August 12, 2019
summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.
Our digital economy depends on secure data; effective cybersecurity is critical to the functioning of governments, finance, infrastructure, business, and individuals. Thomas Glocer has been helping to fend off cyberattacks for nearly two decades, as CEO of Thomson Reuters, a member of the Morgan Stanley board, and co-founder and executive chairman of the cyber defense firm BlueVoyant. He surveys the state of cyber defense.
In an interview with Teri Takai, who’s the former CIO for the U.S. Department of Defense and for the states of California and Michigan, we explore how local governments can tackle the growing cyberthreat.
The CABA Board of Directors and the CABA Intelligent & Integrated Buildings Council (IIBC) have selected the next CABA Landmark Research Study to be “Intelligent Buildings and Cybersecurity”. What steps has your organization taken to ensure that your company is safe from cybersecurity attacks?
"According to a benchmark study of 350 companies spanning 11 countries, the average consolidated total cost of a data breach is $3.8 million."
Steven Main, a cybersecurity expert experienced in combining behavioral science and computer science to identify risk and develop appropriate training, processes, and technology to eliminate that risk, asked the simple question to his audience, “Can integrators monetize cybersecurity by offering managed security services that provide long-term security for their clients and a steady revenue stream for their integration business?”
The main component of risk management, integral to maintaining security and compliance as well as holding on to the certifications that you’ve worked so hard to achieve, is cybersecurity assessments and audits. What are they? Are they interchangeable? Are they all necessary processes? Do you want the one or the other? Can Bob in IT be left to handle it or do you require independent third-party assistance? These assurance terms are often used interchangeably but are different activities.
In June, the NIST Cybersecurity for IoT and Privacy Engineering programs published NIST Internal Report (NISTIR) 8228, Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. The purpose of NISTIR 8228 is to help federal agencies and other organizations better understand and manage the cybersecurity and privacy risks associated with their use of IoT devices in their organization’s operations throughout the devices' lifecycles.
If you would like to provide feedback please download Draft NISTIR 8259: Core Cybersecurity Feature Baseline for Securable IoT Devices: A Starting Point for IoT Device Manufacturers and submit your feedback through September 30, 2019, at email@example.com.
Comments will be approved before showing up.
August 30, 2023
July 31, 2023