Cybersecurity

Thought provoking posts on Cybersecurity by Leadership Circle, brought to you by Spearhead Management and Dr. ir Johannes Drooghaag

Cyber Security is a major challenge in Industrial Automation and OTA can provide some crucial solutions when challenges with access rights, infrastructure, liability and scheduling are addressed.

Cyber Security is a major challenge in Industrial Automation

Cyber Security is a major challenge in Industrial Automation and OTA can provide some crucial solutions when challenges with access rights, infrastructure, liability and scheduling are addressed. The more we automate, the more we have to manage and protect all the assets we use for automation. Cybersecurity does not stop once a device is installed. […]

Cyber Security is a major challenge in Industrial Automation Read More »

Cyber Security is the result of understanding risks and threats and taking the appropriate actions.

Cyber Security is the result of understanding risks and threats and taking the appropriate actions. Cybersecurity evolves around risk management. We must however add that cybersecurity evolves around a constantly evolving risk management, that is based on the understanding and acceptance that risk identification and mitigation are based on a moment in time and the

Cyber Security is the result of understanding risks and threats and taking the appropriate actions. Read More »

Technology plays a major role in Cyber Security. Unfortunately, the way we use that technology continuous to be underestimated and that is the biggest Cyber Risk.

Technology plays a major role in Cyber Security. Unfortunately, the way we use that technology continuous to be underestimated and that is the biggest Cyber Risk.

Technology plays a major role in Cyber Security. Unfortunately, the way we use that technology continuous to be underestimated and that is the biggest Cyber Risk. When listen to IT experts we might get the impression that user errors are by far the biggest cause for cyber incidents. A look at the daily reports in

Technology plays a major role in Cyber Security. Unfortunately, the way we use that technology continuous to be underestimated and that is the biggest Cyber Risk. Read More »

Highly integrated systems are by far the biggest challenge during a cyber incident.

Highly integrated systems are by far the biggest challenge during a cyber incident.

Highly integrated systems are by far the biggest challenge during a cyber incident. As connectivity progresses all around us and systems become more interconnected, the dependency on connectivity and interconnection also increases. A simple system without external connections and dependences might not add much value in our current business models but it does have a

Highly integrated systems are by far the biggest challenge during a cyber incident. Read More »

Compliance is not security. Security is based on compliance!

Compliance is not security. Security is based on compliance!

Compliance is not security. Security is based on compliance! There is a straightforward way of debunking the believe that compliance is the same as security and that is the simple fact that well over 80% of the organizations that dealt with security incident were fully compliant with their standing security policies. There are several reasons

Compliance is not security. Security is based on compliance! Read More »

Cyber Security will either bring you new business when you have it or break your existing business when you don’t.

Cyber Security will either bring you new business when you have it or break your existing business when you don’t.

Cyber Security will either bring you new business when you have it or break your existing business when you don’t. Cybersecurity was long considered something of a nice-to-have feature, and in too many cases, something that was not important enough to give it the right priority, and with that, the right budgets and resources. Slowly

Cyber Security will either bring you new business when you have it or break your existing business when you don’t. Read More »

Cyber Security, Inclusions and Accessibility must be part of the core design principles of products and services.

Cyber Security, Inclusion and Accessibility must be part of the core design principles of products and services.

Cyber Security, Inclusions and Accessibility must be part of the core design principles of products and services. Our society becomes more connected, and that connectivity becomes more complex at an infrastructure level with every single day, and every new rollout. There is daily news about cybersecurity issues, hacks, and the rapid growth of ransomware attacks

Cyber Security, Inclusion and Accessibility must be part of the core design principles of products and services. Read More »