t cht lk
I want to know how somebody is modifying a safety system , not which one it is . Where intel shines are that it ’ s not just creating another detection or alert . It ’ s understanding the context and prioritising the things we see so that we take the right response when something happens .
How important is the Middle East market for your company , and how do you work with partners to provide solutions and services to end-users ?
Our tagline is ‘ safeguarding civilisation ’, and to us , that means something . I think this region specifically has some strategic adversaries , and we are at an inflection point where they ’ re taking advantage of the transformation happening to industries here .
The Middle East was the first place we went outside of the US . Our first team on the ground here was based in Riyadh , and then we built out our office in Dubai , and we are starting to work in Kuwait and Oman .
We have found that this region , more than most places globally , is all about partnership . leap of faith to try and do right by their community , we are with them every step of the way to ensure they can be successful .
How can organisations implement simple but effective security policies and procedures to lower their cyber risk ?
It ’ s a very daunting thing to be a CISO or a CEO looking at this problem for two reasons . One , it ’ s not been done before , and now there ’ s a significant focus on it – you ’ ve got to walk a very delicate balance of helping to inform on the risk without coming off with fear , uncertainty and doubt .
Second , there are many security controls , products and services in enterprise IT . It can seem overwhelming that you might now need to copy that into the other side of the business , which is larger and more complex .
But you don ’ t need to copy and paste what you have in IT . Instead , we need to look at a couple of critical controls and figure out the OT specific nature of them and apply those well and consistently .
If we come as a seller of a box , demanding payment , and saying we ’ ll see you in three months , that ’ s not going to work . We have no better partners in the world than the ones we ’ ve developed here .
How does Dragos set itself apart from others in this market ?
First , we take that intelligent further approach . Dragos professionals have been part of the response to any significant industrial attack that ’ s ever occurred . Those insights are things that we can codify and bring to our customers .
Second , we ’ ve hired the best of the best . We don ’ t just operate as a technology company , we have a services team and an intel team , and we want to have really smart individuals who are used to being in these environments .
Step one : Figure out a defensible architecture .
Step two : Get the visibility and monitoring in place to understand what ’ s going on and what needs to be protected .
Step three : Have multi-factor authentication wherever you can put it in terms of remote access .
Step four : Ensure you have a vulnerability management programme – don ’ t try to fix every vulnerability out there .
Step five : Have an ICS specific incident response plan .
If you were to do those five controls well across your operations environment , you ’ d have a world-leading OT security programme . p
We do many ancillary things that aren ’ t business lines for us , like training or learning management systems with classes . Still , these things are helpful in that partnership discussion and making sure that people can be successful .
Third , through being a Dragos customer , you get that partnership feel from the moment the PO is signed . Most of our focus and the way that we ’ ve built our sales , customer success and professional services teams is to understand the risk that a customer ’ s taking and the work ahead of them so that when they take that
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 77