{"id":5590,"date":"2025-05-17T09:01:11","date_gmt":"2025-05-17T01:01:11","guid":{"rendered":"https:\/\/cicserver.com\/us-critical-infrastructure-still-struggles-with-ot-security\/"},"modified":"2025-05-17T09:01:11","modified_gmt":"2025-05-17T01:01:11","slug":"us-critical-infrastructure-still-struggles-with-ot-security","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/us-critical-infrastructure-still-struggles-with-ot-security\/","title":{"rendered":"US Critical Infrastructure Still Struggles With OT Security"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Just a week shy of the four-year anniversary of the Colonial Pipeline attack, cybersecurity across US critical infrastructure, particularly operational technology, is lagging woefully behind the country&#8217;s adversaries.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">A bit of good news came out of the infamous incident, according to Michael Garcia, associate chief of policy with the US Cybersecurity and Infrastructure Security Agency. During a panel discussion yesterday on securing critical infrastructure at RSAC Conference 2025, he said the attack jolted the collective conscience of the country awake to the fact that ransomware was a true threat, and that a cyber-attack could have real-world operational technology consequences. But beyond awareness, little has improved across critical infrastructure networks.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">\u201cHave we done enough?\u201d Garcia asked rhetorically during his opening remarks. \u201cThe answer is no.\u201d<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The consensus among Garcia and his fellow panelists was that intelligence and information sharing are key to effective defense and response. But sharing information with the federal government can be onerous. Who do you call when there&#8217;s an incident?\u00a0<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link ContentText-BodyTextChunk_italic\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/remote-workforce\/critical-infrastructure-struggles-ot-security\">Keep reading this article in Dark Reading, a Data Center Knowledge partner site<\/a><\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>Just a week shy of the four-year anniversary of the Colonial Pipeline attack, cybersecurity across US critical infrastructure, particularly operational technology, is lagging woefully behind the country&#8217;s adversaries. A bit of good news came out of the infamous incident, according to Michael Garcia, associate chief of policy with the US Cybersecurity and Infrastructure Security Agency. [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5591,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5590","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5590"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5590\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5591"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}