Cyber Security Featured Part 3: How to Build an Effective Cyber Security Program Learn how to integrate a robust cybersecurity program into your Enterprise Risk Management, engage a cross-functional team, adopt industry standards, and safeguard against third-party threats. Don't leave your critical infrastructure exposed.
Cyber Security Featured Part 2: Understanding the Technical Twists of Threats and Incidents Explore the technical underpinnings of today's cyber threats, from the inner workings of ransomware to the hidden vulnerabilities in third-party relationships. Dive into real-world incidents and gain insights to fortify your digital defenses.
Cyber Security Featured Part 1: The Cyber Security Threat Landscape for Critical Infrastructure October is #CybersecurityAwarenessMonth! Dive into the latest threats to critical infrastructure, from ransomware to supply chain risks.
Cyber Security Quantifying the Financial Impact of Cyber Breaches in the Utility Sector Utility CxOs ask the question: how do you quantify the potential financial impact of cyber breaches? This has been a long-standing challenge in the utility sector and one that can lead to frustration for IT and OT leaders who often struggle to justify cyber security budgets. Utility CxOs intuitively understand
Cyber Security Protecting Your Assets using Holistic Security Solutions Similar to the cyber security attacks that have been experienced by many electric utilities, physical security threats are also on the rise. As stated in the news, attacks on electrical systems were up by nearly 80% in 2022 compared to the previous year.
Cyber Security Cyber Security Awareness Month Part 3: Proven Techniques on How to Implement Effective Cyber Security Governance Practices for Your Program In appreciation for Cyber Security Awareness Month during October, we are excited to provide a three-part article series on Cyber Security Risk Management for Critical Infrastructure Executives and Board Directors. This series will cover the following topics: 1. The Increasingly Threatening Cyber Threat Landscape for Critical Infrastructure Operators 2. Guidelines
Cyber Security Cyber Security Awareness Month Series Part 2: How to Build an Effective Cyber Security Risk Management Program In appreciation for Cyber Security Awareness Month during October, we are excited to provide a three-part article series on Cyber Security Risk Management for Critical Infrastructure Executives and Board Directors. This series will cover the following topics: 1. The Increasingly Threatening Cyber Threat Landscape for Critical Infrastructure Operators 2. Guidelines
Cyber Security Cyber Security Awareness Month Series Part 1: The Basics of Cyber Risk Management for Critical Infrastructure Executives and Board Directors In appreciation for Cyber Security Awareness Month during October, we are excited to provide a three-part article series on Cyber Security Risk Management for Critical Infrastructure Executives and Board Directors. This series will cover the following topics: 1. The Increasingly Threatening Cyber Threat Landscape for Critical Infrastructure Operators 2. Guidelines
Cyber Security Agencies Warn of Cyber Threats Targeting ICS/SCADA Devices The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) release a joint Cybersecurity Advisory (CSA) to warn that certain advanced persistent threat (APT) actors have exhibited the capability to gain full system access to multiple
Cyber Security The Cyber Incident Reporting for Critical Infrastructure Act U.S. Congress passed landmark legislation that mandates critical infrastructure providers and federal agencies promptly report cyberattacks and ransomware payments to the Cybersecurity and Infrastructure Security Agency. Read the Fact Sheet here! Fact Sheet Cyber Incident Reporting for CI Act 2021 Draft Fact-Sheet-Cyber-Incident-Reporting-for-CI-Act-2021-Draft.pdf 206 KB download-circle
Cyber Security Supply Chain/Third Party Breaches – Your New #1 Highest Cyber Risk For years the security community has viewed internal resources as presenting the greatest cyber risk to an entity. In 2021, shortly on the heels of the much-publicized SolarWinds breach, as well as many other supply chain/third party cyber breaches, it can be argued that supply chain/third parties now
Cyber Security Mapping of CIP Standards to NIST CSF On July 27th, 2020, the North American Reliability Corporation (NERC) released new reference material for mapping CIP Standards to the NIST Cybersecurity Framework. The latest update from NERC provides much needed guidance on how NERC CIP standards are represented in a NIST profile. Acumen has developed an integrated cybersecurity program