Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":956,"date":"2023-08-26T08:59:39","date_gmt":"2023-08-26T08:59:39","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/"},"modified":"2023-08-26T08:59:39","modified_gmt":"2023-08-26T08:59:39","slug":"complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/","title":{"rendered":"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm"},"content":{"rendered":"

After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure<\/a> such as freight and passenger rail, pipelines, and airports, with more industries to follow.<\/p>\n

The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency.<\/p>\n

To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below.<\/p>\n

Network segmentation<\/h2>\n

The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised<\/strong>.\u201d<\/p>\n

Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be.<\/p>\n

To support the unique requirements of industrial networks, the reach of Cisco SD-WAN<\/a> has been expanded through Cisco Industrial Routers<\/a>, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access<\/a>.<\/p>\n\n

Access control<\/h2>\n

TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems<\/strong>.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows.<\/p>\n

Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA)<\/a> provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk.<\/p>\n\n

Continuous monitoring<\/h2>\n

Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d<\/strong> we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes.<\/p>\n

To provide visibility and security posture to the industrial network, Cisco Cyber Vision<\/a> is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology<\/strong>.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks.<\/p>\n\n

Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks.<\/p>\n

\u00a0<\/p>\n

To learn more about how Cisco can help you secure your industrial operations, please contact us<\/a> or visit cisco.com\/go\/iotsecurity<\/a>. And don\u2019t forget to subscribe to our OT security newsletter<\/a>.<\/p>\n

\u200b<\/p>\n

After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure<\/a> such as freight and passenger rail, pipelines, and airports, with more industries to follow.<\/p>\n

The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency.<\/p>\n

To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below.<\/p>\n

Network segmentation<\/h2>\n

The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised<\/strong>.\u201d<\/p>\n

Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be.<\/p>\n

To support the unique requirements of industrial networks, the reach of Cisco SD-WAN<\/a> has been expanded through Cisco Industrial Routers<\/a>, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access<\/a>.<\/p>\n\n

Access control<\/h2>\n

TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems<\/strong>.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows.<\/p>\n

Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA)<\/a> provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk.<\/p>\n\n

Continuous monitoring<\/h2>\n

Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d<\/strong> we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes.<\/p>\n

To provide visibility and security posture to the industrial network, Cisco Cyber Vision<\/a> is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology<\/strong>.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks.<\/p>\n\n

Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks.<\/p>\n

To learn more about how Cisco can help you secure your industrial operations, please contact us<\/a> or visit cisco.com\/go\/iotsecurity<\/a>. And don\u2019t forget to subscribe to our OT security newsletter<\/a>.<\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Protecting the nation\u2019s critical infrastructure requires strong cybersecurity controls. Being an industry leader in networking and security across both IT and OT, Cisco is uniquely positioned to help you comply with the latest TSA mandates. Learn what the requirements are.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure<\/a> such as freight and passenger rail, pipelines, and airports, with more industries to follow.<\/p>\n

The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency.<\/p>\n

To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below.<\/p>\n

Network segmentation<\/h2>\n

The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised<\/strong>.\u201d<\/p>\n

Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be.<\/p>\n

To support the unique requirements of industrial networks, the reach of Cisco SD-WAN<\/a> has been expanded through Cisco Industrial Routers<\/a>, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access<\/a>.<\/p>\n

Access control<\/h2>\n

TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems<\/strong>.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows.<\/p>\n

Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA)<\/a> provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk.<\/p>\n

Continuous monitoring<\/h2>\n

Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d<\/strong> we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes.<\/p>\n

To provide visibility and security posture to the industrial network, Cisco Cyber Vision<\/a> is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology<\/strong>.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks.<\/p>\n

Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks.<\/p>\n

\u00a0<\/p>\n

To learn more about how Cisco can help you secure your industrial operations, please contact us<\/a> or visit cisco.com\/go\/iotsecurity<\/a>. And don\u2019t forget to subscribe to our OT security newsletter<\/a>.<\/p>\n

\u200b<\/p>\n

After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure<\/a> such as freight and passenger rail, pipelines, and airports, with more industries to follow.<\/p>\n

The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency.<\/p>\n

To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below.<\/p>\n

Network segmentation<\/h2>\n

The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised<\/strong>.\u201d<\/p>\n

Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be.<\/p>\n

To support the unique requirements of industrial networks, the reach of Cisco SD-WAN<\/a> has been expanded through Cisco Industrial Routers<\/a>, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access<\/a>.<\/p>\n

Access control<\/h2>\n

TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems<\/strong>.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows.<\/p>\n

Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA)<\/a> provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk.<\/p>\n

Continuous monitoring<\/h2>\n

Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d<\/strong> we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes.<\/p>\n

To provide visibility and security posture to the industrial network, Cisco Cyber Vision<\/a> is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology<\/strong>.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks.<\/p>\n

Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks.<\/p>\n

To learn more about how Cisco can help you secure your industrial operations, please contact us<\/a> or visit cisco.com\/go\/iotsecurity<\/a>. And don\u2019t forget to subscribe to our OT security newsletter<\/a>.<\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Protecting the nation\u2019s critical infrastructure requires strong cybersecurity controls. Being an industry leader in networking and security across both IT and OT, Cisco is uniquely positioned to help you comply with the latest TSA mandates. Learn what the requirements are.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":944,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-956","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nComplying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm\" \/>\n<meta property=\"og:description\" content=\"After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure such as freight and passenger rail, pipelines, and airports, with more industries to follow. The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency. To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below. Network segmentation The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised.\u201d Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be. To support the unique requirements of industrial networks, the reach of Cisco SD-WAN has been expanded through Cisco Industrial Routers, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access. Access control TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows. Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA) provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk. Continuous monitoring Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes. To provide visibility and security posture to the industrial network, Cisco Cyber Vision is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks. Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks. \u00a0 To learn more about how Cisco can help you secure your industrial operations, please contact us or visit cisco.com\/go\/iotsecurity. And don\u2019t forget to subscribe to our OT security newsletter. \u200b After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure such as freight and passenger rail, pipelines, and airports, with more industries to follow. The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency. To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below. Network segmentation The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised.\u201d Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be. To support the unique requirements of industrial networks, the reach of Cisco SD-WAN has been expanded through Cisco Industrial Routers, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access. Access control TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows. Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA) provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk. Continuous monitoring Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes. To provide visibility and security posture to the industrial network, Cisco Cyber Vision is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks. Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks. To learn more about how Cisco can help you secure your industrial operations, please contact us or visit cisco.com\/go\/iotsecurity. And don\u2019t forget to subscribe to our OT security newsletter. Share Share: \u00a0\u00a0Protecting the nation\u2019s critical infrastructure requires strong cybersecurity controls. Being an industry leader in networking and security across both IT and OT, Cisco is uniquely positioned to help you comply with the latest TSA mandates. Learn what the requirements are.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-26T08:59:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm\",\"datePublished\":\"2023-08-26T08:59:39+00:00\",\"dateModified\":\"2023-08-26T08:59:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/\"},\"wordCount\":1434,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/\",\"name\":\"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif\",\"datePublished\":\"2023-08-26T08:59:39+00:00\",\"dateModified\":\"2023-08-26T08:59:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/","og_locale":"en_US","og_type":"article","og_title":"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm","og_description":"After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure such as freight and passenger rail, pipelines, and airports, with more industries to follow. The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency. To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below. Network segmentation The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised.\u201d Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be. To support the unique requirements of industrial networks, the reach of Cisco SD-WAN has been expanded through Cisco Industrial Routers, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access. Access control TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows. Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA) provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk. Continuous monitoring Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes. To provide visibility and security posture to the industrial network, Cisco Cyber Vision is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks. Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks. \u00a0 To learn more about how Cisco can help you secure your industrial operations, please contact us or visit cisco.com\/go\/iotsecurity. And don\u2019t forget to subscribe to our OT security newsletter. \u200b After the executive order to bolster the nations cybersecurity following the Colonial Pipeline attack, the U.S. Transportation Security Administration (TSA) has been releasing new mandates for critical infrastructure such as freight and passenger rail, pipelines, and airports, with more industries to follow. The networks that support these critical infrastructures are mission-critical, which means that it is essential to be able to stay connected while securely administering policy in the industrial space. Being an industry leader in networking and security across both the information technology (IT) and operational technology (OT) domains, Cisco is in a unique position to deliver an end-to-end security strategy, while enhancing operational uptime and resiliency. To strengthen the cybersecurity posture of the nation\u2019s critical infrastructure, there are four key requirements outlined by the mandates, highlighted in bold text below. Network segmentation The first requirement is to \u201cImplement network segmentation policies and controls to ensure that the Operational Technology (OT) system can continue to safely operate if an Information Technology (IT) system has been compromised.\u201d Using a defense-in-depth approach, Cisco addresses this requirement in many parts of the network, adapting to the unique architecture needs of individual organizations. The solution is a common one, use the network infrastructure to segment a network. Do not wait until you reach a \u201csecurity appliance\u201d to do security. Cisco provides an end-to-end segmentation solution in which data is kept within its own virtual network from source to destination, wherever that may be. To support the unique requirements of industrial networks, the reach of Cisco SD-WAN has been expanded through Cisco Industrial Routers, which provide the connectivity, mobility, and security required for critical infrastructure. SD-WAN segments traffic at the edge of the network and maintains separation through all relevant points in the network. Policy can be orchestrated across multiple enforcement points in the network using Cisco Catalyst SD-WAN, or\u2014if your organization prefers\u2014can support the evolution to a secure service edge (SSE) with Cisco Secure Access. Access control TSA highlights the need to \u201cImplement access control measures to secure and prevent unauthorized access to Critical Cyber Systems.\u201d As OT devices traverse both the LAN and the WAN with a unified identity, Cisco can enforce policy everywhere. Cisco Security Group Tags (SGTs) identify the role that a device has on the network, and the associated privileges are enforced by switches, routers, and firewalls, depending on where the data flows. Remote users, whether internal technicians or vendor support, often need access to critical cyber systems. Cisco Secure Equipment Access (SEA) provides flexible access for remote configuration and maintenance of industrial assets in distributed locations while minimizing security risk. Continuous monitoring Segmentation is not enough to complete a security solution. By implementing \u201ccontinuous monitoring and detection policies and procedures to detect cybersecurity threats and correct anomalies that affect Critical Cyber System operations,\u201d we can continually monitor and evaluate the trust of both users and devices on our networks and push policy back into the network as security posture changes. To provide visibility and security posture to the industrial network, Cisco Cyber Vision is embedded in Cisco networking infrastructure in order to avoid the need for dedicated appliances and\/or costly Switched Port Analyzer (SPAN) solutions. Cyber Vision identifies assets, their characteristics, and their communication patterns to \u201creduce the risk of exploitation of unpatched systems through the application of security patches and updates for operating systems, applications, drivers and firmware on Critical Cyber Systems in a timely manner using a risk-based methodology.\u201d Cyber Vision automatically identifies device vulnerabilities and calculates risk scores so you can proactively build an improvement process to address risks. Cisco\u2019s capabilities, highlighted above, not only meet the current TSA Cybersecurity Directive requirements but also enable clients to deliver more robust cybersecurity capabilities to thwart efforts by industry threats. Most significantly, these capabilities are foundational for enabling both security and operational resiliency as well as optimizing the performance of mission-critical networks. To learn more about how Cisco can help you secure your industrial operations, please contact us or visit cisco.com\/go\/iotsecurity. And don\u2019t forget to subscribe to our OT security newsletter. Share Share: \u00a0\u00a0Protecting the nation\u2019s critical infrastructure requires strong cybersecurity controls. Being an industry leader in networking and security across both IT and OT, Cisco is uniquely positioned to help you comply with the latest TSA mandates. Learn what the requirements are.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/","og_site_name":"JHC","article_published_time":"2023-08-26T08:59:39+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/"},"author":{"name":"","@id":""},"headline":"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm","datePublished":"2023-08-26T08:59:39+00:00","dateModified":"2023-08-26T08:59:39+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/"},"wordCount":1434,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/","url":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/","name":"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif","datePublished":"2023-08-26T08:59:39+00:00","dateModified":"2023-08-26T08:59:39+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16312255-8cdnRP.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/complying-with-the-new-tsa-mandates-to-secure-the-nations-critical-infrastructure-andrew-mcphee-on-august-24-2023-at-550-pm-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Complying with the new TSA mandates to secure the nation\u2019s critical infrastructure Andrew McPhee on August 24, 2023 at 5:50 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=956"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/956\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/944"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}