01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How to Secure IT And OT In Industrial and Manufacturing<br />

Environments<br />

By Christopher Dobrec, Vice President of Product Marketing at Armis<br />

Operational Technology (OT) systems, which include critical infrastructure, are increasingly becoming<br />

more exposed to cyber attacks. The control and telemetry systems used in industrial plants and<br />

manufacturing environments are being connected to traditional enterprise IT networks like Ethernet or<br />

Wi-Fi. Meanwhile, device manufacturers are building OT devices and control systems on top of common<br />

operating systems such as Windows, Linux, Android, and VxWorks.<br />

Compounding this issue is the fact that traditional consumer-centric connected devices are being brought<br />

into industrial and manufacturing environments. For example, as Ford starts to consider how<br />

manufacturing workers can return to plants following the COVID-19 impact, it’s testing wearable devices<br />

that would buzz when employees are closer than 6 feet apart.<br />

These developments make control systems vulnerable to the same kind of attacks used to compromise<br />

devices on corporate IT networks. Recent attacks on industrial control systems (ICS) and OT<br />

environments illustrate the damage that these threats are already having. WannaCry and NotPetya<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!