@BEERISAC: OT/ICS Security Podcast Playlist

John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk


Listen Later

Podcast: The PrOTect OT Cybersecurity Podcast (LS 31 · TOP 5% what is this?)
Episode: John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk
Pub date: 2023-11-02



About John Cusimano: John Cusimano is a seasoned business and thought leader, boasting over 30 years of expertise in process control, functional safety, and operational technology (OT) and industrial control systems (ICS) cybersecurity. With a track record of conducting numerous OT cybersecurity vulnerability assessments, he has played a pivotal role in establishing cybersecurity programs for numerous companies. As a prominent member of the ISA 99 cybersecurity standards committee, he chaired the subcommittee responsible for crafting the ISA/IEC 62443-3-2:2020 standard and developed multiple training courses on OT cybersecurity, showcasing his extensive knowledge and influence in the field.


In this episode, Aaron and John Cusimano discuss:

  • The challenges of quantifying risk in OT environments
  • Prioritizing cybersecurity risks and cybersecurity measures in industrial control systems
  • Identifying critical operational risks and mitigation strategies in industrial environments
  • Navigating risks and embracing opportunities in the face of technological advancements


Key Takeaways:

  • Understanding the complex interplay between physical and cyber risks is crucial; utilizing structured frameworks like the ISA 62443 Standard not only provides a starting point for overwhelmed organizations but also emphasizes the importance of tailoring security measures to the specific, high-impact vulnerabilities unique to each facility.
  • Prioritizing industrial cybersecurity involves breaking down complex systems, evaluating specific vulnerabilities, and engaging in focused discussions between experts and business stakeholders to identify critical risks, ensuring an effective security strategy.
  • In cybersecurity assessments, identifying and prioritizing risks is crucial; often, seemingly small oversights, like unsecured backups, flawed file transfer mechanisms, or unchecked permissions in asset management systems, can lead to significant vulnerabilities, emphasizing the need for comprehensive evaluation and proactive measures in securing critical infrastructure.
  • In the rapidly evolving world of control systems and cybersecurity, the key is to understand and manage risk rather than striving for absolute security, while also embracing technological advancements with caution and vigilance.


"The other approach that a lot of people take is just piling on every security control out there. And that's also not tenable either long term. Sometimes it's actually counterproductive to security because every tool you put in has access." — John Cusimano

 

Connect with John Cusimano:  

Email: [email protected]

Website: www.armexa.com

LinkedIn: https://www.linkedin.com/in/john-cusimano-icssec/ & https://www.linkedin.com/company/armexa



John will be speaking at the 18th Annual API Cybersecurity Conference for the Oil and Natural Gas Industry next week: https://events.api.org/18th-annual-api-cybersecurity-conference-for-the-oil-and-natural-gas-industry


Connect with Aaron:

LinkedIn: https://www.linkedin.com/in/aaronccrow


Learn more about Industrial Defender:

Website: https://www.industrialdefender.com/podcast 

LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/

Twitter: https://twitter.com/iDefend_ICS

YouTube: https://www.youtube.com/@industrialdefender7120


Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.



The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
...more
View all episodesView all episodes
Download on the App Store

@BEERISAC: OT/ICS Security Podcast PlaylistBy Anton Shipulin / Listen Notes

  • 4.5
  • 4.5
  • 4.5
  • 4.5
  • 4.5

4.5

8 ratings


More shows like @BEERISAC: OT/ICS Security Podcast Playlist

View all
Stuff You Should Know by iHeartPodcasts

Stuff You Should Know

78,338 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,000 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

Risky Business by Patrick Gray

Risky Business

376 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

653 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,020 Listeners

The Defender's Advantage Podcast by Mandiant

The Defender's Advantage Podcast

31 Listeners

Smashing Security by Graham Cluley

Smashing Security

320 Listeners

The Daily by The New York Times

The Daily

112,683 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,016 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

177 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

Dr. James Beckett: Sports Card Insights by Dr. James Beckett

Dr. James Beckett: Sports Card Insights

113 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

136 Listeners