1661879641802 Deekimataschneiderarticle

3 pillars of an effective cybersecurity program

Oct. 11, 2021

“Without the proper behavior, people can be the weakest link in maintaining your cybersecurity posture.” Schneider Electric’s Dee Kimata led a wide-ranging panel discussion on the essential aspects of securing one’s organization from cyber threats.

With an increase in the use of digital technology comes increased security threats from ever nimble and more aggressive attackers. Threats are constantly evolving, and therefore they need constant attention. In 2020, ransomware attacks grew by 435% compared to the previous year, according to the Bitdefender 2020 Consumer Threat Landscape Report, with a similar increase projected this year. 

To better understand cybersecurity best practices and how companies can protect themselves, Dee Kimata, director of cybersecurity offer management at Schneider Electric, hosted an Innovation Talks discussion that focused on the three main pillars of any effective cybersecurity program: people, process and technology.

Graham Rennie, director of technology and standards at Schneider Electric, began the discussion with the technology element, including best practices for reference architecture and how to secure the industrial automation space. First, Rennie said, it’s important to understand what security architecture is and what it’s trying to achieve. Defined as “the practice of designing computer systems to security goals,” security architecture is a vague term and one that can create confusion, Rennie said.

Read more on ControlGlobal.com.

Sponsored Recommendations

High Sensitivity Accelerometers to Monitor Traffic and Railroad Vibration for Semiconductor Manufacturing

This paper examines highly sensitive piezoelectric sensors for precise vibration measurement which is critical in semiconductor production to prevent quality and yield issues....

Simulation for Automation Guide

How digital twin solutions are expanding the capabilities of plant engineers.

Enhancing HMI Security and Accessibility with Cloud VPN Solutions

Enhance HMI security and remote access with Beijer’s cloud VPN solution. Enjoy advanced encryption, easy setup, and secure access via laptops, smartphones, or tablets. Cut costs...

Motor Encoders: What They Are and How They Work

Motor encoders are rotary encoders adapted to provide information about an electric motor shaft's speed and/or position. Like rotary encoders, motor encoders are most commonly...