Our new Biannual ICS Risk & Vulnerability Report is the most up-to-date look at CVEs disclosed in OT devices. • Check it out!

  • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português
    • 中国人
    • 中國人
    • 한국인
  • Why Claroty
  • Products
    • Platform
      • Comprehensive Platform Overview
      • Claroty Edge
      • Continuous Threat Detection
      • Secure Remote Access
      • Request A Demo
    • Integrations
      • Firewalls
      • Network Access Control
      • SIEM
      • SOAR
      • CMDB
      • OEM
  • Industry Solutions
    • Energy
    • Consumer Products
    • Critical Manufacturing
    • Pharmaceutical
    • Water Utilities
  • Partners
    • Claroty Focus Program
    • Find a Partner
    • Become a Partner
    • Partner Login
  • Resources
    • Biannual Report
    • Case Studies & Use Cases
    • Whitepapers
    • Data Sheets
    • Integration Briefs
    • Support
    • Podcasts
    • Events & Webinars
  • About
    • Leadership
    • Careers
    • Contact Us
    • News
    • Press Releases
  • Blog
  • Team82
  • Contact Us
  • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português
    • 中国人
    • 中國人
    • 한국인
  • Why Claroty
  • Products
    • Platform
      • Comprehensive Platform Overview
      • Claroty Edge
      • Continuous Threat Detection
      • Secure Remote Access
      • Request A Demo
    • Integrations
      • Firewalls
      • Network Access Control
      • SIEM
      • SOAR
      • CMDB
      • OEM
  • Industry Solutions
    • Energy
    • Consumer Products
    • Critical Manufacturing
    • Pharmaceutical
    • Water Utilities
  • Partners
    • Claroty Focus Program
    • Find a Partner
    • Become a Partner
    • Partner Login
  • Resources
    • Biannual Report
    • Case Studies & Use Cases
    • Whitepapers
    • Data Sheets
    • Integration Briefs
    • Support
    • Podcasts
    • Events & Webinars
  • About
    • Leadership
    • Careers
    • Contact Us
    • News
    • Press Releases
  • Blog
  • Team82

Aperture Podcast: Adm. Mike Rogers on Ransomware and OT

Share:

By Michael Mimoso | June 28, 2021

The pain of ransomware in 2021 has been acute for industrial enterprises such as Colonial Pipeline and JBS Food, both of which were impacted by these extortion attacks to the point where critical distribution and delivery of fuel and food were impacted.

These attacks have resurfaced a number of debates between security experts and those on the front lines of these businesses about defensive strategies and whether to pay ransom demands in order to promptly resume production, among others. The U.S. government has also injected itself into the conversation, with several cybersecurity-related actions meant to improve information sharing between the private sector and government and funnel much needed money and intelligence to under-funded security organizations managing operational technology (OT).

In this episode of Claroty’s Aperture podcast, retired Adm. Mike Rogers, former director of the National Security Agency and commander of U.S. Cyber Command, lends his experience to help unpack these complicated discussions.

Download This Episode of Claroty’s Aperture Podcast Here

Rogers shares insights from his decades of military and command experience pointed at decision makers, including those in the private sector who manage critical infrastructure that impacts not only public safety, but also national security.

Colonial Pipeline’s decision, for example, to shut down operations out of an abundance of caution following the May ransomware attack impacting its IT systems was noteworthy. Colonial controls a significant portion of fuel distribution for the east coast of the U.S., including gasoline, home heating fuel and jet fuel, and made a unilateral decision to shut down distribution.

“As I look at that, I say ‘Hmm,’” Rogers said. “Think about the economic and national security implications of that. Are we as a nation comfortable with the idea that when it comes to critical infrastructure, companies are just going to unilaterally do what they want or feel is appropriate? They thought about it and clearly did what they thought was appropriate. I just think to myself, I’m not sure this is the best methodology, particularly in some areas where the economic impact or national security implications are so high.”

Other topics from the discussion include:

  • The role of the U.S. government going forward with incidents of this magnitude
  • The efficacy of the TSA Directive, the 100-day sprint to improve grid cybersecurity, and the cybersecurity executive order
  • The debate over whether to pay ransoms or extortion demands
  • The role of cyber-insurance and the need to dissuade enterprises from relying on insurance as a control mechanism
  • The importance of building a resilient OT infrastructure, and what that exactly means

Subscribe, rate, and review the Aperture podcast on all major platforms, including Apple Podcasts and Spotify.

Share:
Claroty 2022
Terms & Conditions
Privacy Policy

Products

  • Comprehensive Platform Overview
  • Continuous Threat Detection
  • Secure Remote Access
  • INTEGRATIONS
  • Firewalls
  • Network Access Control
  • SIEM
  • SOAR
  • CMDB
  • OEM

Industry Solutions

  • Energy
  • Consumer Products
  • Critical Manufacturing
  • Pharmaceutical
  • Water Utilities

Partners

  • Claroty Focus Program
  • Find a Partner
  • Become a Partner
  • Partner Login

Resources

  • Resource Library
  • Case Studies & Use Cases
  • Data Sheets
  • Integration Briefs
  • Videos & Webinars
  • Whitepapers

About

  • Leadership
  • Careers
  • Contact Us
  • News
  • Press Releases
  • Events and Webinars
  • Advanced Services Terms & Conditions