logo
Dorchester County first critical infrastructure summit tackles security threats

Dorchester County first critical infrastructure summit tackles security threats

Yahoo05-03-2025
DORCHESTER COUNTY, S.C. (WCBD) – Leaders in Dorchester County are holding their first Critical Infrastructure Summit to strengthen partnerships and enhance security in the county.
Officials say in an era of evolving threats, proactive collaboration is the key to protecting Dorchester County's essential services.
The summit will bring together key public and private sector stakeholders to strengthen partnerships, security, and resilience of critical infrastructure in the county.
Officials say they will discuss the current threat landscape, mitigation strategies, and available resources with business leaders, infrastructure operators, emergency managers, and public safety professionals.
'A successful Critical Infrastructure Protection program relies on strong partnerships with private-sector stakeholders, who own and operate the majority of these essential assets,' said Dorchester County officials.
County officials added those partners include SC Ports Authority, SC State Law Enforcement Division, Dominion Energy, FBI Columbia, and CISA.
The meeting is scheduled on Thursday, March 6, beginning at noon at the Dorchester Emergency Operations Center.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

OPINION: Time for bold operational technology cybersecurity leadership
OPINION: Time for bold operational technology cybersecurity leadership

Yahoo

time6 days ago

  • Yahoo

OPINION: Time for bold operational technology cybersecurity leadership

Alberta has raised the bar. As of May 31, its new Security Management for Critical Infrastructure Regulation mandates operational technology (OT)-focused protections aligned with CSA Z246.1 (the federal standard that specifies criteria for establishing a security management program for petroleum and natural gas industry systems). Operators must inventory and segment control systems, minimize attack surfaces and implement intrusion detection. Most critically, Alberta regulators have enforcement power. 'Alberta's bold move sets a new standard for protecting what powers our nation. This isn't just regulation; it's a wake-up call to embed cybersecurity into the DNA of critical infrastructure,' says Denrich Sananda, managing partner at Arista Cyber in Richmond Hill, Ont. At the federal level, Bill C-26's Critical Cyber Systems Protection Act (CCSPA) promises long-overdue OT security requirements for sectors like telecom, banking and energy. It mandates risk management programs, incident reporting and compliance with government directives. But gaps remain: oversight is weak, its scope is narrow and it omits ransomware and safe harbour provisions. 'Canada must lead in OT cyber security policy to protect our national interests, as our critical infrastructure supports the essential services Canadians rely on every day,' urges Ashif Samnani, national cybersecurity practice leader at St. John's-based Mobia. 'This protection requires a national mandate, prioritizing and resurrecting bills such as Bill C-26 tied to a larger scope over provincial approaches such as Alberta Legislation 84/2024, to ensure a unified and resilient defense against evolving cyber threats.' There are four priorities federal authorities should initiate: Mandate national OT standards – Build on CSA and IEC 62443 (the series of international standards that focus on cybersecurity for industrial automation and control systems) to create a common, enforceable baseline across sectors. Alberta's model shows that this is feasible. Coordinate across jurisdictions – Align provincial and federal efforts with shared threat data, playbooks and regulatory expectations. Fund modernization – Many systems are outdated and expensive to secure. Support upgrades, especially for small operators and municipalities. Enable real-time threat sharing – Expand Canada's cyber incident response infrastructure to include OT-specific intelligence and exercises. Globally, allies are acting decisively. The U.S. now mandates cyber incident reporting and sector-specific controls. Europe's NIS2 directive imposes strict OT requirements and executive accountability. Australia, too, is prioritizing OT risk management. Meanwhile, ransomware attacks on industrial systems have surged 87 per cent. New malware like Pipedream targets control systems directly. CISA and CCCS warn that Canada's OT environment, including water, transportation and power systems, remains dangerously exposed. 'To stay ahead of escalating threats, Canada must treat Alberta's move not as the finish line, but as a starting point for national leadership in OT risk governance,' echoes Tristan Kim, head of security sales at Kore Solutions, Toronto. The Canadian Cybersecurity Network (CCN) will publish a national OT cybersecurity report and host a leadership summit in Calgary this September. Policymakers should treat this moment as a turning point. Bill C-26 offers a framework, but leadership, transparency and funding must follow. Canada cannot afford to remain reactive. OT is the new front line. The time to lead is now. To find out more about the National OT Report and Event go here. Francois Guay is the CEO and Founder of the Canadian Cybersecurity Network, Canada's largest cybersecurity community. This section is powered by Revenue Dynamix. Revenue Dynamix provides innovative marketing solutions designed to help IT professionals and businesses thrive in the Canadian market, offering insights and strategies that drive growth and success across the enterprise IT spectrum. Sign in to access your portfolio

