Cybersecurity Best Practices for the Manufacturing Industry
The manufacturing and industrial sectors have evolved with the introduction of technologies over the past many decades. Progress in improving processes, techniques, output, quality, and efficiencies have been gained with new technology as they emerge, and the end result can be positive and fortuitous for organizations. With the rapid movement towards a modern-day manufacturing environment, new and connected technologies that employ greater cyber connectedness continue to grow, but at the same time, can introduce cybersecurity risks.
Provided to the reader will include three main content areas :
1) A historical background of the evolutionary Industry 1.0 through Industry 4.0 progress
2) The United States and Internationally available frameworks that can be approached to secure the manufacturing sector
3) A top 10 list of practical elements that can rapidly be approached to secure manufacturing systems from cyber threats as well as a look to the future.
Download Publication
Link to Recording - CSA Discussion - Cybersecurity Best Practices for the Manufacturing Industry
CSA New Jersey at Kean University Chapter Research
Over the last 2 years since its creation, the CSA New Jersey Chapter at Kean University has contributed to the Cloud Security Alliance with various research publications. In May of 2021, the CSA New Jersey Chapter published a research document titled, Cloud Solution Data Science COVID-19 Dashboard. This brief case study article outlines the steps taken to create a prototype data science dashboard for data points related to the global COVID-19 pandemic response. These data points include global infection cases, deaths, testing, and vaccine administration by country, state, and region. This document also outlines how the prototype was securely built using cloud solutions, which ultimately expedited the development of these valuable resources.
Description: Data centers grow annually by about forty percent, and those for industries such as healthcare, energy, and transportation are growing even faster. However, making data openly available with the use of the cloud can create security threats and opportunities for threat actors. Despite these dangers, many people and organizations benefit from the availability of open data. It can be a useful tool for tackling a global issue, which we have seen with the eagerness for information on the COVID-19 pandemic. Therefore, as open data centers are an increasingly important method for disseminating critical information, the need for cybersecurity to secure these resources has become a public interest and an obligation.
Key Takeaways:
- How using cloud-enabled and open data makes knowledge on large-scale issues accessible and understandable
- How Power BI, an online software-as-a-service (SaaS) offering from Microsoft, was used to do transformation and data modeling and to create a relational dataset
- The challenges involved with using Power BI
- How cloud security provisions, such as anonymized data, were used in the dashboard
- What the setup of the COVID-19 cloud-enabled web portal looks like
Download Publication
CSA Blog - Cloud Video Surveillance
These days, it is not unusual to walk too far before you see the endpoint of a video surveillance system. Reviewing video surveillance cybersecurity.
Release Date: 03/10/2021
CSA NJ Blog Link
CSA Research Artifact Library Access
Over the last 11 years, we have developed an extensive library of over 400 artifacts that speak to many different topics in cloud security. Accessing and downloading research has just become easier through our Research Artifacts Publications Library. Below are a few must-read artifacts:
Engaging CSA Research
https://cloudsecurityalliance.org/research/
As chapter members you have the opportunity to influence, leverage and participate in all aspects of CSA's Research Lifecycle by engaging our Working Groups, Open Peer Reviews, Surveys. You also have access to over 200 previously recorded CloudBytes webinars, which are a great way to stay educated on the latest trends in cloud security and earn CPE credits.
When in Doubt - Join a CSA Working Group!
https://cloudsecurityalliance.org/research/working-groups/
Above is the link to our active working groups spanning many different domains of cloud security. Simply click the working group microsite and you'll have access to the working group description, charter, latest artifact releases and upcoming meetings. By joining a working group you'll have intimate access to the latest technical documents in development, invited to working group calls and opportunities to collaborate with SME's. To get started with joining a working group, you will need to create a profile on our community platform Circle.
Circle - Your gateway to CSA resources, discussions and working groups!
https://circle.cloudsecurityalliance.org/home
Once you've signed up a Circle profile, please make sure to join your Chapter community. Below are a few steps to follow:
- Click on'Sign In' at the top, and sign in using your preferred mode (Google, LinkedIn, Microsoft, email).
- Once you're in, you can click on 'Communities', then 'All Communities'.
- Look for the group of your choice on the list and click 'Join'.