Industrial cybersecurity threats are becoming increasingly common and can have a significant financial and reputational impact on businesses. According to Trend Micro's 2022 Industrial Cybersecurity report, 72% of industrial customers were disrupted at least 6 times in the past 12 months, at an average cost of $2.8 million per incident.
Operational Technology (OT) exploits are emerging as a significant threat to businesses today. As IT and OT environments become more interconnected, the attack surface expands, making it easier for adversaries to exploit vulnerabilities. Perimeter-based security controls such as firewalls are no longer enough to protect OT systems against sophisticated attacks. OT OEMs need to respond to customer needs in order to remain secure and competitive.
Public key infrastructure (PKI) is a low-cost, flexible, time-tested, and standardized solution that delivers on the three key capabilities necessary for OT system security: authentication, confidentiality, and integrity. PKI helps safeguard data by providing end-to-end data encryption, both at rest and in transit. It helps ensure data stored in OT systems and communication between IT and OT systems remain insulated from attacks. Encrypting communications also helps meet compliance requirements.
SecureG provides a customer-specific private PKI system that integrates with OEM OT devices and systems. It delivers unique identities to every device and server in a customer system. PKI is a must-have for securing operational technology, and it is cost-effective and flexible. By integrating PKI into IoT devices, OT OEMs deliver better security while maintaining competitively priced solutions.
Industrial cybersecurity threats are a significant concern for critical infrastructure, and OT exploits are becoming increasingly common. If you are thinking about how to add security to your OT product line, contact SecureG for help. We recognize that every OEM is different, and we partner with each of our customers to help design the security, policies, and procedures that make sense for your business.
Prior to SecureG, Todd worked at Juniper Networks as both a technical trainer and systems engineer where he obtained JNCIE #0007 and ran the training and certification programs for the East Coast. At Juniper, he became a Subject Matter Expert on Internet backbone routing, and managed a team of 12, co-authored two books and built a modern training facility to support operations. Todd left Juniper for Starent Networks where he worked as a Solution Architect and became a SME on mobile networking for 2.5G, 3G, and 4G networks including LTE and eHRPD. After Starent Networks Todd joined Movik Networks where he helped develop and sell Big Data Analytics solutions for mobile networks as well as advanced content delivery solutions that optimized network performance and user experience. Todd worked to close multiple Tier 1 carriers as customers while there which led to an acquisition by Ribbon Networks. At Ribbon Networks, Todd served as Sales Management Consultant where he ran a team responsible for selling Analytics solutions globally. Todd developed the product, sales team, and built facilities to support the sales process.
Todd has served as a Subject Matter Expert in various disciplines supporting sales teams in the delivery of advanced technologies supporting data analytics, mobile networks, internet backbone routing, policy decision/enforcement, and edge content delivery. Todd has been part of SecureG since 2021 working as a network architect in a pre-sales engineering role concentrating on mission critical networks including 5G and virtualized infrastructure. Todd designs and deploys solutions that provide Zero Trust enabled solutions for the most critical network infrastructures. He utilizes a detailed understanding of wireless packet core, RAN for LTE and 5G networks, virtualized infrastructure, and Zero Trust principles to identify ways to optimize network behavior and improve network security via an enhanced PKI infrastructure.
Sean Turner has been involved in the IETF since IETF 34 and has authored or co-authored over 50 RFCs. From March 2007 to March 2014, Sean served on the IESG as the IETF Security Area Director. Prior to being appointed to the IESG, Sean was chair of the SMIME and XMPP WGs. Currently, Sean is chair of the TLS, MLS, and WPACK WGs. He is founder of sn3rd llc, which focuses on policy, design, and implementation of security solutions, and is author of the Implementing Email and Security Tokens: Current Standards, Tools, and Practices (John Wiley and Sons, 2008).
Russ Housley has worked in the computer and network security field since 1982. Before starting Vigil Security, Russ worked at the Air Force Data Services Center (AFDSC), Xerox Special Information Systems (XSIS), SPYRUS, and RSA Laboratories. His security research and standards interests include security protocols, certificate management, cryptographic key distribution, and high assurance design and development practices. He has been active in many security standards organizations; his recent focus has been on the Internet Engineering Task Force (IETF).
James Gorman – Cyber Security Expert and entrepreneur with experience securing, designing, deploying, and maintaining large-scale, mission-critical applications and networks. James leads teams through multiple FedRAMP, NIST, ISO, PCI, and HITRUST compliance audits, and he has helped numerous companies formulate strategies for compliance and infrastructure scalability. His previous leadership roles span from CISO to VP Network Operations & Engineering to CTO and VP of Operations, at companies as diverse as GE, Epoch Internet, NETtel, SecureNet, Transaction Network Services, AuthX, Certify Global, SecureG, Cyber Defense Media Group, and OnePay.
Bill Anderson, CTO – Bill is a security industry executive with extensive leadership experience founding, funding, and operating security software companies. He served as President of CIS Mobile and as Vice President, Technology Investments at Allied Minds where he managed a portfolio of information security, quantum, and semiconductor design companies.
Bill has held executive roles in product management and marketing at several public and private technology companies. He has served as Vice Chairman of Maryland TEDCO, a $110 million early stage investment company.
Bill has extensive experience in developing and marketing hardware, software, and intellectual property and is an expert on security in the mobile ecosystem.
James FX Payne’s career has spanned the breadth of both cyber and national security. Most recently, he was VP of Special Programs for pExchange LLC, a data services provider specializing in DoD and civilian agency budgets. Previously he stood up the Dun and Bradstreet security practice and was President of the public sector of Z&A Infotek, a company also focused on cybersecurity. Earlier, he was SVP/GM of national security and cyber infrastructure at Telecorida Technologies.
Carlos Solari, VP of Product Development, has a career spanning private and public sector leadership roles and the gamut of IT and cybersecurity. Previously, as VP at Comodo, he led the definition and launch of new security portfolio products for the MSP/MSSP market, launched the company’s SoC-as-a-service offering and ran compliance programs. Earlier, he was CIO of infrastructure and IoT security firm, Mission Secure; VP/GM at Global Security Solutions; and CIO at EOP. He also spent seven years with the FBI and other parts of the U.S. Federal Government in senior security roles.
Mike Denning was previously a partner at Blu Ventures Investors and served on the Cyber Investment Committee and Cyber Fund Investment Committee. Mike spent the last 20 years in the IT security industry, most recently as chief operating officer at ScienceLogic, the leading hybrid IT monitoring software company. He has extensive experience in leading security business management, including as VP of Global Security for Verizon Enterprise, the leading Managed Network Security provider; as the SVP General Manager of the security business unit for CA Technologies, the leader in Identity and Access management software; and management roles for two different security focused business units for VeriSign in the Managed Security Services space.