May 23, 2018

Forcepoint statement on Cisco's report on the hacking of routers in Critical Infrastructure

George Kamis

The news out today from Cisco about a massive breach of routers and storage devices – including notable infections in Ukraine – shows that hackers continue to attempt to penetrate the Information Technology (IT)/Operational Technology (OT) barrier. Common techniques like spear phishing and credential compromise, as well as what we’ve seen from past attacks like NotPetya, expose the requirement for basic defenses like proper segmentation and patching in the OT area. A strong identity tie-in and multi-factor authentication for access to a plant is the baseline. As companies and agencies evolve their cybersecurity strategies, the need for risk-adaptive protection to understand the behavior of the adversary in the industrial or operational portion of the network is even more important.

 

- George Kamis is CTO of Forcepoint global governments and critical infrastructure

George Kamis

George Kamis is the Chief Technology Officer for Global Governments & Critical Infrastructure at Forcepoint. He works closely with Information Assurance industry leaders, government executives and the Forcepoint executive management team to help guide long-term technology strategy and keep...

Read more articles by George Kamis

About Forcepoint

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.