Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service

How to Defend Critical Infrastructure Against New Threats

Claroty CPO Grant Geyer on What’s Getting Overlooked Around Infrastructure Security
Grant Geyer, chief product officer, Claroty

The dangers associated with compromising critical infrastructure assets burst into public view with the May 2021 Colonial Pipeline ransomware attack, prompting significant investment from both the government and the private sector, according to Claroty Chief Product Officer Grant Geyer.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

In a video interview with Information Security Media Group at RSA Conference 2022, Geyer also discusses:

  • The top overlooked areas around securing critical infrastructure;
  • How the Russia-Ukraine war has affected critical infrastructure;
  • How remote work has created risk and exposure for OT systems.

Geyer oversees Claroty's product management, engineering and research organizations and is responsible for the company's product strategy and development. He has over 20 years of experience in the cybersecurity industry. Most recently, he worked as an executive-in-residence at Scale Venture Partners. Prior to that, Geyer was senior vice president of products for RSA and vice president at Symantec, which he joined through its acquisition of Riptech. Earlier in his career, Geyer served as a military intelligence officer for the U.S. Army.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.