Wednesday, September 27, 2023

Exploring 5.5G Technology Advancements, Features, And Benefits (INFOGRAPHIC)


 

Labels: , , , , , ,

Wednesday, September 20, 2023

How To Best Implement A Process Improvement Strategy For Your Organization (INFOGRAPHIC)

 


Labels: , ,

Wednesday, September 13, 2023

6 Best Practices For AI (Artificial Intelligence) Projects (INFOGRAPHIC)

 


Labels: , , ,

Monday, September 11, 2023

Mapping Of IT And OT Cybersecurity Requirements


 Many companies have a role focused on IT (Information Technology) cybersecurity, typically adhering to ISO 27000 series standards and NIST guidelines. A newer trend is assigning a similar role for OT (Operational Technology) cybersecurity, which deals with Industrial Automation and Control Systems (IACS). The standard for IACS cybersecurity is the ๐ˆ๐’๐€/๐ˆ๐„๐‚ ๐Ÿ”๐Ÿ๐Ÿ’๐Ÿ’๐Ÿ‘.

A corporate cybersecurity program should include requirements for all phases of corporate facilities. While IT cybersecurity is managed by the IT department, the IACS security in plants should be handled by those in the IACS Cybersecurity Program.
These two cybersecurity programs should be aligned as part of an overall corporate cybersecurity strategy. With the increasing frequency and impact of cyber-attacks, especially on IACS, the need for this alignment is urgent.
๐’๐จ๐ฆ๐ž ๐ข๐ง๐ญ๐ž๐ซ๐ž๐ฌ๐ญ๐ข๐ง๐  ๐ฌ๐ญ๐š๐ญ๐ข๐ฌ๐ญ๐ข๐œ๐ฌ ๐š๐›๐จ๐ฎ๐ญ ๐ˆ๐‚๐’/๐Ž๐“ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐œ๐œ๐จ๐ซ๐๐ข๐ง๐  ๐ญ๐จ ๐“๐—๐Ž๐ง๐ž ๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค๐ฌ ๐ข๐ง ๐ญ๐ก๐ž๐ข๐ซ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ ๐ซ๐ž๐ฉ๐จ๐ซ๐ญ:
โ€ข ๐Ÿ“๐Ÿ•% of companies in the US reported ICS/OT security incidents.
โ€ข ๐Ÿ—๐Ÿ’% of surveyed enterprises acknowledge that IT security incidents can impact OT systems.
โ€ข ๐Ÿ’๐Ÿ–% of organizations experienced ICS/OT security incidents in 2022, but only 34% have conducted thorough security incident investigations and assessments.
โ€ข ๐Ÿ’๐Ÿ•% of companies report their process times are significantly lengthened due to cybersecurity complexities.
โ€ข ๐Ÿ‘๐Ÿ”% of companies report management's apathy toward cybersecurity as a major challenge.
๐’๐ญ๐š๐ญ๐ฌ ๐’๐จ๐ฎ๐ซ๐œ๐ž: https://www.txone.com/.../insight-into-ics-ot.../
๐ˆ๐ฆ๐š๐ ๐ž ๐’๐จ๐ฎ๐ซ๐œ๐ž (๐š๐ง๐ ๐ฆ๐จ๐ซ๐ž ๐ข๐ง๐Ÿ๐จ ๐จ๐ง ๐ข๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐ข๐ง๐  ๐ข๐ง๐๐ฎ๐ฌ๐ญ๐ซ๐ข๐š๐ฅ ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ): https://gca.isa.org/implementing-an-industrial...
*********************************************
โ€ข Follow Jeff Winter on LinkedIn at https://www.linkedin.com/in/jeffreyrwinter/ to stay current on Industry 4.0 and other cool tech trends.

Labels: , , , , , , ,

Friday, September 08, 2023

CISO (Chief Information Security Officer) Cheat Sheet (INFOGRAPHIC)


 

Labels: , ,

Wednesday, September 06, 2023

A Little IoT Humor For You

 
For FREE help designing your company's IoT/IIoT strategy (including network connectivity, sensor technology, data analytics, and cybersecurity) simply ask here:

FREE IoT/IIoT Strategy Help

Labels: , , , , , ,

Friday, September 01, 2023

How To Design A CISO (Chief Information Security Officer) Role That Is Right For Your Organization


 

