Energize Ventures
Published in

Energize Ventures

Cybersecurity for Critical Infrastructure in 2021

Our critical infrastructure is more connected than ever — and that’s a double-edged sword.

  • Advanced detection through analytics. Anomaly detection through advanced analytics can help identify threats across the network, especially as attacks move from one surface (IT) to another (OT). Industrial CISO’s are adopting state-of-the-art visibility and detection tools like Energize portfolio companies Nozomi Networks and Awake Security.
  • Zero trust: With the shift to remote work and explosion in devices and applications delivered to multiple endpoints, CISO’s have taken a “zero trust” approach (don’t trust anything, verify everything) whereby every endpoint must be authenticated every time it logs on. Zero trust architecture is particularly relevant for distributed assets. Energize portfolio company Zededa is a leader in edge orchestration and security.
  • SaaS security: Even the staunchest proponents of on-premise architectures are now migrating to cloud-based services for operations. Budgets are growing to manage security infrastructure across multi-cloud and hybrid environments. With access to more applications and sensitive information moving to the cloud, security for software as a service helps detect insider threats and manage access and privilege risks.
  • Compliance. Especially in regulated industries, many security teams spend countless hours documenting, reporting, and preparing audits. Furthermore, there is a growing disconnect between security operations and board-level accountability that we expect will narrow with regulation and investor pressures.
  • Embedded product security. Whether for industrial or consumer use cases, buyers expect devices to be secure endpoints that can be added to existing systems. In practice, however, security is not always designed into new products as it can be costly and time-consuming.
  • Supply chain. The power, manufacturing, and industrial markets have complex supply chains spanning OEMs and systems integrators. Connected devices have several touchpoints for configuration, deployment, and maintenance, and operators rely on third party consultants and in-house field labor. The industry needs secure device lifecycle management tools.
  • Efficient response. Cybersecurity teams in the energy and manufacturing world are often overwhelmed with the volume and complexity of alerts and incidents that must be investigated, remediate, and reported. Security Orchestration Automation and Response (SOAR) and Endpoint Detection and Response (EDR) tools have risen in popularity as constrained cyber teams are adapting to do more with less.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Energize Ventures

We partner with entrepreneurs to advance the next generation of energy & industry.