TSA Pipeline Cyber Security Directive is a Strong First Step

What is in the May 27th Security Directive?

1. Report confirmed and potential cybersecurity incidents to the DHS Cybersecurity and Infrastructure Security Agency (CISA)

2. Designate a Cybersecurity Coordinator to be available 24X7

3. Review current cybersecurity practices and identify any gaps as well as related remediation measures and report those to TSA within 30 days

How to review the current pipeline cybersecurity practices?

Steps to achieve pipeline security compliance with the DHS recommendations.

1. Begin at the beginning with a robust asset inventory.

2. Think Global-Act Local.

3. Focus on OT Systems Management skill development

4. Automate, Automate, Automate

How does Verve help increase pipeline security?

Verve Security Management Platform

What’s next for Cyber Security and Pipeline Operators

--

--

--

Verve's mission is to protect the world's critical infrastructure. Learn more at verveindustrial.com

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

TOP 5 features to boost your Osiris Browser efficiency

Project Review: Arweave [$AR]

The Importance of True Digital Ownership in An Age of Data Monetization

HTC 10 Official Mobile Review https://t.co/uA1Pk4K6zs

CyCraft Report: Taiwan Threat Trends

Cloudflare and why you should use it!

{UPDATE} Vampires of Glory - diari di sangue dell'accademia stregata Hack Free Resources Generator

{UPDATE} Jurassic Domination! The Real Tank Battle vs Dinos Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Verve Industrial Protection

Verve Industrial Protection

Verve's mission is to protect the world's critical infrastructure. Learn more at verveindustrial.com

More from Medium

The log4j vulnerability shows vulnerability management can’t come down to only a scan

THM Advent-of-cyber 2021 Day24

IoT Device provisioning and considerations

How we survived the Log4J vulnerability sofar and what to expect in…