OT Cybersecurity: ‘Do No Harm’ Doesn’t Mean ‘Do Nothing’

OT Cybersecurity: ‘Do No Harm’ Doesn’t Mean ‘Do Nothing’

In our previous blog, Why Operational Technology (OT) may be your Cybersecurity Achilles’ Heel, we discussed how OT systems had been historically “closed” and that they have evolved over time to become more “open” and able to leverage common off-the-shelf IT technologies. With the advent of this industrywide shift, we identified a departmental clash between OT and IT personnel on how to best...

Read More
The Process of Digitizing the Utility Industry: Listening to Customers, Overcoming Barriers, Driving Initiatives, and Staying Secure

The Process of Digitizing the Utility Industry: Listening to Customers, Overcoming Barriers, Driving Initiatives, and Staying Secure

Utility representatives and service providers from North America and South America gathered at the UTC Power Grid 4.0 Digitalization Forum on Oct. 16-18 to discuss and debate the changes occurring in the utility industry. Utility executives presented on topics that included the business drivers of digitization, the keys to success on the path to digitization, and considerations on how to...

Read More
4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

Recently, several members of our M&A practice participated in the PEI Operating Partners Forum in New York City, where the private equity community gathered to share best practices on value creation. Here are four takeaways we found interesting and wanted to share: Behavior adaptability is insanely important to digital transformation. And they don’t mean adaptable businesses, they mean...

Read More
Accepting the Leadership Challenge: Vadim Orlov on a Career in Innovation

Accepting the Leadership Challenge: Vadim Orlov on a Career in Innovation

Here at West Monroe, we encourage our employees to stretch beyond their current role, take ownership for their own career growth, and embrace the spirit of ‘intrapreneurship’ to better the firm. In this series, we speak to those who have stepped up to #acceptthechallenge and become a better leader. To kick things off, we interviewed Vadim Orlov, a member of West Monroe’s Technology practice...

Read More
Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

We recently shared an experience from a network segmentation project during which we discovered a technical vulnerability affecting Cisco’s Firepower Threat Defense firewall line. The firewall, itself, was not the problem, but, under specific conditions that are not uncommon in many environments, it allowed access through the firewall to systems it was meant to protect.…

Read More
How do Credit Unions Stay Relevant in the Age of Big Bank Mega-Tech Investments?

How do Credit Unions Stay Relevant in the Age of Big Bank Mega-Tech Investments?

Despite any lingering recession-era skepticism of big banks and their motivations, we are now seeing a significant shift in their favor – even among customers who were affected by the last downturn. The ten largest U.S. retail banks now manage 48% of total consumer deposits, up from 39% in 2009. This uptick is largely a result of their investments in digital technology.…

Read More
Are Utilities Moving to the Cloud? Don’t Wait for Regulators to Make the First Move

Are Utilities Moving to the Cloud? Don’t Wait for Regulators to Make the First Move

As part of our cloud advisory engagements, we work with clients to determine their strategic visions and goals for adopting cloud technologies. Cloud adoption in most industries is well underway but the landscape within energy and utilities is a bit different. This is primarily driven by two factors: Utilities’ unique IT organizations, matched with their technical and operational...

Read More
Why Operational Technology may be your Cybersecurity Achilles’ Heel

Why Operational Technology may be your Cybersecurity Achilles’ Heel

Everyone in business is familiar with information technology (IT) and understands what it means, but what about operational technology, often abbreviated “OT”? At first glance, IT and OT appear similar because they share similar technologies like IP networks and Windows operating systems – but they have very different objectives. While IT systems generally support office workers and...

Read More
Utility Analytics: How A (Good) Data Framework Today Leads To Analytical Insights Tomorrow

Utility Analytics: How A (Good) Data Framework Today Leads To Analytical Insights Tomorrow

As we engage utilities on their progress and insights deploying data analytics platforms and use cases, we’re noticing a common theme. When embarking on more complex operational technology (OT) use cases, they are finding gaps in historical records that require them to revisit or rethink their data acquisition, storage, and retrieval strategies.…

Read More
3 Ways Enterprises Are Addressing Blockchain Privacy Concerns

3 Ways Enterprises Are Addressing Blockchain Privacy Concerns

Blockchain has been touted as the great connector to integrate businesses under consortium networks. It’s ability to verify data using smart contracts and provide transparency across network participants through immutable shared data has people talking about a technical revolution. However, this benefit has been a double-edged sword because the enterprise world is skeptical about sharing...

Read More
Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

This week brought another set of headlines about a large data breach—this time at Capital One. In this case, the alleged attacker is domestic and the federal indictment provided some details of how the breach occurred. In this case, a misconfigured firewall allegedly allowed Paige Thompson to remotely execute commands against an Amazon Web Services (AWS) server.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons