Remove Education Remove InfoSec Remove Risk Remove Technology
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 52
article thumbnail

Why Is Shadow IT a Growing Cybersecurity Risk?

SecureWorld News

To experiment with new technologies. Whatever the reason, shadow IT can pose a serious security risk to organizations. This means that they are more vulnerable to attack, and any data stored on them is at risk. This means that they are more vulnerable to attack, and any data stored on them is at risk. Probably not.

Risk 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Herjavec Group

Information Technology (IT) primarily refers to hardware, software, and communications technologies like networking equipment and modems that are used to store, recover, transmit, manipulate, and protect data. . Operational technology has seen innovations that allowed it to become safer, more efficient, and more reliable.

article thumbnail

Purdue University’s CERIAS 2021 Security Symposium – Randall Brooks’ ‘Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’

Security Boulevard

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel.

article thumbnail

Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges

The Security Ledger

The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The. Fixing InfoSec Demands Scale, Diversity. We also talk about her latest project: a children’s book to educate kids about basic cyber security concepts. . Read the whole entry. »

InfoSec 52
article thumbnail

CERIAS – Randall Brooks’ Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’

Security Boulevard

Enjoy and Be Educated Simultaneously! The post CERIAS – Randall Brooks’ Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’ appeared first on Security Boulevard.

article thumbnail

Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology

Security Boulevard

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Dmitriy Sokolovskiy, Avid Technology appeared first on CybeReady. The post Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology appeared first on Security Boulevard.

CISO 59