NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets. A major utility company in the United States, whom we will call UTILCO, completed a large merger. As the operations were being combined, UTILCO wanted to have a system that allowed its corporate security managers to use job roles to decide who has access to specific facilities and how much area access they should have within those facilities.
A recent survey found that password-based authentication is no longer capable of meeting the demands of modern information security, and that 84% of respondents would support eliminating passwords all together.
ICS Cyber-Security is the conference where industrial control systems users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Read More
On DemandThe NIST Cybersecurity Framework recently celebrated its First Birthday, and it’s here to stay. This webinar will describe NIST’s approach to cybersecurity risk management, discuss corporate reactions to the Framework, and give you the tools to assess whether the Framework is relevant for your enterprise.
Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.