AST Magazine February 2018 final-feb-2018 | Page 26
Volume 20
Once the task force has completed the map, it needs to point out
the vulnerabilities – both human and technological – to the net-
work, and then prioritize the operational risks.
February 2018 Edition
About the Author
The team can then use the vulnerabilities to work up scenarios in
which cyber criminals can exploit the soft spots in the operation.
The scenarios provide contexts for cyber security specialists to fortify
technological solutions.
Cyber security software that records network and application per-
formance baseline data have an important role to play in network
defenses.
OT staff will receive alerts when malware attempts to disrupt the
processing flow of software on the network.
Management can also leverage use cases to train staff on behaviors
that will thwart attacks.
Mr. Paul D. Myer serves as the Chief Executive Officer at
Veracity Industrial Networks, Inc.
Mr. Myer served as Senior Vice President of Corporate Devel-
opment at M86 Security, Inc. and also served as its President
and Chief Operating Officer.
Mr. Myer is a technology industry veteran who has held manage-
ment positions with leading technology companies, including NEC
Technologies and Compaq Computer Corporation. He holds a B. A.
(Veracity is driving innovation and redefining what is possible with the future of
industrial networking cybersecurity.)
For instance, training offerings may include how to detect and re-
port email phishing expeditions where hackers attempt to infiltrate
networks when users click on “baited” links that download mali-
cious payloads or lead to websites infected with viruses.
And while globally most critical infrastructure operators are per-
sistently drilled on managing conventional issues that might beset
a power grid, very few are trained on how to detect, report and
rectify a cyber security breach.
It is possible for power utilities executives to determine they have
realistically reduced the risk for successful subversion of their
operations.
Veracity Industrial Networks Competes in 2018
‘ASTORS’ Homeland Security Awards Program
A ST focuses on Homeland Security and Public Safety
Breaking News, the Newest Initiatives and Hottest Tech-
nologies in Physical & IT Security, essential to meeting
today’s growing security challenges.
As an ‘ASTORS’ competitor, Veracity Industrial Networks
will be competing against the industry’s leading provid-
ers of Innovative Cyber Critical Infrastructure Solutions.
They can avoid becoming the next “red flag warning” by heeding
the lessons of other countries already under siege by well-orga-
nized cyber criminals.
[1] https://dragos.com/blog/crashoverride/CrashOverride-01.pdf
24