Cyber Security

Security needs to take priority for connected devices

Used with the permission of http://thenetwork.cisco.com
by Liza Meak

Liz Centoni and Matt Watchinski join forces on the RSA stage to show the next generation of threats to this new world of connected devices.

The explosion of connected devices is happening at breakneck speed. By 2020, Gartner predicts 20 billion connected devices and more devices mean more security threats.

In a keynote address at RSA, Matt Watchinski, Cisco VP of the Talos Threat Intelligence Research Group, said that everything from cameras, to audio equipment, to parking meters connect to our networks. “We have entire generations that look at the world, and swipe it, and touch it, and talk to it,” Watchinski said. It’s this connected world that exposes people to security vulnerabilities.”

One of the most notable and recent IoT security attacks was the VPN filter, which the Talos Group helped to expose last May. Talos researchers, working with public and private-sector threat intelligence partners and law enforcement discovered malware infecting at least 500,000 home office networking devices. Law enforcement believes it was a state-sponsored attack. What made this attack so dangerous was that it had the capability to scan for specific operational technology (OT) traffic.

The VPN filter attack is proof that hackers are out to exploit OT, and we can only expect attacks like this one to grow. That’s why connecting information security with operational technology is critical. “These technologies will make it into our critical infrastructure, they’ll make their way into how we deliver water and power,” Watchinski said. “We have achieved so much in IT security, we are now going to have to learn a completely different world of OT security.”

Liz Centoni, SVP of Cisco’s IoT Business Group, joined Watchinski on the RSA stage and outlined the focused need on OT security. Centoni says security is the reason IT teams and OT teams were forced to work together. “The number one thing customers talk about when they discuss bringing IoT to scale is security,” Centoni said.

Building the bridge between OT and IT may be challenging for information security professionals, but it also offers immense opportunity to protect hundreds of millions of people by protecting critical infrastructure. “The OT world cares about people safety, equipment safety, and what rolls off the production line,” Centoni said. And that’s what’s at the heart of the intersection of IT and OT.

Centoni explained the need for security to be baked into the DNA of OT. Once implemented, OT systems usually don’t get upgraded for decades, so security has to be a fundamental part of the original design.

The time is now for InfoSec to start building relationships and partnerships to help secure this new world.

While some see challenges with this, Centoni sees opportunity. She saw it done with IT, and she believes the same lessons can be applied to OT. Centoni wrapped up her keynote with this simple request: “Be the bridge between IT and OT.”

Contact us today to get started!

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

The Rise of AI Agents: Simplifying Tasks and Connecting Technologies

Introducing eCare Bot: Your Intelligent IT Support Assistant  In today's fast-paced world, the emergence of…

20 hours ago

Server Simplified

At eMazzanti Technologies, we recognize that stable, effective, and expandable servers are essential to the seamless operation of enterprises. For this reason, we collaborate with Hewlett Packard Enterprise (HPE) to offer our clients the best server solutions possible, customized to meet their unique requirements. HPE servers provide the performance and  flexibility required for small and big businesses to manage data, support apps, and manage             workloads with ease. Customers may choose the best HPE servers for their organization with the assistance of our team of specialists. We take the time to comprehend the particular needs of every client, including those related to processing speed, storage capacity, and security features. Whether our clients require a general-purpose ProLiant server or a…

1 week ago

How to Make Your AI Copy Sound Authentic: Writing Like a Human, Not a Machine

AI writing tools have become popular for creating content quickly. But many readers can spot…

1 week ago

Data Analytics for Old-School Business Owners: Turning Dusty Ledgers into Gold Mines

Data analytics is changing the game for businesses of all types, including old-school industries that…

1 week ago

Windows Snipping Tool Tips and Tricks: Mastering the Art of Screen Capture

The Windows snipping tool is an extremely convenient utility for capturing screenshots quickly. It serves…

1 week ago

Harry Potter with a Lightsaber: A Wizard’s Guide to Space Magic

What if Harry Potter swapped his wand for a lightsaber? Explore the hilarious and chaotic…

1 week ago