JULY - 20239 Moreover, the majority of the industrial environment is vulnerable to newly known defects (ripple 20 and amnesia), misconfigurations, and inadequate maintenance, which is in turn assisting these threats to materialise. The main challenge is that we always need to be vigilant about new threat vectors for IT and OT environments.3. CAN YOU TELL US ABOUT THE LATEST PROJECT THAT YOU HAVE BEEN WORKING ON AND WHAT ARE SOME OF THE TECHNOLOGICAL AND PROCESS ELEMENTS THAT YOU LEVERAGED TO MAKE THE PROJECT SUCCESSFUL?I can sum it up in one phrase "Digital transformation Journey". The pillars of this journey are the deployment of industrial IoT solutions, preparing for IT and OT convergence, in addition to embedding security within the end user experience by enabling them to connect securely from anywhere, anytime, from any device. However, we are tackling many challenges in this spectrum. Adopting new technology while urges us to balance the needs between security and pragmatism; bringing IT and OT together is not as easy as it seems, the reason is that we cannot lift and shift enterprise security controls to OT seamlessly.We are constantly working with our peers all over the world on securing our systems to meet these demands and, as a result, business needs, while taking into account the uniqueness of local and relevant cyber legislations. Adopting new technology while urges us to balance the needs between security and pragmatism; bringing IT and OT together is not as easy as it seems, the reason is that we cannot lift and shift enterprise security controls to OT seamlesslyOT security has always been a challenge to us, that being said, we are benchmarking global standards such as NIST 800-53, NIST 800-82, and ISO 27001:2013 to building our internal "Security Framework" to help us provide a consistent language for the security community across Veolia, this will in turn assist us to analyse and effectively convey our security posture, away from the intricacies of frameworks and standards. These projects have aided us in:· Keeping an eye on the OT environment and developing specific use cases to respond swiftly to questionable activity.· Protecting the OT environment by detecting and mitigating Cyber Risks to prevent attackers from exploiting vulnerabilities and attack surfaces.· Getting ready for the IT/OT convergence.4. WHICH ARE SOME OF THE TECHNOLOGICAL TRENDS WHICH EXCITE YOU FOR THE FUTURE OF THE ENTERPRISE SECURITY SPACE?We all know that risk can be reduced by implementing a well-maintained defence-in-depth approach, which is exactly what we are continuously working on.We believe that the governance umbrella, in addition to employee cyber awareness and having a defined and tested incident response procedure in place, is the cornerstone of this strategy. We are currently deploying OT vulnerability management solutions across the region, which will provide us with many security benefits:· OT Network Visibility at a High Level· Capabilities for detecting threats· In addition to operational knowledgeWe believe that such initiatives go hand in hand with the need for digital transformation and corporate modernization. 5. HOW CAN BUDDING AND EVOLVING COMPANIES REACH YOU FOR SUGGESTIONS TO STREAMLINE THEIR BUSINESS?Providing back to the cyber security community always gives me a sense of purpose. I'm glad to be of assistance to any company or business seeking any advise in that aspect. I'll be happy to connect on LinkedIn.
<
Page 8 |
Page 10 >