Bridging the Cyber Divide, Series 1 - Ep5 – Critical connections

March 2, 2021

We have become accustomed to the proliferation of data enabled devices, but when this relates to critical infrastructure (water, electricity, telecommunications) whilst 5G starts to supercharge the amount and speed of the data that is both generated and shared, how do we ensure we are really securing critical infrastructure, and what does this look like? 

Lani Refiti, Co-Founder and CEO at IoTSec Australia and Jeffery Kok, VP of Solution Engineers at CyberArk discuss the rapid expansion of IoT capability in Australia, as well as the arrival of 5G, is bringing unprecedented opportunities in harnessing real time data in everything from manufacturing to agriculture, but with the sharing of this data, and the opportunities, the question regarding securing critical infrastructure remains key to under pinning the successful implementation of critical connections.

Previous Article
Securing the Software Supply Chain
Securing the Software Supply Chain

Major breaches have exposed the increasing attack surface of software development and delivery.

Next Article
An Assume-Breach Mindset: 4 Steps to Protect What Attackers are After
An Assume-Breach Mindset: 4 Steps to Protect What Attackers are After

Threat actors always find new and innovative ways to penetrate networks, steal data, and disrupt business.