TSA Pipeline Security Directive: What’s New and Recommendations

Logo
Presented by

Roman Arutyunov, Amit Pawar, and Neelakarun Asari

About this talk

To combat the increasing number of cyber attacks targeted at critical infrastructure, the Department of Homeland Security's Transportation Security Administration (TSA) has issued three security directives in 2021-22 to increase security posture of owners and operators of gas and liquid pipelines in the USA. TSA’s third directive (Security Directive Pipeline-2021-02C) is effective as of July 27, 2022 and supersedes TSA’s second Pipeline Security Directive published in July 2021. The reissued security directive takes a performance-based approach to enhancing security, allowing operators to leverage new technologies and be more adaptive to changing environments. It’s a misconception that it has looser regulations. Rather, TSA is providing more flexibility to implement the requirements and achieve the ultimate objective of cyber hardening the critical Operational Technology (OT) and IT systems. Join HCL Technologies and Xage experts - Amit Pawar, Head of Consulting and Services at Xage Security, Neelakarun Asari, Global Head of Solutions & Services for Security of Things at HCL Technologies, and Roman Arutyunov, Co-founder and Head of Product at Xage Security, to learn more about what’s new in the revised TSA security directive as well as recommendations to comply with the TSA’s cybersecurity requirements.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (2)
Subscribers (200)
Xage is the first and only zero-trust real-world security company. The Xage Fabric accelerates and simplifies the way enterprises secure, manage and transform digital operations across OT, IT, and the cloud. Xage solutions include Identity & Access Management (IAM), remote access, and dynamic data security, all powered by the Xage Fabric. The Fabric is a zero trust solution that provides an overlay mesh to protect critical infrastructure by imposing granular control over all digital interactions. The Fabric ensures that each operational element — even those with no built-in identity of their own — is assigned an identity that determines who has access to it, and what the element may access itself. The Fabric not only blocks cyberattacks, but also isolates malware, siloing it and rendering it unable to pass between systems to ensure the operation can continue functioning undisturbed.