Migrating to Zero Trust Architecture (ZTA) is a strategic approach to strengthen the enterprise’s security postures. The shift to ZTA requires changes across the enterprise which can be challenging to achieve. Utilizing an effective framework for migrating from the old security architecture to ZTA can help ensure smooth transitioning to the Zero Trust journey.
Take a Programmatic Approach to Your Zero Trust Journey
Virtual Event
Apr 20, 2023
Time: 10:00 AM – 12:30 PM ET
Location: Web Conference
Zero trust journeys typically start down one of two paths: (1) With a formal strategy to build a holistic program; or (2) tackling point projects employing zero trust principles of least privilege and least trust. This session walks through the policy and planning steps for both paths to move your zero trust transformation forward.
US introduces new rules to protect water systems from hackers
The US Environmental Protection Agency on Friday announced new requirements for public water facilities to boost their cybersecurity while expressing concern that many facilities have failed to take basic steps to protect themselves from hackers.
The new EPA memo requires state governments to audit the cybersecurity practices of public water systems — and then use state regulatory authorities to force water systems to add security measures if existing ones are deemed insufficient.
‘No easy answer’ on managing battery storage supply chain issues, but things are getting better
Managing your battery energy storage system (BESS) supply chain is a complex issue with no easy fixes, according to leading developers, system integrators and investors. That was the message from panelists on the ‘Effective Management of Supply Chains’ on day one of Energy Storage Summit in London last week (22/23 February). Supply chain has been a major topic in the BESS industry in the past few years,
Hydrochasma: An Emerging Threat to Asia’s Medical and Shipping Industries
A new player has emerged in the realm of cyber threats: Hydrochasma. According to Symantec’s investigation, this group has set its sights on medical laboratories and shipping firms in Asia. This previously unknown group was found to have no links to any known threat actors, but it appears to be interested in industries involved in COVID-19 treatments or vaccines.
Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks
Demand forecasting (DF) plays an essential role in supply chain management, as it provides an estimate of the goods that customers are expected to purchase in the foreseeable future. While machine learning techniques are widely used for building DF models, they also become more susceptible to data poisoning attacks. In this article, we study the vulnerability of targeted poisoning attacks for linear regression DF models, where the attacker controls the behavior of forecasting models on a specific target sample without compromising the overall forecasting performance.
Assess Your Supply Chain in Line with NIST C-SCRM
Virtual Event
Mar 1, 2023
Time: 10:00 AM – 12:30 PM ET
Location: Web Conference
Assess Your Supply Chain in Line with NIST C-SCRM
The NIST Cybersecurity-Supply Chain Risk Management guidelines released in May 2022 establish 12 coverage areas (many of which are outside traditional information security boundaries) and put a spotlight on the importance of robust, accurate evaluations as part of any supply chain security strategy.
There’s a new inflation warning for consumers coming from the supply chain
As the markets prepare for the latest consumer price index data to be released on Tuesday, logistics managers are warning of a persistent source of inflation in the supply chain and saying consumers should be ready for the effect it will have on their wallets.
US will see more new battery capacity than natural gas generation in 2023
Earlier this week, the US’ Energy Information Agency (EIA) gave a preview of the changes the nation’s electrical grid is likely to see over the coming year. The data is based on information submitted to the Department of Energy by utilities and power plant owners, who are asked to estimate when generating facilities that are planned or under construction will come online. Using that information, the EIA estimates the total new capacity expected to be activated over the coming year.
Mature Your Zero Trust Program: Use Cases for 2023
Virtual Event -Feb 22 2023
Time -10:00 AM – 12:30 PM CT
Location-Web Conference
Applying zero trust architectures in an iterative way – one project at a time – has proven a sustainable method to deepen zero trust capabilities across a program. This symposium covers popular zero trust use cases for 2023 to accelerate your organization’s zero trust maturation.
