OT Cybersecurity: ‘Do No Harm’ Doesn’t Mean ‘Do Nothing’

OT Cybersecurity: ‘Do No Harm’ Doesn’t Mean ‘Do Nothing’

In our previous blog, Why Operational Technology (OT) may be your Cybersecurity Achilles’ Heel, we discussed how OT systems had been historically “closed” and that they have evolved over time to become more “open” and able to leverage common off-the-shelf IT technologies. With the advent of this industrywide shift, we identified a departmental clash between OT and IT personnel on how to best...

Read More
The Process of Digitizing the Utility Industry: Listening to Customers, Overcoming Barriers, Driving Initiatives, and Staying Secure

The Process of Digitizing the Utility Industry: Listening to Customers, Overcoming Barriers, Driving Initiatives, and Staying Secure

Utility representatives and service providers from North America and South America gathered at the UTC Power Grid 4.0 Digitalization Forum on Oct. 16-18 to discuss and debate the changes occurring in the utility industry. Utility executives presented on topics that included the business drivers of digitization, the keys to success on the path to digitization, and considerations on how to...

Read More
4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

Recently, several members of our M&A practice participated in the PEI Operating Partners Forum in New York City, where the private equity community gathered to share best practices on value creation. Here are four takeaways we found interesting and wanted to share: Behavior adaptability is insanely important to digital transformation. And they don’t mean adaptable businesses, they mean...

Read More
Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

We recently shared an experience from a network segmentation project during which we discovered a technical vulnerability affecting Cisco’s Firepower Threat Defense firewall line. The firewall, itself, was not the problem, but, under specific conditions that are not uncommon in many environments, it allowed access through the firewall to systems it was meant to protect.…

Read More
Why Operational Technology may be your Cybersecurity Achilles’ Heel

Why Operational Technology may be your Cybersecurity Achilles’ Heel

Everyone in business is familiar with information technology (IT) and understands what it means, but what about operational technology, often abbreviated “OT”? At first glance, IT and OT appear similar because they share similar technologies like IP networks and Windows operating systems – but they have very different objectives. While IT systems generally support office workers and...

Read More
Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

This week brought another set of headlines about a large data breach—this time at Capital One. In this case, the alleged attacker is domestic and the federal indictment provided some details of how the breach occurred. In this case, a misconfigured firewall allegedly allowed Paige Thompson to remotely execute commands against an Amazon Web Services (AWS) server.…

Read More
7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

Despite the escalated rate and severity of cyberattacks, leaders at most companies have not changed their approach to cybersecurity in the past few years to adapt to the increasingly challenging environment. The goalposts have changed. And the question leaders should ask themselves is not, “is my data secure?” but “how prepared are we to minimize operational downtime in the likely event of a...

Read More
How to Rethink your Cybersecurity Strategy in 5 Minutes

How to Rethink your Cybersecurity Strategy in 5 Minutes

Malware attacks are wreaking havoc on the international economy and costing businesses billions of dollars in lost revenue, operational shutdowns, and reputational damage. It’s likely that you may have even experienced an episode like this at your firm. The latest industry research indicates that 50% of surveyed executives experienced disruptions from malware 6-10 times over the past five...

Read More
A Weekend Reminder of Why Resiliency, Not Data Protection Matters

A Weekend Reminder of Why Resiliency, Not Data Protection Matters

This past weekend was a reminder of why companies need to focus more of their efforts on protecting the resiliency of their environments – even if those investments come at the expense of data protection. On both Saturday and Sunday, news reports and Twitter posts were trending with photos of Target stores full of customers standing in line because the point of sale systems were unable to...

Read More
Tackling the Cybersecurity Skills Shortage at the CyberForce Competition™

Tackling the Cybersecurity Skills Shortage at the CyberForce Competition™

Teaming Up with the Department of Energy and Argonne National Laboratory at the CyberForce Competition™ The US Department of Energy (DOE) hosted their CyberForce Competition™   in late 2018 within their network of National Laboratories across the United States. The competition was created with the goal of addressing the cybersecurity skill gap in the marketplace today.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons