ISM June Release – an emphasis on OT security In the recent update to the Information Security Manual (ISM) published by ASD/ACSC in June 2024, we observed an increased emphasis on Operational Technology (OT). - The ISM emphasises the growing importance of security of the OT environment by recommending that, apart from Information Technology (IT), CISOs also take a leadership role in the OT security domain. Since we are in an era of convergence of IT and OT systems, this amendment of the ISM aligns with the critical need for an integrated cybersecurity strategy and IT+OT security governance. - The latest ISM update further recommends that CISOs, in addition to reporting to the board of directors, also report on to the organisation's audit, risk, and compliance committee for the security matters covering both IT and OT domains. This amendment instigates the management of risks emerging from the OT cyber threat landscape, and the organisations make informed decisions to strengthen their overall security posture. - Recognising the increasing risk from the supply chain in the OT domain, the recent ISM recommends the inclusion of the OT domain in the supply chain security initiatives of the organisation. Many ISM controls covering the sourcing, delivery and assessment of ICT equipment/services have been amended to include OT equipment/services. I think this is a great step forward for organisations to improve their overall cybersecurity posture and manage the risks from growing threats in today's IT-OT digital convergence landscape. Share your thoughts about the latest ISM updates related to the cyber security of the OT environment. #ACSC #CyberSecurity #ISM #ASD #ASD-ISM
Neeraj Malik (Raj)’s Post
More Relevant Posts
-
Cybersecurity Frameworks: Understanding NIST CSF, CIS Controls, and Others As cybersecurity professionals, understanding and implementing the right frameworks is essential to protect our organizations from ever-evolving threats. Let's dive into some key frameworks and how they can bolster our security posture. 1. NIST Cybersecurity Framework (CSF): Developed by the National Institute of Standards and Technology (NIST), the CSF provides a flexible and risk-based approach to managing cybersecurity risk. It consists of five core functions: Identify, Protect, Detect, Respond, and Recover. Organizations can use the CSF to assess and improve their cybersecurity capabilities. 2. CIS Controls: The Center for Internet Security (CIS) Controls offer a prioritized set of best practices for cybersecurity. These controls are divided into three categories: Basic, Foundational, and Organizational. They provide actionable guidance for implementing security measures to mitigate the most common cyber threats. 3. ISO/IEC 27001: ISO/IEC 27001 is an international standard for information security management systems (ISMS). It provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability. Compliance with ISO/IEC 27001 demonstrates a commitment to protecting data assets. 4. MITRE ATT&CK Framework: The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework is a knowledge base of adversary tactics and techniques based on real-world observations. It helps organizations understand and counteract the tactics employed by cyber adversaries, enabling more effective threat detection and response. 5. COBIT (Control Objectives for Information and Related Technologies): COBIT is a framework developed by ISACA for the governance and management of enterprise IT. It provides a comprehensive set of controls and best practices for aligning IT with business objectives, including cybersecurity considerations. By familiarizing ourselves with these cybersecurity frameworks, we can better assess our organization's security posture, identify areas for improvement, and implement effective risk management strategies. #CybersecurityFrameworks #NISTCSF #CISControls #ISO27001 #MITREATTACK #COBIT ?????
To view or add a comment, sign in
-
While NIS2 is a crucial step forward for enhancing cybersecurity across Europe, it will require organizations to increase their cybersecurity spending by an estimated 22% to ensure compliance as we have discussed in our previous post 👉 https://lnkd.in/dDfHYxe6 The directive focuses on prevention and resilience measures, and some of its most important requirements include: 1️⃣ Multi-Factor Authentication (MFA) Implementation 2️⃣ Strengthened Access Controls 3️⃣ Incident Response and Reporting 4️⃣ Comprehensive and Systematic Risk Assessment practices While many organizations have taken steps to implement MFA to some extent, according to the Keeper Security's survey (2023) over 50% still lack the appropriate access controls needed to fully secure their systems and meet NIS2’s stringent requirements. Cost and complexity are the reasons behind inadequate MFA implementations and limited access control practices. NIS2 requirements will demand organizations to implement multiple solutions and allocate more resources to cybersecurity. Selecting products that can address many requirements at the same time will help organizations to reduce indirect and direct costs, but also simplify compliance efforts. 🛡 That's where the adoption of a seamlessly integrated MFA & Privileged Access Management (PAM) solution, like Excalibur, comes into play. Our solution is Secure-by-Default, helping organizations to increase their overall security posture., At the same time our seamlessly integrated and phone-centric MFA & PAM covers multiple NIS2 requirements, in one go, making the need for investment more effective. 📌 Ready to streamline your NIS2 compliance? Contact us today to learn more and book a demo of Excalibur’s comprehensive MFA & PAM solution. #Cybersecurity #NIS2 #MFA #PAM #Compliance #RiskManagement #AccessControl
To view or add a comment, sign in
-
A Weekly Look at PCI DSS Compliance: Boost Security with Frequent Testing 🛡️ Being compliant with PCI DSS is an ongoing process that calls for diligence and preventative actions. Testing security systems and procedures on a regular basis is an essential tactic in this journey. This practice is essential as a first line of defense against potential threats and vulnerabilities, in addition to being required by the PCI DSS standards. The following are some effective ways to incorporate routine testing into your security protocol: Make a Schedule: Sync your testing regimen with PCI DSS requirements, making sure thorough evaluations happen at least once a year or whenever major system modifications take place. Activate Experts: For your testing requirements, make use of certified experts. Qualified Security Assessors (QSAs) for in-depth evaluations and Approved Scanning Vendors (ASVs) for external scans can provide priceless insights. Leverage Technology: Use automated tools to continuously scan for vulnerabilities and detect intrusions, allowing for quick reactions to new threats. Take a Wholesome Approach: Conduct both external and internal scans to provide a more comprehensive view of your security environment and to find any potential vulnerabilities from all directions. Act with Intelligence: Set risk-based priorities for vulnerabilities and address them, recording all discoveries and remediation efforts so you can monitor your progress. Adopting routine testing greatly strengthens your organization's defense mechanisms and helps you comply with PCI DSS. Integrate these practices into your security strategy to stay ahead of the curve. #PCIDSS #CyberSecurity #DataProtection #Compliance #InfoSec #RiskManagement #SecurityTesting
To view or add a comment, sign in
-
Adapting NIST Cybersecurity Framework 2.0 for Optimizing Physical Protection. " Physical Security Framework" The recent release of the National Institute of Standards and Technology : NIST Cybersecurity Framework (CSF) 2.0 has gained significant attention across various sectors, with many organizations eager to adopt its principles. One notable addition to the framework is the "Govern" function, which focuses on establishing plans and overseeing the other functions. This insightful approach, I propose adapting the CSF 2.0 guidelines to develop a tailored framework for physical security. " Physical Security Framework " It consolidates the following key components: 1. Govern: Establish policies, procedures, and accountability measures to guide and oversee the entire physical security functions. 2. Identify: Conduct thorough assessments to identify what assets to be protected, what are vulnerabilities, and potential threats. 3. Protect: Implement protective measures to safeguard assets and mitigate loss and damage. 4. Detect: Monitor and identify potential threat in a timely manner. 5. Delay: Implement countermeasures to delay the progress of adversaries, providing additional response time. 6. Response: Execute effective incident response to address and contain security incidents. 7. Collaborate: Initiate collaboration with internal and external stakeholders to optimize security effort. There 3 significant modification in this framework. First is the addition of the "Delay" function, which is critical in the physical security context. Unlike the digital realm, the physical world involves movement and motion,so it is decisive to implement countermeasures that can slow down adversaries and buy time for an effective response. Second is the omission of the"Recover" function. While recovery is undoubtedly important, but not all security departments may be directly responsible for this aspect. Some organizations may assign recovery tasks specially depending on their specific needs and structure. Third is "Collaborate" ,the framework also emphasizes the importance of collaboration, with several collaborative aspects, including but not limited to: 🚩Information sharing : Augmenting situational awareness and best practices. 🚩Joint Training : Improving preparedness and capabilities. 🚩Standardization : Enhancing efficiency and interoperability. 🚩Intelligence : Informing precise risk assessments. 🚩Technology and Resource sharing : Optimizing cost-effectiveness. By leveraging the expertise and insights embedded in the NIST CSF 2.0 and tailoring it to the unique challenges of the physical realm, the Physical Security Framework could offer a comprehensive and optimized tool and encourage security professional to drive continuous improvement and safeguarding people critical assets, and operations. #physical #cybersecurity #nistcsf #security #asec Pol.Capt.Kittiphoom Kerdman Strategic Security Management Innovator
To view or add a comment, sign in
-
🚀Day 20 : Cybersecurity Frameworks (NIST, ISO) & The CIA Triad As organizations evolve in the digital age, following robust cybersecurity frameworks becomes crucial for mitigating risks. Today, let’s dive into two widely used cybersecurity frameworks and the essential CIA Triad that guides them. 🔒 NIST Cybersecurity Framework Developed by the National Institute of Standards and Technology, the NIST framework offers a systematic approach to managing and reducing cybersecurity risks. It is divided into five core functions: 1. Identify: Understand and manage cybersecurity risks to systems, people, assets, and data. 2. Protect: Implement appropriate safeguards to ensure critical infrastructure services. 3. Detect: Develop mechanisms to detect cybersecurity incidents. 4. Respond: Take action in the event of a cybersecurity event. 5. Recover: Restore any services or capabilities impaired by an attack. NIST is highly flexible, allowing organizations of any size or industry to adapt and integrate its principles into their existing risk management programs. 🔐 ISO/IEC 27001 The ISO/IEC 27001 standard is a globally recognized framework that focuses on creating a robust Information Security Management System (ISMS). This framework emphasizes continuous improvement and uses a risk-based approach to manage sensitive information systematically. It helps organizations: 1. Identify information security risks. 2. Design and implement controls to mitigate those risks. 3. Regularly evaluate and improve the effectiveness of these controls. ISO 27001 is essential for organizations aiming for global compliance and improving their information security practices. 🔑 The CIA Triad: The Foundation of Cybersecurity The CIA Triad is a model that serves as the foundation for cybersecurity policies and practices. It consists of: 1. Confidentiality: Ensuring that information is accessible only to authorized individuals, protecting it from unauthorized access or disclosures. 2. Integrity: Safeguarding the accuracy and reliability of data, ensuring it is not altered or tampered with by unauthorized users. 3. Availability: Guaranteeing timely and reliable access to data for authorized users when they need it. Both NIST and ISO/IEC 27001 frameworks incorporate the CIA Triad principles to ensure comprehensive protection of information assets. By following these frameworks, organizations can create a structured and globally accepted defense against growing cybersecurity threats. #Cybersecurity #NIST #ISO27001 #CIATriad #InformationSecurity #RiskManagement #DaysOfCybersecurity
To view or add a comment, sign in
-
Hi LinkdIn Fam, Gaining & Sharing knowledge on Cyber Security, 🌐 Strengthening Cybersecurity with ISO 27001: The Need of the Hour 🔐 In today’s hyper-connected world, cybersecurity is no longer optional—it's essential. With data breaches and cyber-attacks becoming increasingly sophisticated, businesses must stay ahead of the curve. That's where ISO 27001 comes in! 🌟 ISO 27001 is the global gold standard for Information Security Management Systems (ISMS). It provides organizations with a systematic approach to managing sensitive information, ensuring it remains secure from both internal and external threats. Key Benefits of ISO 27001: •Risk Management: Helps identify and mitigate risks proactively. •Compliance: Assures clients and stakeholders of adherence to global best practices. •Customer Trust: Enhances credibility and builds trust by protecting valuable data. •Continuous Improvement: Encourages ongoing enhancement of security controls and measures. 🚀 Implementing ISO 27001 is not just about compliance; it's about cultivating a security-first mindset that permeates the entire organization. The result? Resilient systems, enhanced protection, and stronger business continuity. Now’s the time to prioritize cybersecurity. Are you ready to elevate your organization’s security game? 💼🔒 #Cybersecurity #ISO27001 #DataProtection #RiskManagement #Infosec #Compliance #SecurityFirst #DataPrivacy
