Malcolm Turnbull on cyber security issues, told CIO Australia today that government should better communicate threats and improve it's basic cyber hygiene.

Spotlight

The prevailing trend in Industrial Automation and Control System (IACS) networking is the convergence of technology, specifically IACS operational technology (OT) with information technology (IT). Converged Plantwide Ethernet (CPwE) helps to enable IACS network and security technology and OT-IT persona convergence through the use of standard Ethernet, Internet Protocol (IP), network services, security services, and EtherNet/IP. A reliable and secure converged plant-wide IACS architecture helps to enable the Industrial Internet of Things (IIoT).

Spotlight

The prevailing trend in Industrial Automation and Control System (IACS) networking is the convergence of technology, specifically IACS operational technology (OT) with information technology (IT). Converged Plantwide Ethernet (CPwE) helps to enable IACS network and security technology and OT-IT persona convergence through the use of standard Ethernet, Internet Protocol (IP), network services, security services, and EtherNet/IP. A reliable and secure converged plant-wide IACS architecture helps to enable the Industrial Internet of Things (IIoT).

Related News

DATA SECURITY

Upstream Security Recognized by Frost & Sullivan for Its Contribution to the Automobile Industry

Upstream | August 12, 2021

Upstream Security, provider of a cloud-based mobility cybersecurity and data analytics platform, which is purpose-built for connected vehicles and smart mobility services, announced today that it was selected to receive the 2021 Europe Technology Innovation Leadership Award from leading research group Frost & Sullivan. Following a rigorous process of analysis, consisting of multiple vendor evaluations across various criteria, Frost & Sullivan acknowledged Upstream Security for its visionary outlook and outstanding achievements in developing growth strategies that effectively address new challenges and opportunities in the connected vehicle analytics and cybersecurity space. In its detailed report, Frost & Sullivan noted that Upstream's ability to leverage data, analytics, and cybersecurity technologies helps customers achieve best-in-class vehicle security, higher reliability, and substantial financial savings. Specifically, the following are some of Upstream's values highlighted in the report: ● Unparalleled cybersecurity: Equips original equipment manufacturers (OEMs) with a powerful combination of intrusion prevention and detection systems for automotive telematics protocols, coupled with machine learning algorithms accustomed to fleet and driver behavior. ● Vehicle Security Operations Center (VSOC) integration: Enables both automotive cybersecurity detection and additional non-cyber smart-mobility use cases for deep, contextually rich investigation of automotive related incidents. ● Regulatory compliance: Ensures compliance with UNECE WP.29 (R155). ● Full visibility and flexibility: Provides fleet-wide visibility through analytical tools and real-time actionable insights into fleet health and vehicle activities. ● User-friendly and customizable: Offers a dashboard with crucial insights that enable clients to identify cyber risks in real time, in addition to both pre-built and customizable security policies. Tonya Fowler, Global Research Vice President of Best Practices Recognition at Frost & Sullivan, summarized the company's key contributions to the industry: "Upstream Security has quickly developed an excellent reputation by developing an industry leading cloud-based centralized cybersecurity platform that enables clients to safeguard the technologies and applications of connected and autonomous vehicles via application of big data and Machine Learning." Oded Yarkoni, VP Marketing at Upstream Security, explained the visionary strategy that helped the company clinch this prestigious award: "With vehicles becoming more connected and autonomous, the automotive industry must continually evolve and outpace new risks previously only experienced by the IT industry. At the same time, there is a huge opportunity for car manufacturers, insurers, and the whole industry to better serve and protect drivers while improving operational excellence and financial performance. Upstream Security is at the forefront of this new world, enabling its customers to harness the wealth of information to deliver better results. "We are proud to be recognized for this leadership by Frost & Sullivan, and to continue our mission to become the provider of choice for cybersecurity and data analytics to the connected vehicle industry." More insights about the award selection process and Upstream Security's technology are detailed in the report published by Frost & Sullivan. About Upstream Security Upstream unlocks the value of mobility data through a purpose-built, cloud-based cybersecurity and data analytics platform. The Upstream platform and its pre-built and customizable applications leverage existing mobility data feeds for multiple use cases, including cybersecurity, predictive maintenance, insurance, business intelligence, data quality validation and more. Utilizing data normalization and cleansing; digital twin profiling; artificial intelligence (AI)-powered anomaly detection; and built-in mobility intelligence from AutoThreat® Intelligence, the industry's first mobility-specific threat intelligence and risk assessment solution, Upstream provides unparalleled cybersecurity and data-driven actionable insights that are readily available and seamlessly integrated into the customer's environment. Upstream is privately funded by Mitsui Sumitomo Insurance, Alliance Ventures (Renault, Nissan, and Mitsubishi), Volvo Group, Hyundai, Nationwide Insurance, Salesforce Ventures, CRV, Glilot Capital Partners, and Maniv Mobility. About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, collaborates with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today's market participants. For more than 50 years, Frost & Sullivan has been developing growth strategies for the Global 1000, emerging businesses, the public sector, and the investment community.

Read More

DATA SECURITY

Honeywell to Introduce Advanced Incident Response and Monitoring Service for Improving OT Cybersecurity and Operation

Honeywell | June 14, 2021

A global leader in industrial cybersecurity, Honeywell (NASDAQ: HON), has announced the introduction of the Honeywell Advanced Monitoring and Incident Response (AMIR) service. It provides rapid response for emerging and current cyber threats and 24/7 operational technology (OT) cybersecurity detection. AMIR is a easy to deploy, cost-effective, scalable cybersecurity service that is customized to help OT and IT security teams that is struggling to cope up with the emerging cyber threats that mainly target industrial operational technology networks and control systems (ICS), which happens due to budget constraints and lack of expertise. AMIR comes as part of Honeywell Forge Managed Security Services (MSS). MSS is an an end-to-end security as a service solution that helps protect control systems, operations, and OT environments. By "hunting" for various anomalous behaviors, including both emerging and known cybersecurity threats, AMIR constantly screens OT environments. It examines indicators of compromise and signals operators to possible problems before major damage can happen. Using proprietary technology, AMIR correlates, collects, prioritizes, and analyzes security proceedings and log data from numerous sources, giving a complete approach to better lessen cyber risk and maintain cybersecurity compliance. The offerings of the AMIR are already being installed at many sites globally to help companies increase their maturity of cybersecurity. AMIR is combined with the bigger Honeywell Forge Cybersecurity portfolio intended to help further support cyber defenses for functioning surroundings. About Honeywell A Fortune 100 technology company, Honeywell delivers industry specific solutions such as control technologies for buildings and industry, aerospace products and services, and performance materials globally. Technologies of Honeywell help buildings, aircraft, manufacturing plants, and supply chains.

Read More

Keysight Technologies Earns Security New Certifications to strengthen Network Visibility and Security

Keysight Technologies | August 17, 2020

Keysight Technologies, Inc., a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced that the company has earned new security certifications for its full Vision portfolio of network packet brokers (NPB) which enable Federal and Regulated industries to strengthen network visibility and security. Cybersecurity has become a critical component of government and industry systems as societies reliance on a digital infrastructure continues to escalate. These security certifications allow Keysight to provide government agencies with advanced network visibility for protecting systems, networks and programs from digital attacks. Cyberattacks are usually aimed at accessing, changing or destroying sensitive information; extorting money from users; or interrupting normal business processes.

Read More