Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1417,"date":"2023-10-19T19:50:33","date_gmt":"2023-10-19T19:50:33","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/"},"modified":"2023-10-19T19:50:33","modified_gmt":"2023-10-19T19:50:33","slug":"protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/","title":{"rendered":"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm"},"content":{"rendered":"

Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated,\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated, it can be difficult to know where to start. Kam Chumley-Soltani recently held a webinar outlining best practices to protect your industrial environment from cyber threats. Kam is a Technical Solutions Architect in Cisco\u2019s industrial IoT group, working with customers every day to help them drive their OT security projects. Sign up to watch the replay:\u00a0 Protecting industrial networks from cyber threats: Where do I start?<\/a><\/p>\n

In the webinar, Kam recommends a stepped approach towards a mature ICS\/OT security strategy, implementing the following best practices:<\/p>\n

1. See everything on your industrial network<\/strong><\/h2>\n

You can\u2019t secure what you don\u2019t know about. You need full visibility into your industrial network and OT security posture, so you have the information you need to reduce the attack surface, segment the industrial network, and enforce cybersecurity policies. Cisco Cyber Vision<\/a> gives you real-time, detailed visibility into your industrial assets, their communication patterns, and application flows. It embeds visibility capabilities into industrial network equipment, so there\u2019s no need for dedicated security appliances or to build out-of-band SPAN collection networks.<\/p>\n

2. Segment the network into smaller trust zones<\/strong><\/h2>\n

Network segmentation is key to securing your network and protecting critical industrial processes. It\u2019s also a requirement of the ISA\/IEC62443 security standards<\/a>. Using dedicated security appliances for zone segmentation requires you to deploy additional hardware, create and maintain firewall rules, or even change network wiring and IP addresses. You can avoid this extra cost and complexity by extending software-based network segmentation policies to industrial control networks. Cisco Identity Services Engine (ISE)<\/a> works with network switches, routers, and wireless access points to restrict communications as per the defined zones. And it uses groups defined in Cyber Vision<\/a> to allow\/deny communications for each asset and drives collaboration between IT and OT teams.<\/p>\n

Join us for a webinar on October 31 for more details on how to comply with the ISA\/IEC62443 security standards<\/a>.<\/em><\/strong><\/p>\n

3. Secure remote access to OT assets<\/strong><\/h2>\n

Remote access is key for operations teams, vendors, and contractors to configure, maintain, and troubleshoot OT assets without time-consuming and costly visits. However, many existing remote access solutions create security backdoors or come with many tradeoffs Cisco Secure Equipment Access (SEA)<\/a> is solving the challenges of deploying secure remote access to operational assets at scale and brings all the benefits of a zero trust network access (ZTNA) solution to industrial operations. There is no dedicated hardware to install and manage and no complex firewall rules to configure and maintain.<\/p>\n

If you want to learn more, join us for a session on ZTNA on October 25 for IIoT World Cybersecurity Day<\/a>.\u00a0<\/em><\/strong><\/p>\n

For more details on how to get started with your industrial security journey, watch Kam\u2019s webinar replay<\/a> or come to the SecurityWeek ICS Cybersecurity Conference<\/a> in Atlanta next week, where Anastasia Mills and Kam Chumley-Soltani will be presenting a breakout session on Wednesday, October 25 at 10:25 am PST.<\/p>\n

<\/a><\/p>\n

This is the largest and longest-running event series focused on industrial cybersecurity. The conference attracts ICS stakeholders across a host of industries and a variety of OT, IT, government, vendors, and more. Make sure you stop by the Cisco Booth #18<\/strong> to discuss further and meet the team.<\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Discover how Cisco can help you protect your industrial network from cyber threats with a stepped approach towards a mature industrial control systems\/OT security strategy.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated,\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated, it can be difficult to know where to start. Kam Chumley-Soltani recently held a webinar outlining best practices to protect your industrial environment from cyber threats. Kam is a Technical Solutions Architect in Cisco\u2019s industrial IoT group, working with customers every day to help them drive their OT security projects. Sign up to watch the replay:\u00a0 Protecting industrial networks from cyber threats: Where do I start?<\/a><\/p>\n

In the webinar, Kam recommends a stepped approach towards a mature ICS\/OT security strategy, implementing the following best practices:<\/p>\n

1. See everything on your industrial network<\/strong><\/h2>\n

You can\u2019t secure what you don\u2019t know about. You need full visibility into your industrial network and OT security posture, so you have the information you need to reduce the attack surface, segment the industrial network, and enforce cybersecurity policies. Cisco Cyber Vision<\/a> gives you real-time, detailed visibility into your industrial assets, their communication patterns, and application flows. It embeds visibility capabilities into industrial network equipment, so there\u2019s no need for dedicated security appliances or to build out-of-band SPAN collection networks.<\/p>\n