To view or add a comment, sign in
-
🚀 Unlocking NIS2 Compliance: Why You Need XDR Now! 🔒 As organisations strive to meet the NIS2 Directive's stringent cybersecurity requirements, coming into effect on October 17th, Extended Detection and Response (XDR) solutions such as Barracuda XDR are becoming indispensable. Here’s why: 1. Holistic Threat Detection: XDR integrates data from multiple sources, providing a comprehensive view that enhances incident detection. 2. Swift Incident Response: With automated capabilities, XDR streamlines responses to threats, ensuring quick action when it matters most. 3. Continuous Monitoring: Gain real-time visibility across all assets to identify vulnerabilities and maintain compliance. 4. In-Depth Reporting: Generate detailed reports that help you meet NIS2’s reporting obligations seamlessly. 5. Proactive Risk Management: Incorporate threat intelligence to stay ahead of emerging risks. 6. Enhanced Collaboration: Foster teamwork and information sharing to strengthen your security posture. 💡 Embrace Barracuda XDR to not only bolster your cybersecurity defences but also ensure compliance with NIS2! #Cybersecurity #NIS2 #XDR #Compliance #ThreatDetection
To view or add a comment, sign in
-
Applying ISO/IEC 27001/2 and the ISA/IEC 62443 Series for Operational Technology Environments
Cybersecurity Consultant | Researcher | OT - IT GRC | MSc InfoSec and Digital Forensic | ISA 62443 IC32 Certified | Security+
Why Integrate ISO/IEC 27001/2 with ISA/IEC 62443? Combining these standards ensures that all aspects of cybersecurity are covered, from administrative controls to specific OT requirements. As,the ISO/IEC 27001/2 provides a broad framework for IT security and ISA/IEC 62443 addresses the unique needs of OT environments. Also, integrating these standards helps organizations identify, assess, and mitigate risks effectively. This combined approach ensures that potential cyber threats are managed comprehensively, protecting critical operations from disruptions. By extending an existing ISMS to include OT-specific requirements from ISA/IEC 62443, organizations can create a unified security program. This integration supports a defense-in-depth strategy, addressing vulnerabilities at various levels and ensuring continuous protection. Practical Steps for Integration: 1. Extend and Adapt ISMS: Utilize your existing ISMS based on ISO/IEC 27001/2 and incorporate OT-specific requirements from ISA/IEC 62443. 2. Map Controls and Requirements: Create a unified security program by mapping controls from both standards. This ensures that all relevant security aspects are addressed. So,Integrating ISO/IEC 27001/2 with ISA/IEC 62443 creates a robust cybersecurity framework that addresses the unique challenges of OT environments. This holistic approach not only strengthens risk management but also supports operational continuity, ensuring that the organization can thrive in today’s digital landscape. #Cybersecurity #OTSecurity #ISO27001 #ISA62443 #IndustrialSecurity #RiskManagement #ISMS #OperationalTechnology
To view or add a comment, sign in
-
Day 13 of #30daysoflearningwithodinaka The NIST Cybersecurity Framework is a voluntary framework that encompasses standards, guidelines and best practices to manage cybersecurity risk in an organisation. NIST CSF 2.0, the lastest version saw an addition to the previously existing 5 core function. ▶️ Govern; this is the bew function added to the CSF framework, it deals with the organisation broad risk management strategy. This is where the organisation risk management strategies and policies are established, communicated and monitored ▶️ Identify; understand the organisation's assets, suppliers and related cybersecurity risk. In this function, you simply monitor systems and devices in an organisation internal network to help security teams manage potential risks and their effects. ▶️ Protect; once you have identified assets and risk, safeguards to manage the organization’s cybersecurity risks are put in place through implementation of policy, procedures, trainings and tools that help mitigate threat. ▶️ Detect; in this function, you identify potential security incidents and improve monitoring capacity to increase speed and efficiency of detection. ▶️ Respond; once you have detected a cybersecurity incidence, make sure proper procedures are used to contain, neutralize and analyse security incident and also improve the security process. ▶️ Recover; this is the last function in the CSF framework. Here, you restore affected assests and systems back to normal operation to reduce the effects of cybersecurity incident. #cyber #CyberGirls2024 #NISTCSF #womenincybersecurity #cybersecurity #informationsecurity
To view or add a comment, sign in