Dmitry Kupetsky, systems engineer at Fortinet
Posted: Wed Feb 12, 2025 8:43 am
Information security of current IT infrastructures
itWeek №7 (943) December 18, 2018
Valery Vasiliev | 12/13/2018
IncreaseDenis Batrankov, Information Security Consultant, CISSP at Palo Alto Networks
Denis Batrankov, Information Security Consultant, CISSP at Palo Alto Networks
IncreaseEvgeny Druzhinin, leading expert in the information security department at KROK
Evgeny Druzhinin, leading expert in the information security department at KROK
IncreasePavel Korostelev, Head of Product Promotion Department, Security Code
Pavel Korostelev, Head of Product Promotion Department, Security Code
IncreaseDmitry Kupetsky, systems engineer at Fortinet
IncreaseVyacheslav Logushev, Director of IT Services and Outsourcing at X-Com
Vyacheslav Logushev, Director of IT Services and Outsourcing at X-Com
IncreaseAlexey Malnev, Head of the Center for Monitoring and Response to Information Security Incidents Jet CSIRT of Jet Infosystems
Alexey Malnev, Head of the Center for Monitoring and Response to Information Security Incidents Jet CSIRT of Jet Infosystems
IncreaseNikita Shablykov, Commercial Director of PROMT
Nikita Shablykov, Commercial Director of PROMT
IncreaseDmitry Shumilin, Director of the Information kazakhstan whatsapp data Center at RedSys
Dmitry Shumilin, Director of the Information Security Center at RedSys
Deep integration of IT into modern business processes inevitably increases the requirements for information security. If we recall that today's leading trends in IT development include the rapid growth of the Internet of Things (IoT) and the shift of corporate IT infrastructure architecture towards cloud and edge computing, it becomes clear that in the area of corporate information security, we cannot do without focusing on the tasks of protecting these components.
In a situation of increasing cyber threats to critical information infrastructures (which usually contain standard operating systems and use widespread data transfer methods), no company will be able to remain on the sidelines of the tasks of ensuring its information security. After all, even if the business of a particular company does not relate to critical information infrastructure, it is easy to understand that without interaction with the financial, transport, telecommunications, energy segments and many other structures related to critical information infrastructure, the functioning of a modern company is impossible. This means that when building a corporate information security system, companies are obliged to take into account the information security risks associated with interaction with critical information infrastructure.
In this review, we tried to find answers to how great the risks are today for all companies associated with cyber threats to current IT infrastructures, which we include IoT, critical information infrastructure, cloud and edge computing, and what changes (organizational and hardware-software) in the construction of corporate information security they require to mitigate them.
Updating the tasks of ensuring information security of the most important IT infrastructures
itWeek №7 (943) December 18, 2018
Valery Vasiliev | 12/13/2018
IncreaseDenis Batrankov, Information Security Consultant, CISSP at Palo Alto Networks
Denis Batrankov, Information Security Consultant, CISSP at Palo Alto Networks
IncreaseEvgeny Druzhinin, leading expert in the information security department at KROK
Evgeny Druzhinin, leading expert in the information security department at KROK
IncreasePavel Korostelev, Head of Product Promotion Department, Security Code
Pavel Korostelev, Head of Product Promotion Department, Security Code
IncreaseDmitry Kupetsky, systems engineer at Fortinet
IncreaseVyacheslav Logushev, Director of IT Services and Outsourcing at X-Com
Vyacheslav Logushev, Director of IT Services and Outsourcing at X-Com
IncreaseAlexey Malnev, Head of the Center for Monitoring and Response to Information Security Incidents Jet CSIRT of Jet Infosystems
Alexey Malnev, Head of the Center for Monitoring and Response to Information Security Incidents Jet CSIRT of Jet Infosystems
IncreaseNikita Shablykov, Commercial Director of PROMT
Nikita Shablykov, Commercial Director of PROMT
IncreaseDmitry Shumilin, Director of the Information kazakhstan whatsapp data Center at RedSys
Dmitry Shumilin, Director of the Information Security Center at RedSys
Deep integration of IT into modern business processes inevitably increases the requirements for information security. If we recall that today's leading trends in IT development include the rapid growth of the Internet of Things (IoT) and the shift of corporate IT infrastructure architecture towards cloud and edge computing, it becomes clear that in the area of corporate information security, we cannot do without focusing on the tasks of protecting these components.
In a situation of increasing cyber threats to critical information infrastructures (which usually contain standard operating systems and use widespread data transfer methods), no company will be able to remain on the sidelines of the tasks of ensuring its information security. After all, even if the business of a particular company does not relate to critical information infrastructure, it is easy to understand that without interaction with the financial, transport, telecommunications, energy segments and many other structures related to critical information infrastructure, the functioning of a modern company is impossible. This means that when building a corporate information security system, companies are obliged to take into account the information security risks associated with interaction with critical information infrastructure.
In this review, we tried to find answers to how great the risks are today for all companies associated with cyber threats to current IT infrastructures, which we include IoT, critical information infrastructure, cloud and edge computing, and what changes (organizational and hardware-software) in the construction of corporate information security they require to mitigate them.
Updating the tasks of ensuring information security of the most important IT infrastructures