Intelligent CISO Issue 77 | Page 39

f

e

a

t

u

r

e

Sertan Selcuk , VP for METAP and CIS , OPSWAT and their interaction with the environment will allow defenders to pinpoint protocol violations . Dashboards keep this information current , which is useful for compliance and audits .
Other considerations include the encryption of sensitive data on removable media and on network-permanent storage , and the training of staff and third-party vendors about the risks of peripherals and company protocols on using them . As these governance frameworks continue to shape the industry , all parties should comply with best practice as a matter of muscle memory .
Even when precautions become second nature , security and business leaders should always remember that as the threat landscape evolves , so must the protocols employed to keep it in check . It is worth remembering that exploitation of removable media is one of the oldest methods of cyberattacks . In an age of laser weapons , threat actors will not hesitate to go to extreme measures for them to win , and that goes for the state-backed groups most found to be behind attacks on critical infrastructure .
To overcome the challenges of protecting critical assets , organisations and OT security operators must look to defence-in-depth strategies that mix optimal technologies with open-eyed policies . The first step in fixing anything is acknowledging the problem . Here , we recognise that peripheral and removable media is a threat , and the subsequent steps are up to us .
WWW . INTELLIGENTCISO . COM 39