Cyber Security

Security needs to take priority for connected devices

Used with the permission of http://thenetwork.cisco.com
by Liza Meak

Liz Centoni and Matt Watchinski join forces on the RSA stage to show the next generation of threats to this new world of connected devices.

The explosion of connected devices is happening at breakneck speed. By 2020, Gartner predicts 20 billion connected devices and more devices mean more security threats.

In a keynote address at RSA, Matt Watchinski, Cisco VP of the Talos Threat Intelligence Research Group, said that everything from cameras, to audio equipment, to parking meters connect to our networks. “We have entire generations that look at the world, and swipe it, and touch it, and talk to it,” Watchinski said. It’s this connected world that exposes people to security vulnerabilities.”

One of the most notable and recent IoT security attacks was the VPN filter, which the Talos Group helped to expose last May. Talos researchers, working with public and private-sector threat intelligence partners and law enforcement discovered malware infecting at least 500,000 home office networking devices. Law enforcement believes it was a state-sponsored attack. What made this attack so dangerous was that it had the capability to scan for specific operational technology (OT) traffic.

The VPN filter attack is proof that hackers are out to exploit OT, and we can only expect attacks like this one to grow. That’s why connecting information security with operational technology is critical. “These technologies will make it into our critical infrastructure, they’ll make their way into how we deliver water and power,” Watchinski said. “We have achieved so much in IT security, we are now going to have to learn a completely different world of OT security.”

Liz Centoni, SVP of Cisco’s IoT Business Group, joined Watchinski on the RSA stage and outlined the focused need on OT security. Centoni says security is the reason IT teams and OT teams were forced to work together. “The number one thing customers talk about when they discuss bringing IoT to scale is security,” Centoni said.

Building the bridge between OT and IT may be challenging for information security professionals, but it also offers immense opportunity to protect hundreds of millions of people by protecting critical infrastructure. “The OT world cares about people safety, equipment safety, and what rolls off the production line,” Centoni said. And that’s what’s at the heart of the intersection of IT and OT.

Centoni explained the need for security to be baked into the DNA of OT. Once implemented, OT systems usually don’t get upgraded for decades, so security has to be a fundamental part of the original design.

The time is now for InfoSec to start building relationships and partnerships to help secure this new world.

While some see challenges with this, Centoni sees opportunity. She saw it done with IT, and she believes the same lessons can be applied to OT. Centoni wrapped up her keynote with this simple request: “Be the bridge between IT and OT.”

Contact us today to get started!

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Top 5 Collaborative Tools in Microsoft 365 Drive Productivity and Innovation

In today’s fast-paced digital landscape, businesses cannot thrive without effective collaboration. Microsoft continues its unwavering…

2 days ago

7 Essential Contact Information Tips for Email Signatures to Enhance Your Professional Image

An email signature accomplishes much more than simply telling readers who you are and how…

1 week ago

Maximizing Threat Response Efficiency with Security Copilot

Cyber security professionals work hard to safeguard companies’ information. But with criminals constantly changing their…

2 weeks ago

Why should a firm use DMARC? What is the need?

Domain-Based Message Authentication, Reporting, and Conformance (DMARC) is an e-mail security protocol designed to validate…

3 weeks ago

eCare Cloud Backup is in fashion. It’s the new you!

My job is to manage my law office’s cloud servers here at Justice Freaks.  As…

4 weeks ago

I Think I’m Dating an AI

My worst nightmare would be to date someone who isn’t who they say they are.…

4 weeks ago