CISO Gems

For destination overworked CISO's

Wireless Innovations: CEO Jim Bradfield Speaks

CISO Strategy
December 7, 2024
Jim Bradfield, CEO of NAS Wireless, discusses advancements and challenges in wireless technology on Tech Talk.
Topics discussed in the episode:
-
How can businesses ensure robotics vendors are following security practices?
-
What role do employees play in securing manufacturing networks?
-
How can wireless attacks be conducted remotely on manufacturing networks?
-
Why is regular security assessment important for robotic networks?
-
What steps can businesses take to secure wireless networks in manufacturing?
-
How can third-party risk affect manufacturing cybersecurity?
-
What are the consequences of unsecured robotic networks in manufacturing?
-
How can cyber criminals exploit vulnerabilities in connected devices like vehicles?
-
How can unsecured wireless networks in manufacturing lead to cyber attacks?
-
Why is manufacturing now the most targeted industry for cyber attacks?

How can businesses ensure robotics vendors are following security practices?

Businesses must involve robotics vendors in security plans and ensure they follow standards.

\"There's got to be something that the business can do even if they're not managing the network themselves.\"

  • Involve vendors in security planning.
  • Set security expectations in contracts.
  • Audit vendors' security practices regularly.

What role do employees play in securing manufacturing networks?

Employees play a crucial role; proper training prevents breaches from human error.

\"...they have to train the employees really well to understand and make sure that every access is limited... and they have to work closer with the manufacturer and they can work with guys like us, guys like you.\"

  • Train employees on cybersecurity.
  • Limit access privileges.
  • Work with security experts.

How can wireless attacks be conducted remotely on manufacturing networks?

Wireless networks can be accessed remotely, so attackers don't need physical access.

\"Just to remind our viewers as well too, that because this is wireless, the attacker doesn't necessarily have to be within the facility to exploit any sort of vulnerability. It's wireless.\"

  • Remote attacks are possible via wireless.
  • Secure wireless connections thoroughly.
  • Implement strong encryption and authentication.

Why is regular security assessment important for robotic networks?

Regular security assessments help identify vulnerabilities before attackers do.

\"They need to have a regular review of their security posture and all of the plans and that's not happening... and they have to train the employees really well to understand...\"

  • Regularly assess security posture.
  • Perform penetration tests on robotic networks.
  • Train employees on security best practices.

What steps can businesses take to secure wireless networks in manufacturing?

Businesses must develop comprehensive security plans to secure wireless networks.

\"The typical thing that they need to do is they need to actually develop a plan with the robotics manufacturer and with the guys who are supporting all that... they need to start getting those things, those plans out...\"

  • Create incident response plans with vendors.
  • Regularly review security measures.
  • Train employees on cybersecurity.

How can third-party risk affect manufacturing cybersecurity?

Relying on third-party vendors like robotics providers can introduce cybersecurity risks.

\"This almost sounds like that it's a third-party risk management issue where you have the robotics vendor that is responsible for maintaining and managing not only their equipment but also the connections...\"

  • Third-party vendors can be a security risk.
  • Ensure vendors follow security best practices.
  • Include vendors in cybersecurity planning.

What are the consequences of unsecured robotic networks in manufacturing?

Unsecured robotic networks can be hijacked, causing operational disruptions and safety risks.

\"Cyber criminals actually get in there and do a hell of a lot of mess for everybody. The sensors are vulnerable to ransomware. They get malware... you get a hijacking, you get a signal modification, you get intentional attacks...\"

  • Robotic networks need strong security.
  • Monitor networks for malicious activity.
  • Protect against ransomware and malware.

How can cyber criminals exploit vulnerabilities in connected devices like vehicles?

Cyber criminals can exploit vulnerabilities in connected devices, leading to dangerous outcomes.

\"And it's a really simple thing, things get hacked. Like for example, the automated robot in a car like a Jeep Cherokee, for example, you know, the sensors in the wheels facilitate the wireless communication. Well, they can be exploited by a hacker.\"

  • Connected devices can be exploited.
  • Secure all components, including sensors.
  • Regularly update device firmware.

How can unsecured wireless networks in manufacturing lead to cyber attacks?

Unsecured wireless networks in manufacturing are vulnerable to attacks.

\"And this is because everything has been set up with IoT functionality—that's, you know, the Internet of Things—and most of that is connected via wireless. And, you know, it turns out that a lot of that is on a separate wireless network and is not secured.\"

  • Unsecured wireless networks are vulnerable.
  • Secure all networks properly.
  • Integrate IoT with corporate security policies.

Why is manufacturing now the most targeted industry for cyber attacks?

Manufacturing is now the top target for cyber attacks due to increased IoT and wireless connectivity.

\"Yeah. Well, you know, it turns out that the most targeted industry for cybersecurity issues and breaches and things like that is starting in 2023 was manufacturing. It accounts for almost 27% or so of attacks.\"

  • Recognize the heightened cyber risks in manufacturing.
  • Implement stronger security for IoT devices.
  • Conduct regular security assessments.