Q&A: The Cybersecurity Training Gap in Industrial Networks

Cyberattacks on critical infrastructure are steadily increasing, driven by geopolitical conflicts as well as the longtime problem of poorly secured devices that remain exposed and unprotected on the public Internet.
Irfan Shakeel, the Dubai-based vice president of training and certification services at cybersecurity vendor OPSWAT spoke with Dark Reading on what he sees as a knowledge gap in protecting critical infrastructure - and how the Middle East and Africa region stands to improve cyber defenses in its ICS/OT networks.
Irfan Shakeel: Previously, all of IT used to come under attack, but now even the OT. The challenges organizations are facing - particularly for the OT environment - is that most of the systems are legacy, and we need to think about OT from the OT perspective; we cannot manage OT from the IT perspective.
So as far as the cybersecurity challenges are concerned: yes, the cyberattacks are growing and attackers are targeting the OT side of the operation ... [attackers] know that OT is the weakness.
Shakeel: In the IT training environment, we have tons of training available online and offline, and universities are also focusing on IT cybersecurity.
As far as the OT security is concerned, not have proper education or training available in the market.
That's why in most of the organizations, people doing OT are not aware of how to secure their OT environment.
They are really good in managing the operation, but they do not know the security challenges and how to properly design, or securely design, the OT environment architecture.
If we train people properly ... if we give them the right skillset and knowledge and up-to-date resources about the evolving threat landscape and the evolving cybersecurity challenges, they will be able to effectively protect their environment.
Without proper education or training, they won't be able to do that.
Shakeel: [With] SCADA systems and other devices such as programmable logic controllers ... even if you search online, you will not find information about how to properly or securely configure Siemens models or PLCs. You can find guides available in the Siemens.
Most people don't really read the documentation, that's why we need a user-friendly way to teach them - to teach them how to configure a specific device, or how to ensure that their PLC is transmitting or sending the data securely over the channel to the other OT devices.
Shakeel: In the Middle East and Africa region, the entire cybersecurity market is growing ... and now organizations are focusing on ... securing their organizations.
OT in the Middle East region is very important, specifically in the energy sector, and the oil and gas field.
After the Saudi Aramco [attack], they have realized that cybersecurity is very key to keep their operation running.
The attack on Saudi Aramco changed the way organizations invested in cybersecurity.
Oil and gas organizations are now investing in cybersecurity solutions, tools, and technologies, - and also investing in human resources.
In the Middle East region: it's already there.
The African region is growing rapidly, and organizations now also are looking to invest in cybersecurity.
Cyberattacks cause disruption and these organizations cannot afford disruption and they cannot afford their processes to be halted.


This Cyber News was published on www.darkreading.com. Publication date: Mon, 19 Feb 2024 11:05:18 +0000


Cyber News related to Q&A: The Cybersecurity Training Gap in Industrial Networks

Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
9 months ago Securityzap.com
6 Best Cybersecurity Training for Employees in 2024 - Cybersecurity awareness training programs are comprehensive, long-term products that show your workforce how to spot security threats and potential attacks. Cybersecurity training products typically offer informational videos, quizzes, and phishing ...
10 months ago Esecurityplanet.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
6 months ago Feeds.fortinet.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
9 months ago Securityzap.com
Navigating the Cybersecurity Skills Gap in Critical Infrastructure - Addressing the cybersecurity skills gap stands out as a paramount challenge in fortifying companies' cyber resilience today. Transforming the educational system to align with the modern requirements of cybersecurity professionals or retraining ...
9 months ago Cybersecurity-insiders.com
How to Safeguard Your Data Through Security Awareness Training? - As cybercriminals employ increasingly advanced tactics, IT security awareness training becomes a pivotal defense mechanism. This article delves deeper into the imperative of such training and provides actionable tips to enhance the effectiveness of ...
7 months ago Cybersecurity-insiders.com
Mastering Cybersecurity: Developer Training - Discover how to create an effective and engaging training program for your developers. Create a security training program with clearly defined goals to influence your developers to prioritize learning. Developers are likelier to participate and exert ...
10 months ago Feeds.dzone.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
10 months ago Helpnetsecurity.com
Palo Alto Networks and IBM to Jointly Provide AI-Powered Security Offerings - PRESS RELEASE. SANTA CLARA, Calif. and ARMONK, N.Y., May 15, 2024 /PRNewswire/ - Palo Alto Networks, the global cybersecurity leader, and IBM, a leading provider of hybrid cloud and AI, today announced a broad-reaching partnership to deliver ...
6 months ago Darkreading.com
Navigating an AI-Enhanced Landscape of Cybersecurity in 2024: A Proactive Approach to Phishing Training in Enterprises - As we stand at the precipice of 2024, the intersection of artificial intelligence and cybersecurity looms large, with phishing attacks emerging as a focal point of concern. The integration of AI is poised to redefine the threat landscape, introducing ...
11 months ago Securityboulevard.com
Empowering Women in Cybersecurity: Bridging the Gender Gap - On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue to be ...
9 months ago Blog.checkpoint.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
10 months ago Securityintelligence.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
10 months ago Securityzap.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
9 months ago Legal.thomsonreuters.com
Recapping Cisco industrial IoT's journey: A year of security, simplification and innovation - In this blog, we'll take a look back at the key topics and trends that defined the industrial IoT journey in 2023. Empowering our industrial customers to digitize and secure operations at the same time has been prevalent in every conversation this ...
11 months ago Feedpress.me
Understanding CAT Culture in Cybersecurity: Collaboration, Awareness, and Training - In the dynamic and ever-evolving landscape of cybersecurity, organizations are increasingly recognizing the importance of fostering a robust security culture to mitigate risks and safe-guard sensitive data. One such approach gaining traction is the ...
7 months ago Cybersecurity-insiders.com
The Future of Phishing Email Training for Employees in Cybersecurity - One common method they use is through phishing emails. To counter this changing threat, companies must give importance to providing phishing email training for employees on identifying and responding properly to phishing attempts. Standard training ...
6 months ago Hackread.com
Q&A: The Cybersecurity Training Gap in Industrial Networks - Cyberattacks on critical infrastructure are steadily increasing, driven by geopolitical conflicts as well as the longtime problem of poorly secured devices that remain exposed and unprotected on the public Internet. Irfan Shakeel, the Dubai-based ...
9 months ago Darkreading.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
4 months ago Techtarget.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
10 months ago Securityzap.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
10 months ago Securityzap.com
Developing Cybersecurity Awareness Programs for Schools - Schools are increasingly becoming targets for cyberattacks, necessitating the development of robust cybersecurity awareness programs. Ultimately, a comprehensive cybersecurity awareness program is essential for schools to mitigate risks, enhance ...
10 months ago Securityzap.com
Researchers Uncover Simple Technique to Extract ChatGPT Training Data - Can getting ChatGPT to repeat the same word over and over again cause it to regurgitate large amounts of its training data, including personally identifiable information and other data scraped from the Web? The answer is an emphatic yes, according to ...
11 months ago Darkreading.com
3 Ways to Close the Cybersecurity Skills Gap - Cybersecurity jobs continue to be the most in demand, as the industry cannot keep up with the number of openings, which currently sit at more than 700,000. 66% of professionals in cybersecurity roles report feeling significantly stressed at work, due ...
11 months ago Darkreading.com
African Organizations Aim to Fix Cybersecurity in 2024 - Faced with numerous cybersecurity threats and challenges, but lacking adequate cyber training, African nations hope to develop the depth of skills needed to defend against attackers in 2024. In December, for example, the University of Lagos, the ...
10 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)