2. Segment the network into smaller trust zones<\/strong><\/h2>\n

Network segmentation is key to securing your network and protecting critical industrial processes. It\u2019s also a requirement of the ISA\/IEC62443 security standards<\/a>. Using dedicated security appliances for zone segmentation requires you to deploy additional hardware, create and maintain firewall rules, or even change network wiring and IP addresses. You can avoid this extra cost and complexity by extending software-based network segmentation policies to industrial control networks. Cisco Identity Services Engine (ISE)<\/a> works with network switches, routers, and wireless access points to restrict communications as per the defined zones. And it uses groups defined in Cyber Vision<\/a> to allow\/deny communications for each asset and drives collaboration between IT and OT teams.<\/p>\n

Join us for a webinar on October 31 for more details on how to comply with the ISA\/IEC62443 security standards<\/a>.<\/em><\/strong><\/p>\n

3. Secure remote access to OT assets<\/strong><\/h2>\n

Remote access is key for operations teams, vendors, and contractors to configure, maintain, and troubleshoot OT assets without time-consuming and costly visits. However, many existing remote access solutions create security backdoors or come with many tradeoffs Cisco Secure Equipment Access (SEA)<\/a> is solving the challenges of deploying secure remote access to operational assets at scale and brings all the benefits of a zero trust network access (ZTNA) solution to industrial operations. There is no dedicated hardware to install and manage and no complex firewall rules to configure and maintain.<\/p>\n

If you want to learn more, join us for a session on ZTNA on October 25 for IIoT World Cybersecurity Day<\/a>.\u00a0<\/em><\/strong><\/p>\n

For more details on how to get started with your industrial security journey, watch Kam\u2019s webinar replay<\/a> or come to the SecurityWeek ICS Cybersecurity Conference<\/a> in Atlanta next week, where Anastasia Mills and Kam Chumley-Soltani will be presenting a breakout session on Wednesday, October 25 at 10:25 am PST.<\/p>\n

