The Process of Digitizing the Utility Industry: Listening to Customers, Overcoming Barriers, Driving Initiatives, and Staying Secure

The Process of Digitizing the Utility Industry: Listening to Customers, Overcoming Barriers, Driving Initiatives, and Staying Secure

Utility representatives and service providers from North America and South America gathered at the UTC Power Grid 4.0 Digitalization Forum on Oct. 16-18 to discuss and debate the changes occurring in the utility industry. Utility executives presented on topics that included the business drivers of digitization, the keys to success on the path to digitization, and considerations on how to...

Read More
4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

Recently, several members of our M&A practice participated in the PEI Operating Partners Forum in New York City, where the private equity community gathered to share best practices on value creation. Here are four takeaways we found interesting and wanted to share: Behavior adaptability is insanely important to digital transformation. And they don’t mean adaptable businesses, they mean...

Read More
Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

We recently shared an experience from a network segmentation project during which we discovered a technical vulnerability affecting Cisco’s Firepower Threat Defense firewall line. The firewall, itself, was not the problem, but, under specific conditions that are not uncommon in many environments, it allowed access through the firewall to systems it was meant to protect.…

Read More
Why Operational Technology may be your Cybersecurity Achilles’ Heel

Why Operational Technology may be your Cybersecurity Achilles’ Heel

Everyone in business is familiar with information technology (IT) and understands what it means, but what about operational technology, often abbreviated “OT”? At first glance, IT and OT appear similar because they share similar technologies like IP networks and Windows operating systems – but they have very different objectives. While IT systems generally support office workers and...

Read More
Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

This week brought another set of headlines about a large data breach—this time at Capital One. In this case, the alleged attacker is domestic and the federal indictment provided some details of how the breach occurred. In this case, a misconfigured firewall allegedly allowed Paige Thompson to remotely execute commands against an Amazon Web Services (AWS) server.…

Read More
7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

Despite the escalated rate and severity of cyberattacks, leaders at most companies have not changed their approach to cybersecurity in the past few years to adapt to the increasingly challenging environment. The goalposts have changed. And the question leaders should ask themselves is not, “is my data secure?” but “how prepared are we to minimize operational downtime in the likely event of a...

Read More
How to Rethink your Cybersecurity Strategy in 5 Minutes

How to Rethink your Cybersecurity Strategy in 5 Minutes

Malware attacks are wreaking havoc on the international economy and costing businesses billions of dollars in lost revenue, operational shutdowns, and reputational damage. It’s likely that you may have even experienced an episode like this at your firm. The latest industry research indicates that 50% of surveyed executives experienced disruptions from malware 6-10 times over the past five...

Read More
A Weekend Reminder of Why Resiliency, Not Data Protection Matters

A Weekend Reminder of Why Resiliency, Not Data Protection Matters

This past weekend was a reminder of why companies need to focus more of their efforts on protecting the resiliency of their environments – even if those investments come at the expense of data protection. On both Saturday and Sunday, news reports and Twitter posts were trending with photos of Target stores full of customers standing in line because the point of sale systems were unable to...

Read More
Tackling the Cybersecurity Skills Shortage at the CyberForce Competition™

Tackling the Cybersecurity Skills Shortage at the CyberForce Competition™

Teaming Up with the Department of Energy and Argonne National Laboratory at the CyberForce Competition™ The US Department of Energy (DOE) hosted their CyberForce Competition™   in late 2018 within their network of National Laboratories across the United States. The competition was created with the goal of addressing the cybersecurity skill gap in the marketplace today.…

Read More
Data Security in a Quantum World

Data Security in a Quantum World

In a 2018 study by the Ponemon Institute, the global average cost of losing one record to a data breach was estimated to be $148. For the United States, this cost rose to $233, giving it the highest average total cost at $7.91 million per incident. With the world experiencing a Cambrian Explosion of data growth, forecasted at 42% through 2020, minimizing the impact of malware is essential.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons