Archive

All entries

nexus25vid_carmakal.png
Cyber Resilience
Internet of Things
Operational Technology
Operational Resilience
Risk Management
Ransomware
Nexus Conference

Charles Carmakal on China's Cyber Threat to Critical Infrastructure

Charles Carmakal, Chief Technology Officer at Mandiant (Part of Google Cloud), explains how China-nexus threat actors such as Volt Typhoon, Salt Typhoon, and…
Michael Mimoso
The congressional delay in hammering out a federal budget has added another layer of pain to the ongoing crisis for the Cybersecurity and Infrastructure Security Agency (CISA). Not only are there funding concerns., but it's the expiration of critical information-sharing legislation and a regulatory compliance vacuum that has left enterprises unsure about their next steps.
Cyber Resilience
Operational Resilience
Risk Management
Internet of Things

Threat Intelligence Goes Dark, CISA Crisis Leaves Enterprise Security Blind

George V. Hulme
ASL Roma 1 CISO Stefano Scaramuzzino and Deloitte analyst Fabio Battelli write about how Italy's largest public healthcare system's HOPE initiative adds automated intelligence to its cybersecurity governance program. HOPE reimagines cybersecurity not as a defensive function, but as a living cognitive system that learns, correlates, and reasons across every layer of the healthcare ecosystem. It marks the birth of a new discipline for digital public health: operational intelligence for healthcare governance.
Healthcare
Cyber Resilience
Vulnerability Management
Risk Management

HOPE: Intelligent Governance Transforming Healthcare Cybersecurity at ASL Roma 1

Stefano Scaramuzzino
Fabio Battelli
nexus_enisa-report.jpg
Operational Technology
Industrial
Vulnerability Management
Risk Management

ENISA Warns of Escalating OT Threats

George V. Hulme
Building management systems (BMS) are centralized platforms that oversee a building’s mechanical, electrical, and environmental systems. Yet they are often overlooked with regard to an organization’s cybersecurity planning. Expert Dan Ricci explains why and provides six strategies for securing BMS.
Operational Resilience
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

The Overlooked Cyber Risk: Building Management Systems in Critical Infrastructure

Dan Ricci
Converged IT/OT operations often run into decision-making gridlock when it comes to exposure management and vulnerability management of OT. Without clearly established governance, organizations are experiencing prolonged periods of time exposed to attacks.
Cyber Resilience
Industrial
Operational Technology
Operational Resilience
Risk Management

Bridging the Divide: Overcoming Security Deadlocks in IT/OT Convergence

George V. Hulme
Adm. Michael S. Rogers, USN (Ret.) joins the Nexus podcast to discuss the Biden administration's National Cybersecurity Strategy, and its themes of cyber resilience and critical infrastructure protection.
Cyber Resilience
Healthcare
Industrial
Operational Resilience
Risk Management

Nexus Podcast: Adm. Michael Rogers on Deterrence in Cyberspace

Michael Mimoso
Vulnerability scoring models such as CVSS 3.1 and CVSS 4.0 must evolve to include contextual information that helps network and systems analysts and security teams better prioritize remediation, mitigation, and patching processes.
Vulnerability Management
Risk Management
Operational Technology
Cyber Resilience

CVSS Scores No Longer Enough: The Move to Context-Driven Vulnerability Management

George V. Hulme
On the Nexus Podcast, former Commonwealth of Pennsylvania CISO and current Black Kite CSO Bob Maley discussed the resource challenges facing not only critical infrastructure asset owners and operators, but also how those challenges are impacting risk-management efforts in critical industries.
Risk Management
Technical Debt
Cyber Resilience
Healthcare
Industrial
Internet of Things

Nexus Podcast: Bob Maley on Critical Infrastructure Resource Challenges

Michael Mimoso
Claroty Nexus contributor Megan Stifel, Chief Strategy Officer of the Institute for Security and Technology, writes about the upcoming expiration of the Cybersecurity Information Sharing Act of 2015 (CISA '15). She urges Congress to reauthorize CISA '15 because failing to do so will put national security and personal privacy at risk, and threaten innovation.
Risk Management
Cyber Resilience
Healthcare
Industrial

Reauthorization of CISA ’15: 10 Years Later, New Threats, Exigent Urgency

Megan Stifel
Pankaj Goyal, Chief Operating Officer of Safe Security, joins the Nexus Podcast to discuss the nuances of protecting OT environments, and how cyber insurance must adapt as OT and cyber-physical systems are connected online and increasingly exposed to attackers.
Cybersecurity Insurance
Risk Management

Nexus Podcast: Pankaj Goyal on Cyber Insurance for OT Environments

Michael Mimoso
Experts weigh in on the recent Cybersecurity and Infrastructure Security Agency (CISA) guidance aimed at addressing the risks associated with the convergence of OT/IT in modern industrial organizations. CISA recommends enhanced asset inventories and taxonomies as foundational cybersecurity pieces of an OT security program.
Operational Technology
Vulnerability Management
Risk Management

Asset Management Key to Mitigating OT/IT Convergence Cybersecurity Risks

George V. Hulme
Latest on Nexus Podcast