CYBER THIS WEEK – JUNE 4 , 2023

How to Keep Cyberattacks from Tanking Your Balance Sheet

By aligning cyber-risk management with business needs, organizations can build a security profile that aligns with the defined risk appetite. This process requires encouraging collaboration between the CISO, the chief technology officer, and chief information officer functions, all of whom should be involved in analyzing each cyber scenario.

How to Keep Cyberattacks from Tanking Your Balance Sheet (hbr.org)

Cybersecurity for businesses of all sizes: A blueprint for protection

Developing a robust cybersecurity practice involves implementing multiple layers of security measures that are interconnected and continually monitored, including training and awareness programs to ensure that employees follow best practices. Even with best practices in place, the potential for threats from cybercriminals remains a constant concern

This paper focuses on key areas of cybersecurity aiming at the holistic protection of IT environments, including their comprising endpoints, networks, cloud services and physical security. The paper also poses a set of essential questions that, when answered at the strategic level, can increase the resilience and security of a business.

Cybersecurity for businesses of all sizes: A blueprint for protection (talosintelligence.com)

Ways to Help Cybersecurity’s Essential Workers Avoid Burnout

There are clear steps technology leaders can take to alleviate some of the daily stress faced by enterprise safety’s essential workers. But solving the problem will require prioritizing more than just cybersecurity. It must start by taking a hard look at technical landscapes that have grown overwhelmingly complex.

Ways to Help Cybersecurity’s Essential Workers Avoid Burnout (darkreading.com)

The cybersecurity implications of IMO 2023

IMO 2023 and Fit for 55 are aimed at reducing greenhouse gas emissions from the shipping industry through increasing the efficiency of vessels. While these regulations are essential for environmental sustainability, they will also have significant impacts on Operational Technology (OT) cybersecurity in the Maritime industry.

The new technologies on-board vessels required to meet the IMO 2023 efficiency standards generally require more integration between OT systems within a vessel and from those systems to cloud-based infrastructure. This can increase cybersecurity risks.

The cybersecurity implications of IMO 2023 | Hellenic Shipping News Worldwide

Navigating Supplier Risk Challenges to Shore Up Cyber Defenses

The writing’s on the wall. Supply chain attacks have grown by more than 700% over the past three years, and are likely to further increase. To build resilience against supply chain risks, organizations must build smarter supplier risk-management profiles and follow guidelines that serve as an enabler to ongoing business success, rather than a barrier.

Navigating Supplier Risk Challenges to Shore Up Cyber Defenses | SupplyChainBrain

10 Questions Every CPSO Should Be Able To Answer

Chief product security officers (CPSOs), like all other executives, must demonstrate they are delivering business value for the organization. Faced with constantly growing software complexity, the increasing pace of software development and inevitable human errors, they must reduce risk to its lowest possible denominator.

10 Questions Every CPSO Should Be Able To Answer (forbes.com)

Five Best Practices to Reduce OT/ICS Cybersecurity Risk

When considering your backup strategy, a “two is one, one is none” approach is recommended. A single trusted restore point or process isn’t sufficient for critical OT/ICS cyber assets. If your industrial facility is attacked (or any serious event occurs that might force a shutdown, such as a catastrophic event like an earthquake or hurricane), being able to confidently restore your process back to the state that it was in before the cyber or operational incident is crucial to meet your recovery time objective, and maintain safe and profitable operations.

Five Best Practices to Reduce OT/ICS Cybersecurity Risk (automation.com)

Developing an effective ransomware strategy: protecting big data

As ransomware threats continue to evolve, organisations must remain extremely proactive in protecting their data and developing effective recovery strategies. By leveraging technology, embracing immutability, and implementing best practices for data protection and recovery, they can better prepare for the risks while also minimising the potential impact of an attack.

Developing an effective ransomware strategy: protecting big data (computerweekly.com)

Software liability: The hard truths of holding manufacturers responsible

The idea is to open tech companies to liability came as a direct result of the market’s failure to incentivize security, but some experts believe the industry will need to respond to pressures from government and consumers by coalescing around a standardized approach to software development and production that doesn’t require endless patching or an entire cottage industry of vendor security products bolted on top.

Software liability: The hard truths of holding manufacturers responsible | SC Media (scmagazine.com)

Four testing priorities for stronger API security

Security professionals must up their game on vulnerability scanning to manage modern API risks. And while each organization will need to tailor its own scanning approach to the nature of the API security threat in the operation, the most successful efforts draw from a common playbook built on these four priorities

Four testing priorities for stronger API security | Security Magazine

Share: