News and Media articles covering Durgesh Kalya’s work
[{"id":1431,"link":"https:\/\/durgeshkalya.com\/2024\/09\/01\/packt-publishing-ltd-book-release-by-durgesh-kalya-july-2025-pre-order-available-now\/","name":"packt-publishing-ltd-book-release-by-durgesh-kalya-july-2025-pre-order-available-now","thumbnail":{"url":"https:\/\/durgeshkalya.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-09-01-115313.png","alt":""},"title":"Packt Publishing Ltd: Book Release by Durgesh Kalya - July 2025 Pre Order Available Now.","excerpt":"","content":"https:\/\/www.amazon.com\/Incident-Management-Industrial-Control-Systems-ebook\/dp\/B0D82VKB48\/ref=sr_1_1?crid=38NBY16TQBQFD&dib=eyJ2IjoiMSJ9.pCN3ntTZHK3dQ58By-NXT0FlpHlk5xSo4lhtIgitWtadocudNFjvxvduLM9FXNbcJ9UI807-lbOTOEOAJf2adQ.oI0M_9GHLhEfnRAuRn6nHUNTBgvb_nCCT7UrHKy0awE&dib_tag=se&keywords=Durgesh+Kalya&qid=1725209793&sprefix=durgesh+kalya%2Caps%2C156&sr=8-1 Originally intended as a personal documentation of my knowledge and research on the often-overlooked yet vital area of incident management, this book has grown","author":{"name":"DKALYA","link":"https:\/\/durgeshkalya.com\/author\/xdbworks\/"},"date":"Sep 1, 2024","dateGMT":"2024-09-01 16:54:49","modifiedDate":"2024-09-01 16:58:56","modifiedDateGMT":"2024-09-01 16:58:56","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>","space":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/durgeshkalya.com\/tag\/cissp\/' rel='post_tag'>CISSP<\/a><a href='https:\/\/durgeshkalya.com\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/durgeshkalya.com\/tag\/infosecwotd\/' rel='post_tag'>InfoSecWOTD<\/a>"},"readTime":{"min":0,"sec":36},"status":"publish"},{"id":1417,"link":"https:\/\/durgeshkalya.com\/2024\/09\/01\/industrial-cyber-addressing-ot-cyber-risk-management-threats-and-attacks-with-risk-registers-and-tabletop-exercises\/","name":"industrial-cyber-addressing-ot-cyber-risk-management-threats-and-attacks-with-risk-registers-and-tabletop-exercises","thumbnail":{"url":"https:\/\/durgeshkalya.com\/wp-content\/uploads\/2024\/09\/Industrial-Cyber.jpg","alt":""},"title":"Industrial Cyber: Addressing OT cyber risk management threats and attacks with risk registers and tabletop exercises","excerpt":"","content":"Understanding the Importance of Risk Registers in OT Cybersecurity OT cyber-risk encompasses a wide range of threats and vulnerabilities that can disrupt industrial operations, lead","author":{"name":"DKALYA","link":"https:\/\/durgeshkalya.com\/author\/xdbworks\/"},"date":"Sep 1, 2024","dateGMT":"2024-09-01 16:30:10","modifiedDate":"2024-09-01 16:30:12","modifiedDateGMT":"2024-09-01 16:30:12","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>","space":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":55},"status":"publish"},{"id":1320,"link":"https:\/\/durgeshkalya.com\/2024\/06\/02\/ismg-govinfosecurity-com-on-robust-incident-management-for-critical-infrastructure\/","name":"ismg-govinfosecurity-com-on-robust-incident-management-for-critical-infrastructure","thumbnail":{"url":"https:\/\/durgeshkalya.com\/wp-content\/uploads\/2024\/06\/image.png","alt":""},"title":"iSMG - govinfosecurity.com on Robust Incident Management for Critical Infrastructure","excerpt":"Ensuring the security of critical infrastructure necessitates managing both legacy systems and emerging cyberthreats. Durgesh Kalya, an OT network security expert at Covestro LLC, emphasized the necessity of integrating the incident command system\u2014initially developed by the Federal Emergency Management Agency and the Department of Homeland Security\u2014with industrial automation systems. This integration promotes active participation and collaboration among industry stakeholders.\n\n\"Essentially, everyone is a cybersecurity engineer because they work on computer systems. It's not possible to update software on hardware that is decades old; modern hardware and equipment are required,\" Kalya explained.