10 Steps for a Successful Assessment Strategy
The key to successful assessment planning begins with clear communication throughout the initial planning phases. To ensure technical and non-technical leaders are aligned on the purpose of the cyber assessment, use the 10 steps below to facilitate communication prior to beginning the assessment. (Note: many of these steps can be done simultaneously.)
SecurityGate.io – Why We Started
In 2015 Russian operatives started a phishing process that hacked the U.S. presidential election. Continuing throughout the following year, leading up to the election, the hackers repeatedly stole data from Democratic National Committee servers and used it to influence voter behavior. Congress responded by passing the Cybersecurity Information Sharing Act and President Obama directed his […]
OT Cybersecurity For IT Leaders
This year at Oilcomm, our chief product officer and co-founder, Cherise Esparza, discussed trends in cybersecurity. If you’re in IT and becoming more involved with OT, you’ll want to check out this short video below.
SecurityGate.io on Oil and Gas Tech Podcast
At most companies, cybersecurity has long been a concern felt only by the IT department. However, a significant increase in the innovation of operational technology has made cybersecurity top-of-mind for executives and facility owners alike within critical industry sectors. Many technology companies have entered the OT space as a result, but these “blocking & tackling” […]
The Future of OT/IT Convergence with Jonathon Gordon
This year, “IT/OT Convergence” has become more than just a buzzword. For many companies, the pandemic has forced teams to rethink the way they handle cybersecurity as more employees work remotely and budgets come under scrutiny. Jonathon Gordon, Directing Analyst for TakePoint Research, sat down with SecurityGate.io Co-Founder and Chief Product Officer, Cherise Esparza, to […]
Chevron Discusses Scaling Cybersecurity With SecurityGate.io.
Some of the biggest challenges that companies with ICS and operational environments face when running assessments and remediations are time, resources, and staff. Whether you’re just getting started, or are in the midst of building out these processes, there are companies who have been there before, made some mistakes, and have learned lessons worth sharing.
Chevron Discusses Their Digital Transformation Using SecurityGate.io
We were so fortunate to have Kenny Mesker, ICS Cybersecurity Advisor, from our customer Chevron in our office this week. He sat down with our Chief Product Officer, Cherise Esparza, to discuss Chevron’s journey with digital transformation and how they were able to seamlessly transition operations through the pandemic.
Top 3 mistakes made when going through a business impact analysis and how to avoid them
Edit: If you missed the LIVE show, don’t worry. We recorded it for you and have the video embedded at the bottom of this post. Or, if you prefer, listen to the podcast version on Apple and Spotify. When our customers are going through Business Impact Analysis (BIA) it’s pretty common for them to […]
The first 3 things to focus on in cybersecurity risk management.
Edit: In case you missed the show, we have a video of it posted at the bottom of this blog post. Enjoy! Listen on Spotify or Apple Podcasts We’ve been working on a knowledge base of helpful content for the cybersecurity community and one of the open questions we asked was, How do […]
Is CMMC Mission Critical for You?
Who does CMMC apply to? Starting in September of 2020, companies who are going through the Department of Defense (DOD) procurement process are required to improve their cybersecurity hygiene. The DOD is requiring the Cybersecurity Maturity Model Certification (CMMC) for any company it conducts business with (including subcontractors). The required level will vary based on […]