๐Ÿ•ตโ€โ™€๏ธ How to design a CISO role that is right for your organization ๐Ÿ”
๐ŸŽฏA CISO is a senior-level executive in an organization responsible for managing and overseeing the information security program. The main aim of CISO is to protect the confidentiality, integrity, and availability (CIA) of the organization's assets.
๐Ÿ“Š A security program is designed based on the type of organization. The priority and focus of the organization will be based on the type of business. For instance, financial organizations must prioritize compliance with regulations such as PCI DSS, GLBA, SOX, etc over other regulations. They also need to ensure encryption and the protection of personal data during financial transactions. Education institutions may need to prioritize compliance with FERPA, CIPA, GDPR, etc over others.
โœ… The security program and the type of organization determine the roles and responsibilities of a CISO. The below diagram provides an account of the kind of focus of the organization (Dark Grey), the priorities of the CISO (Dark Blue), and the CISO responsibilities mentioned in the rows following.
Properly designing CISO responsibilities is essential for the success of a security program, which determines the security posture of the organization.
๐Ÿ“•๐Ÿ“šShare it with your network. Save it for future reference.
๐Ÿ‘‰Follow Durga Srikari Maguluri for more about Cybersecurity awareness and career suggestions.

Labels: , ,

Insights On Cybersecurity Insurance Every Business Should Know And Apply


Cybersecurity insurance can be a wise investment for businesses of any size seeking to protect against the financial consequences of a cyberattack or data breach.

Despite the complexities and costs of acquiring cyber insurance, it is still one of the best investments for mitigating the financial impact of a cyber incident โ€“ especially for small- and medium-sized businesses, which may not have the resources to cover the costs of a major cyberattack. Cyber insurance can also provide coverage for business interruption, a major concern for companies that rely on technology to conduct their operations.  

Be aware though that pricier premiums for cybersecurity insurance is an unfortunate consequence of the rising number of costly data breaches, ransomware, and other security attacks. Cyber insurance premiums increased by an average of 28% in the first quarter of 2022 compared with the fourth quarter of 2021, according to the Council for Insurance Agents and Brokers. According to Check Point Research, there was a 38% increase in global attacks in 2022 compared with 2021, accompanied by rising costs for insurers defending and settling cyber claims. IBM's "Cost of a Data Breach Report 2023" (registration required) showed 83% of organizations experienced more than one data breach, while the average cost of a data breach reached $9.44 million in the United States and $4.25 million globally. Also, governments around the world are enacting stricter regulations to protect personal information and sensitive data, resulting in higher limits of liability, a broader definition of loss (reputation recovery, financial recovery, more detailed reporting requirements, etc.), and regular audits and assessments to ensure companies are adhering to enhanced privacy measures.



With stricter requirements, companies will need to be proactive in assessing their insurance needs, weighing the costs and benefits, and working with insurers to ensure they have the right coverage in place.  

Whether cyber insurance is necessary for your business depends on several factors, including the size of your business, the types of data you collect and store, and the potential impact of a data breach or cyberattack. If your business stores sensitive customer information, handles financial transactions, or relies on technology for daily operations, itโ€™s particularly vulnerable to cyber threats. In such cases, cyber insurance can provide critical protection against financial losses, reputational damage, and legal liability in the event of a breach. Large enterprises, and even small businesses, can benefit from cyber insurance, as the cost of a breach could be substantial and possibly devastating for a business, regardless of its size. By purchasing cyber insurance, you can transfer some financial risk associated with cyberattacks to the insurance company.

Cyber insurance is an insurance policy that provides financial protection against losses resulting from cyberattacks, data breaches, and other cyber-related incidents. It may cover costs related to lost income, legal fees, data recovery fees, and the cost of hiring a public relations firm to help with damage control to a companyโ€™s brand. Cyber insurance policies typically include coverage for both first party (direct) losses (such as lost revenue or data recovery costs) and third-party losses (such as legal costs and settlement payments). However, insurance companies have now realized that the prevalence of ransomware, and its focus on backup systems, has significantly increased their liability. For this reason, the ability to gain cyber insurance, or maintain it, has changed. 

Of particular note is the reality that Insurance companies have become increasingly careful about underwriting cyber-insurance policies, making it harder for organizations to purchase policies at an affordable price point with the coverage level needed. It's not difficult to figure out why insurers are hesitant โ€” cyberattacks continue to increase while losses may exceed what the insurance market is able to absorb. For example, higher loss ratios for cyber insurance in 2020 and 2021 resulted in higher premiums in 2022 to manage that risk.  Going forward from 2023 and beyond this pattern will likely continue.