Iranian cyberattacks remain a threat despite ceasefire, US officials warn
Iranian cyberattacks remain a threat despite ceasefire, US officials warn

Yahoo

time30-06-2025

  • Yahoo

Iranian cyberattacks remain a threat despite ceasefire, US officials warn

WASHINGTON (AP) — A ceasefire between Iran and Israel has not ended the threat of cyberattacks from hacking groups supportive of Tehran, the FBI and federal cybersecurity officials warned Monday. In a public bulletin, the authorities warned that hacking groups affiliated with or supportive of Tehran may still seek to disrupt or disable critical infrastructure systems in the U.S. such as utilities, transportation and economic hubs. Hackers may also target defense contractors or other American companies with ties to Israel, the agencies said. 'Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity,' the agencies warned. The warning of continued cyberthreats after a halt to conventional warfare reflects the often opaque nature of cyber conflict. Hacking groups may have only loose ties to a nation state, and may seek to retaliate as an alternative to traditional military action. The bulletin outlined recommendations, including the use of regular software updates and strong password management systems to shore up digital defenses. Hackers backing Tehran have targeted U.S. banks, defense contractors and energy companies following American strikes on Iranian nuclear facilities — but so far have not caused widespread disruptions. While it lacks the technical abilities of China or Russia, Iran has long used its more limited capabilities to steal secrets, score political points or frighten opponents. Analysts have tied some of these activities to groups working on behalf of Iran's military and intelligence agencies. But in other instances, the groups appear to act independently. David Klepper, The Associated Press Sign in to access your portfolio

Iranian cyberattacks remain a threat despite ceasefire, US officials warn
Iranian cyberattacks remain a threat despite ceasefire, US officials warn

Associated Press

time30-06-2025

  • Associated Press

Iranian cyberattacks remain a threat despite ceasefire, US officials warn

WASHINGTON (AP) — A ceasefire between Iran and Israel has not ended the threat of cyberattacks from hacking groups supportive of Tehran, the FBI and federal cybersecurity officials warned Monday. In a public bulletin, the authorities warned that hacking groups affiliated with or supportive of Tehran may still seek to disrupt or disable critical infrastructure systems in the U.S. such as utilities, transportation and economic hubs. Hackers may also target defense contractors or other American companies with ties to Israel, the agencies said. 'Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity,' the agencies warned. The warning of continued cyberthreats after a halt to conventional warfare reflects the often opaque nature of cyber conflict. Hacking groups may have only loose ties to a nation state, and may seek to retaliate as an alternative to traditional military action. The bulletin outlined recommendations, including the use of regular software updates and strong password management systems to shore up digital defenses. Hackers backing Tehran have targeted U.S. banks, defense contractors and energy companies following American strikes on Iranian nuclear facilities — but so far have not caused widespread disruptions. While it lacks the technical abilities of China or Russia, Iran has long used its more limited capabilities to steal secrets, score political points or frighten opponents. Analysts have tied some of these activities to groups working on behalf of Iran's military and intelligence agencies. But in other instances, the groups appear to act independently.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store