Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Facilities

New York City becomes the first city to open a cybersecurity center

  • Christina Miller
  • July 20, 2021
Test 2 Alt Text
Courtesy: CFE Media and Technology
Total
0
Shares
0
0
0
0

New York City is the first city in the U.S. to open its own operational cybersecurity defense center. Located in lower Manhattan, this real-time operational center is the first of its kind. 

According to the The Wall Street Journal, the center employs around 282 partners comprised of government agencies and private businesses such as the New York Police Department (NYPD), Amazon, International Business Machines Corp. (IBM), the Federal Reserve Bank and several New York health care systems. With that many partners, relevant parties can more easily share cyber threat information and start mitigating cyberattacks on-site.

In 2017, discussions started about how New York City would respond to a cyberattack, and by 2019, the New York City Cyber Critical Services and Infrastructure (NYC CCSI) projects launched virtually. A cyberattack on a city could take out critical services such as transportation, hospital facilities, emergency systems and more. When faced with an immediate crisis, major cities like New York need to have an even faster response.

“Ransomware attacks are happening every 14 seconds,” NYPD Deputy Commissioner of Intelligence and Counterterrorism John Miller said to The Wall Street Journal. Because New York City is such a main center of business and wealth for the U.S., it is more vulnerable to cyberattacks. The city’s sectors are all interconnected, which is why having a physical center is so crucial. “When one major piece of critical infrastructure is under attack, they’re all under attack,” said Miller.

News of the cybersecurity center comes amid a wave of attacks on national critical infrastructure and private industry, including hits on the Colonial Pipeline, global meat processor JBS and beverage maker Molson Coors, just to name a few. Whenever there is a cyberattack in the country, the New York initiative partners will share information with the center as soon as the event starts. Therefore, the center can track if New York might be a target, prepare for a potential attack and react quicker.

Not only does the center actively work on responding to threats, but it also trains people to know how to take charge as an attack is happening. The partners hold what are called “war games,” where they practice defending their own systems against attacks. This way, they will have a better chance to defend their systems as an attack is happening rather than being caught off guard and having to do damage control later. This opening is a huge step toward better cybersecurity practices.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Christina Miller

Christina Miller is the assistant content editor at CFE Media and Technology.

Related Topics
  • CFE Content
  • Featured
Previous Article
  • Threats & Vulnerabilities

Ransomware attacks force 31% of U.S. companies affected to close down

  • Christina Miller
  • July 19, 2021
Read More
Next Article
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
  • Education

Cybersecurity education and research institute established

  • Washington State University
  • July 21, 2021
Read More
You May Also Like
Read More

Protecting Critical Infrastructure eBook

Courtesy: Bundy Group
Read More

Cybersecurity mergers and acquisitions and capital markets update

Read More

Webcast: How to Protect Against Supply Chain Attacks

Courtesy of: Louisiana State University
Read More

Taking a ‘hands-on’ approach to smartphone identity verification

Courtesy: Applied Control Engineering Inc.
Read More

New funding will help University of Arizona grow the cybersecurity workforce

Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
Read More

Immune to hacks: Inoculating deep neural networks to thwart attacks

Read More

Introduction to ICS security fundamentals

Courtesy: CFE Media and Technology
Read More

NSF award will help IUPUI train, increase diversity of next wave of cybersecurity engineers

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT