Considering the passage of the SLACIP Act, entities which own or operate critical infrastructure assets should begin considering whether their existing organisational processes will be sufficient to comply with their impending obligations, or whether new measures will need to be put into effect in order to bring themselves into conformity with the minimum requirements contemplated by the Act and the accompanying draft Risk Management Program Rules. This panel discussion will address:
While critical infrastructure defense has always been a high-priority objective, there’s still some disconnect in the world of critical infrastructure security around preparedness. According to a report covered by PRNewswire, a majority (84%) of critical infrastructure organizations indicated they had suffered at least one security breach involving their Operational Technology (OT) between 2018 and 2021; yet, 56% of respondents to the same study said they were “highly confident” that they wouldn’t experience an OT breach in 2022.
In his session, CK Chim will share how hackers get easy access to critical infrastructure organizations and how we can defend against attacks by removing complexity and leveraging artificial intelligence and machine learning to correlate the vast amount of telemetry.
Zero Trust security models eliminate persistent trust and enforce continuous authentication, least privilege and adaptive access control. In doing so, a zero-trust strategy reduces the threat surface and minimizes threat windows.
Organizations who adopt zero trust can look to get off the hamster wheel of compliance-as-a-strategy, needing to continually meet new compliance mandates as they impact the business. Instead, zero trust allows IT security leaders to build a business-enabling strategy that can then be mapped against whatever mandates come down the pipe. At the core of zero trust is identity. It has an important role to play in least privilege with the need to manage the access and privileges of identities, both human and machine, is key.
Whether it is a corporate user on a work-issued laptop or an employee of a third-party maintenance company, providing the right amount of access for just the right length of time to both IT and OT systems is critical for the security of critical infrastructure.
Join us for a discussion of cyber security leaders and practitioners as they discuss how zero trust has strengthened their cyber defences while enabling their business.