1661879641802 Deekimataschneiderarticle

3 pillars of an effective cybersecurity program

Oct. 11, 2021

“Without the proper behavior, people can be the weakest link in maintaining your cybersecurity posture.” Schneider Electric’s Dee Kimata led a wide-ranging panel discussion on the essential aspects of securing one’s organization from cyber threats.

With an increase in the use of digital technology comes increased security threats from ever nimble and more aggressive attackers. Threats are constantly evolving, and therefore they need constant attention. In 2020, ransomware attacks grew by 435% compared to the previous year, according to the Bitdefender 2020 Consumer Threat Landscape Report, with a similar increase projected this year. 

To better understand cybersecurity best practices and how companies can protect themselves, Dee Kimata, director of cybersecurity offer management at Schneider Electric, hosted an Innovation Talks discussion that focused on the three main pillars of any effective cybersecurity program: people, process and technology.

Graham Rennie, director of technology and standards at Schneider Electric, began the discussion with the technology element, including best practices for reference architecture and how to secure the industrial automation space. First, Rennie said, it’s important to understand what security architecture is and what it’s trying to achieve. Defined as “the practice of designing computer systems to security goals,” security architecture is a vague term and one that can create confusion, Rennie said.

Read more on ControlGlobal.com.

Sponsored Recommendations

Programmable logic controllers (PLCs) and programmable automation controllers (PACs) provide viable options for machine control. This Control Design collection explains the differences...
Motion control engineers tend to focus on torque and speed specifications during the design process, but often fail to notice the unique features that differentiate a high-quality...
Covering the basics of choosing the right position feedback option for your application.
This white paper describes advantages of using advanced angle sensor technologies and focuses on best practices for correctly implementing non-­contact and touchless angle sensors...