Governance & Risk Management , Operational Technology (OT)

Threatscape 2022: What Is the Outlook for Government?

Fortinet's Jim Richberg on Supply Chain Risk, OT and Securing Infrastructure
Jim Richberg, Field CISO Public Sector, Fortinet

Supply chain attacks and OT risks are not new, but they got taken to new lengths by cyber adversaries in 2021. The outlook for 2022: More of the same, says Jim Richberg of Fortinet. But he has ideas on how governments worldwide can improve their defenses and security postures.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

In this video interview with Information Security Media Group, Richberg discusses:

  • How cyber adversaries have evolved their techniques in 2021;
  • Supply chains and OT in the crosshairs;
  • Governments' best opportunities to improve their security postures.

Richberg is a Fortinet field CISO working to bring cybersecurity solutions to industry and the public sector following an over-30-year career driving innovation in cyber intelligence, policy and strategy for the United States government and international partners. He served as national intelligence manager for cyber, the senior federal executive focused on cyber intelligence within the $80+ billion U.S. intelligence community, or IC, annual operating budget. He also was senior adviser to the Director of National Intelligence on cyber issues and set collection and analytic priorities for the IC's 17 departments and agencies on cyberthreats.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.