Security Breach: Data that Will Identify and Defeat Hackers

Vital defensive tactics that go beyond the attacker.

The sensor and communication technology associated with remote monitoring capabilities has proven to be both a time-saving and productivity enhancing tool, as well as a potentially debilitating cyber defense vulnerability for the industrial sector. 

The issues stem from a combination of internal failures and the evolution of highly innovative criminals, which was recently assessed in Cyolo’s State of Industrial Secure Remote Access report 

Their report shows that larger industrial organizations can have over 50 remote users every day. This quantity of off-site employees logging into industrial control systems reinforces the top three areas of deficiency cited by respondents – a lack of visibility, insufficient user training, and weak internal access controls.

Our guest for today’s episode, Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo, will offer some color on these challenges, as well as some potential solutions.

We’re excited to announce that Security Breach is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit pentera.io

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click here.

More in Educational Resources - FM