Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Critical Infrastructure Security
The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or virtual—are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on national security, economic security, public health and safety, or any combination thereof.
When attacking critical infrastructure, cyber criminals often find themselves in an environment slightly different than traditional information technology (IT) networks, particularly as it pertains to security. Traditional IT network security concerns itself with the three primary pillars: confidentiality, integrity and availability. Operational technology (OT) drives the industrial control systems allowing for product delivery in the energy, manufacturing, shipping and other transportation sectors. Because of consumer demands and low inter-operability between components and infrastructure not receptive to patches and updates, OT systems often favor availability over security. Thus, OT networks are especially vulnerable once penetration of the firewall is accomplished.
The attack surface of critical infrastructure cyber systems has morphed and continues its evolution. However, many of the same defenses apply, and integration of OT-specific security measures can further strengthen the protection of critical assets. The following should be considered when protecting OT assets in a critical infrastructure environment:
Critical infrastructure in the US is 85 percent privately owned. However, because of national security and stability concerns, its protection and control must be addressed in a unified and collaborative partnership between public and private entities. Recognizing the need for a coordinated effort to protect these sectors, President Obama in February 2013 signed Executive Order (EO) 13636, “Improving Critical Infrastructure Cybersecurity,” and Presidential Policy Directive 21, “Critical Infrastructure Security and Resilience.” To further promulgate policy and promote public/private collaboration on security matters, President Trump on May 11, 2017 signed EO 13800, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” To ensure the sustainment of our nation’s critical infrastructure, continued collaboration between public and private stakeholders is essential to identifying threats and mitigating risk.
August 16, 2019
Learn how to leverage the latest thinking in cognitive science to improve cyber security training.
Let us know what you need, and we will have an Optiv professional contact you shortly.