Cybersecurity Blog: The Cyber Scene is evolving, are you?

2016 was another challenging year in cybersecurity. With greater awareness among organizations and the general public of the risks, and sizable investments by companies in best-of-breed security technologies, will we see improvements in 2017?

Read more

Leidos team contributes to Industry Collaboration at BAI Payments Connect in San Diego

In a recent article, The Guardian reported that Bangladesh’s central bank governor, Atiur Rahman, resigned after $81m (£75m) was stolen from the bank’s account at the Federal Reserve Bank of New York in one of the largest cyber-heists in history.

Read more

Why the Financial Services Industry Needs More Than Technology to Defend Against Cyberattacks

Increasingly, businesses of all sizes in every industry have grown more concerned about cybersecurity, but none more so than the financial services sector. According to the 2015 Travelers Business Risk Index, 80 percent of leaders in the banking and financial services sector cite cyber risks as their top concern, overshadowing compliance, legal, and economic concerns.1  (Figure Source: 2015 Travelers Business Risk Index)

Read more

If you aren’t using firewalls right now,
get up and go get some!”

Last month at the Schneider Electric TEC user conference, our Industrial Control System (ICS) expert, Mike Dugent, presented a session entitled: ICS Cybersecurity, Lessons from the Field. In it, he told a crowd of ICS engineers and executives, what they already knew; that they must move up the cybersecurity maturity curve to defeat the advanced persistent threats (APT) targeting their organizations’ critical infrastructure assets. The audience was a who’s-who of leading oil and gas companies, power producers, pipeline operators and others, and they nodded as Mike recognized the challenge these companies face to “catch up” with other industries to mature their cybersecurity posture.

Read more

Last month we sponsored the webcast “Diving deeper into the details of nuclear power security”, hosted by Intelligent Utility. The webcast features two speakers, well-respected within the nuclear energy community, William Gross, Sr. Project Manager, Engineering, Nuclear Energy Institute, and Matt Gibson, Senior Technical Leader, Plant Technology Nuclear Sector, EPRI. This blog will concentrate on William Gross’s piece in the webcast, focusing on Design Basis Threats, the first step in the NRC Cyber Security Framework.

Read more

We had the pleasure of sponsoring the webcast “Cybersecurity and Infrastructure Protection: What You Need to Know to Keep Your Hydro Facility Safe”, hosted by Hydro Review. The webcast features four authoritative speakers including Dr. Smart Ocholi, Andrew Dressel, John Holbrook, and Matthew Neely. This blog reviews content discussed during John Holbrook’s portion of the webcast on how to integrate cybersecurity using a Physical Security Perimeter.

Read more

This year’s Critical Asset Summit took place in Houston, Texas which is appropriate given the topical agenda germane to the threats facing Oil & Gas process control professionals. It was fitting to leverage this event to continue socializing our unified IT and OT cyber security capabilities specifically for the Oil & Gas process control space.
...coming together not only to address the continuing cyber threats and set precautions framework, but most importantly to provide necessary tools, insights and methodological steps in constructing a successful secure policy."

Read more

Primary objectives of hydroelectric control systems operators include ensuring operational stability and simplifying the task of meeting federal security and compliance requirements.

What's standing in their way? We've compiled a list of 10 major concerns facing operators in assuring the operational stability of all water management assets, as well as compliance with Federal Energy Regulatory Commission and NERC standards. These challenges can be broadly grouped into three major areas:

  • Business Practices
  • Infrastructure Management
  • Policy Considerations

Read more

Defining Cyber Concerns at 2014 ICS Cyber Security Conference

Joe Weiss has been beating the ICS Cyber Security drum for the past 12 years. Once again he summoned global critical infrastructure control systems engineers and asset owners working in operations management or in IT to join him for an annual conference. During the opening keynote Weiss articulated three challenges to achieving ICS cyber security in the context of collaborating with enterprise IT professionals.

Read more