Retire Those Risky Edge Devices

Adm. Michael Rogers echoes stern warnings to critical infrastructure operators that legacy edge devices are being exploited. It's a warning CPS asset owners should heed as well.

nexus_rogers-edge-alert.jpg

Essential Topics (for Security Leaders)

Discover expert insights on Risk Management, Cyber Resilience, Vulnerability Management, and more. Learn how top security leaders safeguard critical cyber-physical systems.

Latest Insights in

In this episode of the Nexus Podcast, CISA ICS Cybersecurity Lead Matthew Rogers discusses new guidance from the agency on the use of security operational technology (OT) protocols, titled “Barriers to Secure OT Communication: Why Johnny Can’t Authenticate.” The paper advocates for the use of secure versions of legacy OT protocols, or the adoption of open standards by OEMs, in order to bring authentication and integrity to OT protocol communication.
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management
Vulnerability Management

Nexus Podcast: CISA’s Matthew Rogers on Secure OT Protocol Communication

Michael Mimoso
OT cybersecurity expert Dan Ricci writes about what OT asset management and visibility can reveal about an industrial environments, including the surfacing of risk signals, exposure of hidden dependencies, and insight about the efficacy virtual network segmentation policies and practices.
Industrial
Operational Resilience
Operational Technology
Cyber Resilience
Risk Management

From OT Asset Management to Insight: Turning Visibility Into Something That Matters

Dan Ricci
Cyber-physical systems cybersecurity is a maturing practice, which means protection of these critical systems must become more programmatic. Stefano Scaramuzzino CISO of ASL Roma-1 and Fabio Battelli of Deloittte explain the first steps on this journey using ASL Roma-1's HOPE program as the model.
Cyber Resilience
Healthcare
Operational Resilience
Risk Management

Moving from Visibility to Governance of CPS

Fabio Battelli
Stefano Scaramuzzino
Adam Jurgensen, Medical Device Security Engineer at Valley Health Systems, brings us inside the roles and responsibilities of those experts overseeing connected devices inside healthcare organizations. Jurgensen describes the restrictions his role faces when it comes to updating and patching connected medical devices, the gamut of which may run from MRIs, CT, ultrasounds, to patient monitors, and defibrillators. Compensating controls, segmentation, and other cybersecurity strategies are key for keeping devices secure and patients safe in the event of an incident.
Nexus Conference
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

Adam Jurgensen on Medical Device Cybersecurity

Adam Jurgensen, Medical Device Security Engineer at Valley Health Systems, brings us inside the roles and responsibilities of those experts overseeing…
Michael Mimoso