OT security and Industrial Control System Security (ICS), while improving, has not kept up with their evolving ecosystem, leaving systems exposed —
as seen by attacks on critical infrastructure.
Most security breaches aren’t a consequence of inadequate security controls but are a direct result of human failure. So why do humans make mistakes? What triggers our behavior, and why are we so susceptible to manipulation? Understanding these triggers will greatly help organizations change their approach to information security.
Instead of focusing on preventing breaches, cybersecurity professionals should focus on improving security hygiene and resilience. More important than building up walls, organizations should prioritize minimizing costs, downtime and disruption in the case of an eventual cyberattack.
Ukraine has suffered a massive cyberattack that has affected Ukrainian foreign ministry, the cabinet of ministers and the security and defense council.
Lenny Maly has been tapped by Granicus to serve as Chief Information Security Officer (CISO). In this role, Maly will lead the company’s dedicated security organization, helping set new cloud-security standards that enable accelerated government digital transformation.