Derek Christensen

The One Cybersecurity Assessment Every Organization Needs

Do a quick google search of cybersecurity assessments and you’ll find dozens of results that range from online surveys to downloadable diagnostics. Because cybersecurity assessment is a broad term and can account for a multitude of activities, for the purpose of this article, we are defining a cybersecurity assessment as an evaluation of your cybersecurity program. […]

The One Cybersecurity Assessment Every Organization Needs Read More »

Is an Ounce of Cybersecurity Prevention Worth a Pound of Cure?

The old adage, “an ounce of prevention is worth a pound of cure,” is well known and yet this sage advice is rarely turned into action either in healthcare or cybersecurity. This blog explores the trade-offs organizations face as they work to balance investments in the prevention of Cyber Attacks against Cyber Attack detection capabilities.

Is an Ounce of Cybersecurity Prevention Worth a Pound of Cure? Read More »

Why Security Fatigue is Scarier than Dating Taylor Swift

The Internet Age has given us a platform that connects us to our community, financial institutions, social life, retail outlets, and entertainment. The upside of all this connectivity is that it’s easier than ever to stay in touch, pay your bills, watch a show on demand, or download music. In order to enjoy all this

Why Security Fatigue is Scarier than Dating Taylor Swift Read More »

The Secret of Successful Vulnerability Management Programs

In the complex world of cybersecurity, a formal vulnerability management program is increasingly used to identify, communicate, and remediate key vulnerabilities across a wide range of facilities from office complexes to manufacturing plants. Vulnerability management is an old concept with a lot of understanding in a high-level capacity, but the execution of a full program

The Secret of Successful Vulnerability Management Programs Read More »

2 Critical Considerations for Integrating OT/IT Integration

OT/IT Integration success can be attributed to three key elements: people, process, and technology. The integration of OT and IT environments is a challenging project for any organization. To help bring simplicity to this complex undertaking, an OT/IT integration can be analyzed through the lens of the cybersecurity triangle – people, process, and technology. These

2 Critical Considerations for Integrating OT/IT Integration Read More »

Why Process Is Essential for OT/IT Integration Success

IT/OT Integration success relies on alignment of people, process, and technology. Industrial control systems typically weren’t designed to be connected to the internet, so they weren’t built with cybersecurity capabilities to ward off hackers. –How to prevent hackers from taking down critical infrastructure, Business Insider Until recently, Operational Technology (OT) and IT departments operated completely separate

Why Process Is Essential for OT/IT Integration Success Read More »

3 Essential Elements for IT/OT Integration Success

IT/OT Integration success can be attributed to three key elements: people, process, and technology. According to the U.S. Department of Homeland Security, operational technology (OT) operators were the most targeted sector of industrial cyber-attacks in 2015, making IT and OT integration more important than ever for industrial businesses. The introduction of networks into the industrial space

3 Essential Elements for IT/OT Integration Success Read More »

Overcoming Operational Technology (OT) and IT Integration Challenges

In a recent vulnerability test, RedTeam Security was able to penetrate a US power grid – both online and offline – within a three day window. A quick Google search of cybersecurity and the energy sector will return thousands of results discussing how the industrial control system (ICS) security environment is in dire straights. Many

Overcoming Operational Technology (OT) and IT Integration Challenges Read More »

Why Defense-in-Depth Is Critical to Cybersecurity Strategy

Since the inception of Cybersecurity twenty-plus years ago, the industry has gone through a plethora of iterations. The Internet was initially designed to be an open environment to  enable information sharing between academics and researchers. When businesses and government agencies joined the network explosion in the late 1990s, the open environment turned into a security

Why Defense-in-Depth Is Critical to Cybersecurity Strategy Read More »

Scroll to Top