Page 112 - Cyber Defense eMagazine June 2020 Edition
P. 112
• Comprehensive communication coverage. The strategy should be able to directly monitor all
communication pathways that could be used in a cyber attack, including Ethernet, Wi-Fi,
Bluetooth, BLE, and possibly other wireless protocols such as Zigbee. Wireless coverage is
important because attackers can exploit vulnerabilities such as BlueBorne, KRACK and
Broadpwn to compromise OT devices wirelessly, without any user interaction.
Protecting OT devices from a growing list of cyber attacks and vulnerabilities brings many challenges,
but can be achieved with the right focus, backed by the right tools. What’s clear is that industrial and
manufacturing organizations cannot use traditional methods to secure OT devices being used in non-
traditional ways. As these essential devices continue to be integrated into enterprise networks, a new
approach must be used to keep them from being exploited and, ultimately, leaving valuable processes at
risk of disruption.
About the Author
Chris Dobrec, Vice President of Product Marketing, Armis.As Vice
President of Product Marketing, Chris is responsible for Armis’ product
marketing strategy and vision. He is a seasoned product and business
development executive leading teams through development and
marketing of exceptional products and cutting-edge technologies
across enterprise and consumer market segments. Prior to Armis,
Chris held executive management roles in product management,
product marketing and business development at MobileIron, Cisco,
Nokia, Ipsilon Networks and Kalpana. Chris’ journey to Silicon Valley
started after leaving college early to pursue his passion for building
great products. He can be reached by Armis’ company website at
www.armis.com.
Cyber Defense eMagazine –June 2020 Edition 112
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.