Know Your Boundaries To Know your Strategy
Where are the boundaries for threats to your operational systems? Has your organization initiated a risk assessment and created a threat model that would have covered some of the following...
Don’t make this mistake with vendor contracts
This is a continuation of this blog on remote access. Has your organization signed up for remote management of critical infrastructure without your knowledge of the details? Many customers I work with were not aware of the contractual obligations they agreed to regarding remote access. Many customers I work with were not aware of the […]
Vendors as Attack Vectors – The Risk You Take with Partner Services
About the Author: Mr. Albach is the Sr. Product Line Manager of IoT Security and joined Cisco in 2010 when he defined and delivered three network security solutions with the most recent – Cisco’s first Industrial Security Appliance. Did you know you can be contractually obligated to let people you don’t know access your critical […]