Skip to main content

Gridsmart tackling infrastructure security threat

A new division, formed by Gridsmart Technologies only three weeks ago, is making its public debut here at ITS America Detroit. Gridsmart Information Security & Threat Intelligence (ISTI) is an industry first-of-its-kind transportation cybersecurity group dedicated to providing vulnerability/threat assessments and tailored security strategies. It will work with private companies, departments of transportation, and others to proactively defend and enhance the resiliency of their technical infrastructure
June 7, 2018 Read time: 2 mins
Tony Rucci of Gridsmart

A new division, formed by 8097 Gridsmart Technologies only three weeks ago, is making its public debut here at ITS America Detroit.

Gridsmart Information Security & Threat Intelligence (ISTI) is an industry first-of-its-kind transportation cybersecurity group dedicated to providing vulnerability/threat assessments and tailored security strategies. It will work with private companies, departments of transportation, and others to proactively defend and enhance the resiliency of their technical infrastructure from cyberattack.

ISTI is led by Antonio Rucci, one of America’s most-respected cybersecurity experts, who worked for two decades as a counter-intelligence special agent, ultimately serving for six years at the White House before moving into the private sector.

Bill Malkes, CEO of Gridsmart, said the ISTI division was born of necessity. “There is a clear and present danger of cyber-attacks and cyber espionage on our infrastructure daily. Mobility is a strategic area for the enemy to attack. True to core Gridsmart values, we will be in front of this danger, providing those we serve with practical, simple, and implementable solutions,” he said.

Under Rucci’s leadership, ISTI will work with organisations to uncover penetration points, secure systems, and design customised hack-resistant solutions to assure network integrity.

“In the cyber criminal’s mind, traffic management networks, connected and driverless vehicles, and the spectrum of transportation technologies offer the potential for maximum impact and profound harm, said Rucci. “At ISTI, we’re committed to becoming a resource for our clients, helping them build incident response programmes and teams; training them to build, exercise, and execute resilient disaster recovery strategies. Data breaches will happen. How you respond defines your company.”

Booth 501

For more information on companies in this article

Related Content

  • Transit 'unprepared' for cyberattack, says MTI
    October 9, 2020
    Four in 10 agencies do not have cybersecurity action plan in place, researchers find
  • Connected-car security market expected to reach US$759 million in seven years
    September 30, 2016
    With nearly 112 million vehicles now connected around the world, the global market for automotive cybersecurity is expected to grow exponentially – to US$759 million in 2023, according to a new report, Automotive Cyber-security and Connected Car, from IHS Automotive, part of business information provider IHS Markit. Connected cars are defined as those that have a connection to the internet, through telematics, an onboard modem or a paired device in the vehicle, such as a mobile phone or other device. One
  • Cisco’s 5 steps to cyber-resilient roadways
    September 12, 2024
    As the ITS world becomes ever more connected, cybersecurity risks are increasing. Cisco experts Pete Kavanagh and Angela Murphy explain how to overcome key challenges
  • Companies depend on automation, AI and machine learning for cyber security
    February 23, 2018
    To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication