NIST Recommendations for ICS & IIoT Security

SANS

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency Report (NISTIR) demonstrating how off-the-shelf, ICS-aware behavioral anomaly detection (BAD) effectively reduces cyber risk for manufacturing organizations, without impacting OT networks, as well as risk from equipment malfunctions.
Watch Now

Spotlight

"Without question, your network is more complex than ever before. Your employees
are accessing any application they want, using work or personal devices. Often
times, these applications span both personal and work related usage, but the
business and security risks are often ignored. New prospective employees are
asking about application usage policies before accepting their new job. Adding yet
another layer of complexity is the underlying concern around the effectiveness of
your cybersecurity posture. Is your business a target? Is it a question of when, as
opposed to if? And are you as prepared as you could be? The complexity of your
network and your security infrastructure may limit or slow your ability to respond
to these and other cybersecurity challenges. "

OTHER ON-DEMAND WEBINARS

Breach Detection: Why SPOTTING a Breach is More Important than STOPPING it

activereach

In the current threat landscape, most businesses now recognise that it is only a matter of time before they are breached. This shift in philosophy from the idea of preventing every intrusion to realising that intrusions will happen is an important milestone. Sadly, hackers can hide in your network for days, weeks or months without your knowledge. UK businesses, especially SMBs, need to get smarter in their approach to detecting intrusions and limiting their impact.
Watch Now

Focus on Open Source Compliance and Security During Legal TransactionsEnable Ginger

Data points to the fact that companies have difficulty managing third-party open source within their software code bases, leading to compliance, IP, and security risk. These risks are often amplified in legal transactions and can impact “go”/”no go” decisions if not addressed throughout the legal process. Join Leon Schwartz, Ass
Watch Now

Overcoming Cloud & Security Challenges

Synoptek

74% of Healthcare organizations report leveraging the Cloud to achieve financial savings and operational efficiencies. However, recent findings show over 60% of these organizations are experiencing Cloud adoption challenges and Security anxiety. It is essential for Healthcare organizations to overcome these challenges as there is a much larger digital transformational trend ahead, where Cloud will become a crucial component of patient care innovation. Join Healthcare IT veterans from Microsoft & Synoptek, as they discuss the future of Cloud for Healthcare and best practices to help you overcome Cloud challenges and achieve higher levels of operational efficiency, security, and HIPAA compliance in the Cloud.
Watch Now

Reduce API Security Risks with Automated and Continuous API Scanning

Digital businesses have widespread API usage that makes it easier for organizations to share data and integrate with customer applications. However, since APIs expose application logic and sensitive data such as Personally Identifiable Information (PII), APIs have increasingly become a target for attackers leading to many serious data breaches in recent past. Gartner estimates that by 2022, API abuse will become the most-frequent attack vector, resulting in data breaches for many organizations.
Watch Now

Spotlight

"Without question, your network is more complex than ever before. Your employees
are accessing any application they want, using work or personal devices. Often
times, these applications span both personal and work related usage, but the
business and security risks are often ignored. New prospective employees are
asking about application usage policies before accepting their new job. Adding yet
another layer of complexity is the underlying concern around the effectiveness of
your cybersecurity posture. Is your business a target? Is it a question of when, as
opposed to if? And are you as prepared as you could be? The complexity of your
network and your security infrastructure may limit or slow your ability to respond
to these and other cybersecurity challenges. "

resources