Marina Chase: Treasury Is The Value Center Of The Enterprise
With treasury serving as a knowledge center, all divisions turn to it for real-time information related to operational activities. The power of the treasury management system comes from its global perspective and predictive capabilities. "It’s still cash management,...
Kyriba: The CFO Perspective – The Strategic Value of Treasury
The book includes insights from the following experts: Marina Chase, CFO (Ag.), Caribbean Airlines, Treasury Is The Value Center Of The Enterprise >> Philippe Sanchez, CFO, The Exclusive Group, Visibility Is The Key To A Successful...
Doug Wylie: Securing OT Systems Requires Specialized Tools And Approaches
CISOs must embrace their leadership role so they can communicate a clear perspective on risks that affect the company, the employees, customers, and the community. Recognize that security is not an absolute state. It must evolve because new risks emerge, threats...
Clint Bodungen: ICS Cybersecurity Risk Management Requires A Customized Approach
ICS cybersecurity is not a one-size-fits-all endeavor. Businesses must tailor their strategies to match their unique environments. It’s important that top-level business concerns surrounding reliability, efficiency, integrity, and safety guide your plant’s...
Craig Morris: Risk Management Requires Effective Collaboration
You need to have a holistic picture of how everything in the OT environment works to truly understand the full range of vulnerabilities that may exist. An engineer will always be able to provide a logical explanation as to why an asset was configured in a particular...
Omar Sherin: Don’t Measure OT Cybersecurity Risk In Terms Of Financial Impact
Plant segmentation, in which different teams are responsible for different areas, makes cataloging assets possible, especially in very large infrastructures. One way to get plant operators and equipment vendors to focus on cybersecurity is to make it a question of...
Agustin Valencia: OT Security Requires A Holistic View Of Plant Risk
Classify assets according to risk, so you know what you need to protect and can prioritize vulnerability management strategies and ICS maintenance. OT cybersecurity is not just an IT problem. Everyone in the plant needs to understand their roles and responsibilities...
Spencer Wilcox: For Better OT Security, Control And Monitor Your Environment
It’s important not just to have a comprehensive understanding of the types of communication transpiring on your ICS network but detailed monitoring in place as well. Establishing a baseline for what normal behavior looks like will allow you to identify anomalous...
Ayo Folorunso Agunbiade: For Better ICS Security, Reduce Your Attack Surface
Application whitelisting and proper configuration and patch management reduces the attack surface and helps keep control systems more secure. Analyze potential attack vectors to reduce your environment’s overall attack surface and make it much more challenging for...
Robin Familara: Identity Access, Asset Inventory, And Incident Response Are Key
Identity access, asset inventory, and procedures for responding to and recovering from an attack are keys to a strong ICS cybersecurity program. Good communication between remote network engineers, on-site engineers and system owners makes it easier to update the...