Diagram decorative image

The Great Divide in Cybersecurity

Dark web criminals are finding new ways to exploit backdoor access to private information.

Cybersecurity has traditionally been the concern of information technology (IT) professionals, but as hackers have become more sophisticated, operational technologies (OT) have become more vulnerable. As part of the Industrial Cybersecurity Pulse Expert Interview SeriesBryan Bennett discusses how the IT/OT divide is becoming blurred when it comes to access to sensitive data. He also addresses how “smart” building managers can protect their facilities:

Where Are Buildings Most Vulnerable to Cyber-Attack?

Why are operational technologies the new target?

Hackers can lurk in unsuspected places for an average of 200 days before being detected. Here’s where your organization may be at risk.

 

What is the best way to uncover cyber-intrusions?

Cyber-criminals are experts at infiltrating your data environment. Bringing in an outside set of eyes to evaluate your systems is the best way to protect sensitive information.

 

You can also view the entire feature, “The IT/OT Divide: Expert Interview Series, Bryan Bennett, ESD” here.

For more information on cybersecurity best practices, contact Bryan.

Related News

Interested in learning more? Check out these related news items.

Wolf Warns of Cybersecurity Threats to Real Estate Industry

How vulnerable are commercial and institutional real estate buildings to cyberattacks? (Learn more about Wolf’s cybersecurity advice.)

ESD Connects at Career Fair

Described as the engineering, computer science, and information technology job fair of the year, “The Career Networking Experience – Fall 2022” kicks off in Chicago later this month. (Learn more about the Job Fair.)

International Audience Hears From ESD Expert About Cybersecurity Risks

An ASIS International webinar convened earlier this year focused on the risks associated with the increasingly complex and interconnected systems of modern smart building. (Learn more about Wolf’s presentation.)