iSMG – govinfosecurity.com on Robust Incident Management for Critical Infrastructure

Ensuring the security of critical infrastructure necessitates managing both legacy systems and emerging cyberthreats. Durgesh Kalya, an OT network security expert at Covestro LLC, emphasized the necessity of integrating the incident command system—initially developed by the Federal Emergency Management Agency and the Department of Homeland Security—with industrial automation systems. This integration promotes active participation and collaboration among industry stakeholders.

“Essentially, everyone is a cybersecurity engineer because they work on computer systems. It’s not possible to update software on hardware that is decades old; modern hardware and equipment are required,” Kalya explained.

In an interview at the Cyber Security for Critical Assets USA Summit, Kalya also addressed the importance of robust incident management frameworks, collaboration between organizations and ICS vendors, and the need for understanding and segmenting systems to mitigate ransomware risks.

Picking up on Cybersecurity Skills

Maximizing Your Cybersecurity Learning Potential Are you aiming to become a cybersecurity expert but finding your learning progress slower than you’d like? I recently found inspiration in a valuable concept …

CISSP RESOURCES

If you are looking for the write up of my CISSP Experience. Please click here (PDF) Useful Resources Books:ISC2 OFFICIAL CISSP Study GuideBoson and Official ISC2 Practice Tests.English dictionary. What …

Risk in Security

I typically don’t dwell into this topic until unless I was told to speak about it in a conference / group discussion. While I admit, I do not have all …

InfoSecWOTD#21 Ciphertext 🧮

Today’s #InfosecWOTD Day 21 is #Ciphertext 🧮  When you take a plain text and apply encryption algorithm, the resulting text is called ciphertext. The algorithm is called a cipher. The …

InfoSecWOTD#19 Cryptojacking 💸😈

Today’s #InfosecWOTD Day 19 is #Cryptojacking 💸😈 Cryptojacking is the unauthorized use of personal or enterprise systems for crypto mining. The term crypto mining refers to an activity of solving …