It's not surprising that insurers themselves are now proponents of more effective cyber-risk management for policy holders. Expect to see underwriters do the following:

  • Deny coverage if you don't have bare-minimum controls in place. This may include raising the bar for minimum controls. For example, traditional multifactor authentication (MFA) may not be accepted as a strong enough control due to man-in-the-middle (MitM) attacks.
  • Tie premiums to the maturity of your security controls.
  • Include additional conditions and limitations on policies based on the security posture of policyholders and the controls in place when an incident occurs.
While many organizations see cyber insurance as a vital tool for managing cyber-risk, insurers are putting stricter coverage policies in place and increasingly denying claims. As organizations face heightened scrutiny and undergo tighter underwriting processes, it's important to be able to show that your organization is worthy of cyber-insurance coverage.

So just what should organizations implement in order to satisfy the changing requirements of cyber-insurance underwriters. A good place to start is with these 10 controls to manage cyber-risk:

  1. Use invisible/phishing-resistant MFA and move to a passwordless solution.
  2. Segment and segregate networks.
  3. Adopt a robust data backup strategy.
  4. Disable administrative privileges on endpoints.
  5. Conduct regular employee security awareness training.
  6. Deploy endpoint detection and response (EDR) and anti-malware solutions.
  7. Implement Sender Policy Framework (SPF) to prevent email spoofing and phishing attempts.
  8. Create a security operation center (SOC) that operates 24/7.
  9. Deploy a security information event management (SIEM) platform to enable threat detection, incident response, and compliance management.
  10. Implement robust security measures for service accounts within Active Directory (AD) environments.

These 10 controls are a great starting point. But keep in mind it's likely there are many more factors underwriters will evaluate as they review new policy applications (AND renewals). It's a safe bet that underwriters will get more sophisticated about their requirements for identity protection, authentication mechanisms, access controls, and identity management processes to minimize the likelihood and potential impact of a data breach. 

Also, many cyber-insurance policies require organizations to comply with specific regulations related to data protection and privacy where they apply (think HIPAA, FISMA, and GLBA as examples). Demonstrating compliance with these regulations increases your likelihood of qualifying for coverage, possibly leading to more favorable policy terms as well. Compliance can also demonstrate your commitment to securing identities and personal information, which can positively influence insurance underwriting decisions, coverage terms, and premiums.

For starters, as an organization considering cybersecurity insurance it's important that you have a conversation focusing on these two simple questions:

1.  Are you applying for a new policy, or do you have an existing policy coming up for renewal?

2.  What are the requirements you're being asked to fulfill by the insurance provider for a new policy? If renewing, is the insurance provider asking you to fulfill more requirements in order to renew your policy and what are they?

This conversation will lead you to discovery of what actions need to be taken and formulation of a plan to address them.

Hereโ€™s a case study of what happened recently when one company followed this approach ... with a little help along the way: 

Situation: The company's policy was coming up for renewal in a few months and their provider required them to fulfill 12 attestations to renew and keep their policy down.

Challenge: The company called all the top service providers for backups, security awareness training, multi-factor authentication (MFA), endpoint detection and response (EDR), and more. They received quotes totaling $50,000 in monthly reoccurring fees across 12 different providers.

Solution: Instead of going to multiple providers directly, the company was able to fulfill all of those requirements with just a few best-of-breed providers by using the FREE design and sourcing assistance from FreedomFire Communications, bringing the total fees down to approximately $15,000 per month. Thatโ€™s $420,000 in annual savings that the company was able to realize with the FREE help from FreedomFire Communications.


Thereโ€™s no arguing cyber insurance is a necessary part of doing business in the world we live in today. The good news is that companies are taking note of the costly implication of cyber incidents and beefing up their security budgets. However, companies can (and should) still be fiscally smart about their cybersecurity spending.  To do so it is strongly encouraged to take advantage of the FREE services available through FreedomFire Communications including supplier recommendations, as well as detailed action plans in order of priority โ€“ making it easy to guide your organization through a scalable roadmap without overwhelming them.


By taking the actions discussed here, and having a comprehensive cybersecurity strategy in place that includes a strong cybersecurity insurance policy, you can better protect your business against cyberattacks and ensure that youโ€™re prepared in the event of a breach.



Labels: , , , , , , , , ,