<\/a><\/p>\n

This is the largest and longest-running event series focused on industrial cybersecurity. The conference attracts ICS stakeholders across a host of industries and a variety of OT, IT, government, vendors, and more. Make sure you stop by the Cisco Booth #18<\/strong> to discuss further and meet the team.<\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Discover how Cisco can help you protect your industrial network from cyber threats with a stepped approach towards a mature industrial control systems\/OT security strategy.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":1418,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nProtecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm\" \/>\n<meta property=\"og:description\" content=\"Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated,\u2026 Read more on Cisco Blogs \u200b Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated, it can be difficult to know where to start. Kam Chumley-Soltani recently held a webinar outlining best practices to protect your industrial environment from cyber threats. Kam is a Technical Solutions Architect in Cisco\u2019s industrial IoT group, working with customers every day to help them drive their OT security projects. Sign up to watch the replay:\u00a0 Protecting industrial networks from cyber threats: Where do I start? In the webinar, Kam recommends a stepped approach towards a mature ICS\/OT security strategy, implementing the following best practices: 1. See everything on your industrial network You can\u2019t secure what you don\u2019t know about. You need full visibility into your industrial network and OT security posture, so you have the information you need to reduce the attack surface, segment the industrial network, and enforce cybersecurity policies. Cisco Cyber Vision gives you real-time, detailed visibility into your industrial assets, their communication patterns, and application flows. It embeds visibility capabilities into industrial network equipment, so there\u2019s no need for dedicated security appliances or to build out-of-band SPAN collection networks. 2. Segment the network into smaller trust zones Network segmentation is key to securing your network and protecting critical industrial processes. It\u2019s also a requirement of the ISA\/IEC62443 security standards. Using dedicated security appliances for zone segmentation requires you to deploy additional hardware, create and maintain firewall rules, or even change network wiring and IP addresses. You can avoid this extra cost and complexity by extending software-based network segmentation policies to industrial control networks. Cisco Identity Services Engine (ISE) works with network switches, routers, and wireless access points to restrict communications as per the defined zones. And it uses groups defined in Cyber Vision to allow\/deny communications for each asset and drives collaboration between IT and OT teams. Join us for a webinar on October 31 for more details on how to comply with the ISA\/IEC62443 security standards. 3. Secure remote access to OT assets Remote access is key for operations teams, vendors, and contractors to configure, maintain, and troubleshoot OT assets without time-consuming and costly visits. However, many existing remote access solutions create security backdoors or come with many tradeoffs Cisco Secure Equipment Access (SEA) is solving the challenges of deploying secure remote access to operational assets at scale and brings all the benefits of a zero trust network access (ZTNA) solution to industrial operations. There is no dedicated hardware to install and manage and no complex firewall rules to configure and maintain. If you want to learn more, join us for a session on ZTNA on October 25 for IIoT World Cybersecurity Day.\u00a0 For more details on how to get started with your industrial security journey, watch Kam\u2019s webinar replay or come to the SecurityWeek ICS Cybersecurity Conference in Atlanta next week, where Anastasia Mills and Kam Chumley-Soltani will be presenting a breakout session on Wednesday, October 25 at 10:25 am PST. This is the largest and longest-running event series focused on industrial cybersecurity. The conference attracts ICS stakeholders across a host of industries and a variety of OT, IT, government, vendors, and more. Make sure you stop by the Cisco Booth #18 to discuss further and meet the team. Share Share: \u00a0\u00a0Discover how Cisco can help you protect your industrial network from cyber threats with a stepped approach towards a mature industrial control systems\/OT security strategy.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T19:50:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm\",\"datePublished\":\"2023-10-19T19:50:33+00:00\",\"dateModified\":\"2023-10-19T19:50:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/\"},\"wordCount\":632,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/\",\"name\":\"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif\",\"datePublished\":\"2023-10-19T19:50:33+00:00\",\"dateModified\":\"2023-10-19T19:50:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/","og_locale":"en_US","og_type":"article","og_title":"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm","og_description":"Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated,\u2026 Read more on Cisco Blogs \u200b Protecting industrial operations from cyberthreats should always be top of mind. However, with operations networks being often very complex and cyber threats growing increasingly more sophisticated, it can be difficult to know where to start. Kam Chumley-Soltani recently held a webinar outlining best practices to protect your industrial environment from cyber threats. Kam is a Technical Solutions Architect in Cisco\u2019s industrial IoT group, working with customers every day to help them drive their OT security projects. Sign up to watch the replay:\u00a0 Protecting industrial networks from cyber threats: Where do I start? In the webinar, Kam recommends a stepped approach towards a mature ICS\/OT security strategy, implementing the following best practices: 1. See everything on your industrial network You can\u2019t secure what you don\u2019t know about. You need full visibility into your industrial network and OT security posture, so you have the information you need to reduce the attack surface, segment the industrial network, and enforce cybersecurity policies. Cisco Cyber Vision gives you real-time, detailed visibility into your industrial assets, their communication patterns, and application flows. It embeds visibility capabilities into industrial network equipment, so there\u2019s no need for dedicated security appliances or to build out-of-band SPAN collection networks. 2. Segment the network into smaller trust zones Network segmentation is key to securing your network and protecting critical industrial processes. It\u2019s also a requirement of the ISA\/IEC62443 security standards. Using dedicated security appliances for zone segmentation requires you to deploy additional hardware, create and maintain firewall rules, or even change network wiring and IP addresses. You can avoid this extra cost and complexity by extending software-based network segmentation policies to industrial control networks. Cisco Identity Services Engine (ISE) works with network switches, routers, and wireless access points to restrict communications as per the defined zones. And it uses groups defined in Cyber Vision to allow\/deny communications for each asset and drives collaboration between IT and OT teams. Join us for a webinar on October 31 for more details on how to comply with the ISA\/IEC62443 security standards. 3. Secure remote access to OT assets Remote access is key for operations teams, vendors, and contractors to configure, maintain, and troubleshoot OT assets without time-consuming and costly visits. However, many existing remote access solutions create security backdoors or come with many tradeoffs Cisco Secure Equipment Access (SEA) is solving the challenges of deploying secure remote access to operational assets at scale and brings all the benefits of a zero trust network access (ZTNA) solution to industrial operations. There is no dedicated hardware to install and manage and no complex firewall rules to configure and maintain. If you want to learn more, join us for a session on ZTNA on October 25 for IIoT World Cybersecurity Day.\u00a0 For more details on how to get started with your industrial security journey, watch Kam\u2019s webinar replay or come to the SecurityWeek ICS Cybersecurity Conference in Atlanta next week, where Anastasia Mills and Kam Chumley-Soltani will be presenting a breakout session on Wednesday, October 25 at 10:25 am PST. This is the largest and longest-running event series focused on industrial cybersecurity. The conference attracts ICS stakeholders across a host of industries and a variety of OT, IT, government, vendors, and more. Make sure you stop by the Cisco Booth #18 to discuss further and meet the team. Share Share: \u00a0\u00a0Discover how Cisco can help you protect your industrial network from cyber threats with a stepped approach towards a mature industrial control systems\/OT security strategy.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/","og_site_name":"JHC","article_published_time":"2023-10-19T19:50:33+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/"},"author":{"name":"","@id":""},"headline":"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm","datePublished":"2023-10-19T19:50:33+00:00","dateModified":"2023-10-19T19:50:33+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/"},"wordCount":632,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/","url":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/","name":"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif","datePublished":"2023-10-19T19:50:33+00:00","dateModified":"2023-10-19T19:50:33+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16402669-QeG3B8.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/protecting-industrial-networks-from-cyber-threats-where-do-i-start-emily-kasman-on-october-19-2023-at-400-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Protecting industrial networks from cyber threats. Where do I start? Emily Kasman on October 19, 2023 at 4:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1417"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1417\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1418"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}