Logo
Monitor Illustration
Blog

News, Article, and Solution in Cybersecurity Realms.

Why You Need To Take Asset Inventory Seriously
Technology

Why You Need To Take Asset Inventory Seriously

ITSEC AsiaITSEC Asia
|
Jul 09, 2023 5 minutes read

If you work in cybersecurity, the saying does not apply and will get you into trouble at some point. Nobody expects you to know everything, but they expect you to know what assets you have on your corporate networks plugged into your IT infrastructure. It's the first thing I look for when speaking to an organisation for the first time. Generally speaking, the more that an organisation can tell you about their inventory of PC's, tablets, smartphones, servers, wireless access points and wireless access points, the better they are at cybersecurity. It may surprise you to discover that most organisations do not have a firm handle on their asset inventory. This is shocking in itself because asset discovery is a foundational IT security measure and it's impossible to defend your IT infrastructure unless you have an up-to-date list of what you are defending. When you learn that most companies do not maintain an active list of their assets, it's not at all surprising that so many get breached. When I

Professor IllustrationAndroid IllustrationMonitors Illustration

Recent Highlights

7 Things You'll Only Find at ITSEC: Cybersecurity Summit 2025
Events

7 Things You'll Only Find at ITSEC: Cybersecurity Summit 2025

cybersecurity summit
ITSEC AsiaITSEC Asia
|
Jul 31, 2025 5 minutes read

7 THINGS YOU'LL ONLY FIND AT ITSEC: CYBERSECURITY SUMMIT 2025 The cyber threat landscape is evolving rapidly, and with it, the demand for smarter strategies, deeper collaboration, and practical innovation. ITSEC: Cybersecurity Summit 2025 [https://itsecsummit.events/] is a meeting point for global leaders, professionals, and change-makers committed to securing the digital future. This event will take place on August 26–28, 2025, at The Ritz-Carlton Jakarta, Pacific Place, and is set to become The Largest Critical Infrastructure Cybersecurity Event in Southeast Asia. Here are 7 Things You'll Only Find at ITSEC: Cybersecurity Summit 2025! 1. EXCLUSIVE INSIGHTS FROM GLOBAL CYBERSECURITY LEADERS One of the most anticipated highlights of ITSEC: Cybersecurity Summit 2025 is the opportunity to gain exclusive insights from a distinguished lineup of global cybersecurity leaders. The summit will feature experts from diverse sectors and specialties, including Ken Bonefeld Nielsen, Saltanat Mashirova, Mohamed Hekal, Christopher Stein, and many more. These thought leaders bring years of experience in IT security, OT security, and infrastructure resilience, offering participants a rare opportunity to engage directly

Collaborate for Indonesia's Cyber Resilience at ITSEC Cybersecurity Summit 2025! Secure Your Spot!
Events

Collaborate for Indonesia's Cyber Resilience at ITSEC Cybersecurity Summit 2025! Secure Your Spot!

cybersecurity summit
ITSEC AsiaITSEC Asia
|
Jul 30, 2025 5 minutes read

COLLABORATE FOR INDONESIA'S CYBER RESILIENCE AT ITSEC CYBERSECURITY SUMMIT 2025! SECURE YOUR SPOT! The digital world is a realm of constant amazement, but it's also fraught with challenges. Just imagine, throughout 2024, Indonesia recorded over 330 million cyber traffic anomalies. This threat is real and can lead to everything from sensitive data theft to severe reputational damage for organizations. But don't worry, there's always a way to fight back! ITSEC Asia proudly presents the ITSEC Cybersecurity Summit 2025, Southeast Asia's prestigious cybersecurity forum, taking place from August 26-28, 2025, at The Ritz-Carlton Jakarta, Pacific Place. This is no ordinary conference. According to the President Director of ITSEC Asia, Patrick Rudolf Dannacher, this event is an open platform designed to accelerate collaboration and shape a more secure and resilient digital future for Indonesia. Still hesitant to join? Here are 5 reasons why you must secure your ticket right now! 1. LEARN DIRECTLY FROM WORLD-CLASS CYBER EXPERTS The ITSEC Cybersecurity Summit 2025 is an international-scale conference specifically designed as a hub for knowledge exchange. The

OT Cybersecurity Incident Response: ICS4ICS Roles and Responsibilities
Technology

OT Cybersecurity Incident Response: ICS4ICS Roles and Responsibilities

ot cybersecurity
ot technology
ITSEC AsiaITSEC Asia
|
Jan 01, 2023 17 minutes read

As industrial operations continue to embrace digital transformation, Operational Technology (OT) systems—which control and monitor critical physical processes—are becoming increasingly vulnerable to cyber threats. Unlike IT systems, OT environments often lack mature cybersecurity controls, making them attractive targets for attackers. A successful cyberattack can result in physical damage, safety risks, operational disruption, and significant financial losses. In this high-stakes context, a well-structured, role-based incident response plan is essential. This whitepaper introduces a comprehensive OT cyber incident response model that integrates globally recognized standards, including ISA/IEC 62443, NIST SP 800-82r3, NIST SP 800-61r2, and ISO/IEC 27001, while operationalizing the response using FEMA’s Incident Command System (ICS) and industry-specific enhancements from the ICS4ICS initiative. The framework focuses on establishing clear roles and responsibilities across both corporate and site-level teams—such as Incident Commander, Safety Officer, and Operations Section Chief—and aligning actions through the Planning “P” cycle to ensure a coordinated, safe, and timely response. An example case study involving ransomware at a gas-fired power plant demonstrates the effectiveness of this approach, highlighting zero downtime, rapid containment, and

Editor's Choice

Understanding the Diverse Sources and Platforms of Threat Intelligence

Juli 21, 2023

Jenkins + Gitlab + Sonarqube + Maven Integration: DevOps Configuration

Juli 11, 2023

Automated Suricata-to-ATT&CK Mapper using Machine Learning

Juli 21, 2023

Setup Basic Hacking Lab Infrastructure

Juli 21, 2023

Binary Analysis With RetDec and SYNOPSYS Code-DX

Juli 21, 2023

Streamlining Suricata / Snort Signature Development with Dalton

Juli 21, 2023
No article found

Receive weekly
updates on new posts

Subscribe