ciso (8)
As the grid modernises, the design of utility cybersecurity solutions need to be rethought to defend against the evolving capabilities of potential attackers. A huge difficulty lies in the selection process of available technologies. This comes with the bigger challenges of implementing and operating these new technologies to harmonise with existing internal utility services. As a result, Smart Grid Forum’s Smart Grid Cybersecurity 2020 conference has been created to solve the strategic, applica
In today’s hyper-connected digital age, it’s not unusual for medium to large-sized companies to have hundreds, or even thousands, of third-party suppliers.
This can range from product suppliers, to billing processors, to cloud providers, and a variety of different services.
This large volume of suppliers can pose a challenge for Chief Security Information Officers (CISO) to properly manage risk, especially when personal or confidential data is shared.
A Risky Misconception – Understanding Supplier
Going into 2020, businesses are expected to continue the transition from on-premise to cloud. Many are increasingly adopting a cloud-first strategy, where if possible, they will run their services on a cloud platform vs keeping them in a data center.
And why not? The benefits of moving to the cloud are enormous and the list is long. They range from – but are not limited to – reduced overheads, improved scalability without the capex costs, and improved efficiencies. The big one that hangs over
Introduction
In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is protected by firewalls with access lis