\n\nIn an interview at the Cyber Security for Critical Assets USA Summit, Kalya also addressed the importance of robust incident management frameworks, collaboration between organizations and ICS vendors, and the need for understanding and segmenting systems to mitigate ransomware risks.","content":"Full Interview: https:\/\/www.govinfosecurity.com\/robust-incident-management-for-critical-infrastructure-a-25373 In an interview at the Cyber Security for Critical Assets USA Summit, Kalya addressed the importance of robust incident management frameworks, collaboration","author":{"name":"DKALYA","link":"https:\/\/durgeshkalya.com\/author\/xdbworks\/"},"date":"Jun 2, 2024","dateGMT":"2024-06-02 17:32:19","modifiedDate":"2024-09-01 16:07:11","modifiedDateGMT":"2024-09-01 16:07:11","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>","space":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/durgeshkalya.com\/tag\/critical-infrastructure\/' rel='post_tag'>Critical Infrastructure<\/a><a href='https:\/\/durgeshkalya.com\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/durgeshkalya.com\/tag\/cyberthreats\/' rel='post_tag'>Cyberthreats<\/a><a href='https:\/\/durgeshkalya.com\/tag\/incident-command-system\/' rel='post_tag'>Incident Command System<\/a><a href='https:\/\/durgeshkalya.com\/tag\/industrial-automation\/' rel='post_tag'>Industrial Automation<\/a><a href='https:\/\/durgeshkalya.com\/tag\/legacy-systems\/' rel='post_tag'>Legacy Systems<\/a><a href='https:\/\/durgeshkalya.com\/tag\/ot-security-expert\/' rel='post_tag'>OT Security Expert<\/a><a href='https:\/\/durgeshkalya.com\/tag\/outdated-software\/' rel='post_tag'>Outdated Software<\/a><a href='https:\/\/durgeshkalya.com\/tag\/risk-mitigation\/' rel='post_tag'>Risk Mitigation<\/a><a href='https:\/\/durgeshkalya.com\/tag\/system-management\/' rel='post_tag'>System Management<\/a>"},"readTime":{"min":0,"sec":51},"status":"publish"},{"id":1422,"link":"https:\/\/durgeshkalya.com\/2023\/06\/01\/iot-security-foundation-announces-first-usa-chapter-in-houston-texas\/","name":"iot-security-foundation-announces-first-usa-chapter-in-houston-texas","thumbnail":{"url":"https:\/\/durgeshkalya.com\/wp-content\/uploads\/2024\/09\/IoTSF.jpg","alt":""},"title":"IoT Security Foundation Announces first USA Chapter in Houston, Texas","excerpt":"","content":"In today's interconnected world, robust security measures across IoT domains are more critical than ever, with threats to connected devices and systems constantly emerging. To","author":{"name":"DKALYA","link":"https:\/\/durgeshkalya.com\/author\/xdbworks\/"},"date":"Jun 1, 2023","dateGMT":"2023-06-01 16:35:00","modifiedDate":"2024-09-01 16:45:54","modifiedDateGMT":"2024-09-01 16:45:54","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>","space":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":42},"status":"publish"},{"id":1414,"link":"https:\/\/durgeshkalya.com\/2021\/09\/01\/mentoring-and-cybersecurity-by-tatia-zuloaga-durgesh-kalya\/","name":"mentoring-and-cybersecurity-by-tatia-zuloaga-durgesh-kalya","thumbnail":{"url":"https:\/\/durgeshkalya.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-09-01-110943.png","alt":""},"title":"Rainbow Secure: Mentoring and Cybersecurity by Tatia Zuloaga & Durgesh Kalya","excerpt":"","content":"Reflection on the Session: Mentoring and Cybersecurity by Tatia Zuloaga & Durgesh Kalya In our recent session, Tatia Zuloaga and I explored the vital role","author":{"name":"DKALYA","link":"https:\/\/durgeshkalya.com\/author\/xdbworks\/"},"date":"Sep 1, 2021","dateGMT":"2021-09-01 16:17:00","modifiedDate":"2024-09-01 16:35:07","modifiedDateGMT":"2024-09-01 16:35:07","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>","space":"<a href=\"https:\/\/durgeshkalya.com\/category\/news-and-media\/\" rel=\"category tag\">News and Media<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":47},"status":"publish"}]