Skip to main content

Gridsmart tackling infrastructure security threat

A new division, formed by Gridsmart Technologies only three weeks ago, is making its public debut here at ITS America Detroit. Gridsmart Information Security & Threat Intelligence (ISTI) is an industry first-of-its-kind transportation cybersecurity group dedicated to providing vulnerability/threat assessments and tailored security strategies. It will work with private companies, departments of transportation, and others to proactively defend and enhance the resiliency of their technical infrastructure
June 7, 2018 Read time: 2 mins
Tony Rucci of Gridsmart

A new division, formed by 8097 Gridsmart Technologies only three weeks ago, is making its public debut here at ITS America Detroit.

Gridsmart Information Security & Threat Intelligence (ISTI) is an industry first-of-its-kind transportation cybersecurity group dedicated to providing vulnerability/threat assessments and tailored security strategies. It will work with private companies, departments of transportation, and others to proactively defend and enhance the resiliency of their technical infrastructure from cyberattack.

ISTI is led by Antonio Rucci, one of America’s most-respected cybersecurity experts, who worked for two decades as a counter-intelligence special agent, ultimately serving for six years at the White House before moving into the private sector.

Bill Malkes, CEO of Gridsmart, said the ISTI division was born of necessity. “There is a clear and present danger of cyber-attacks and cyber espionage on our infrastructure daily. Mobility is a strategic area for the enemy to attack. True to core Gridsmart values, we will be in front of this danger, providing those we serve with practical, simple, and implementable solutions,” he said.

Under Rucci’s leadership, ISTI will work with organisations to uncover penetration points, secure systems, and design customised hack-resistant solutions to assure network integrity.

“In the cyber criminal’s mind, traffic management networks, connected and driverless vehicles, and the spectrum of transportation technologies offer the potential for maximum impact and profound harm, said Rucci. “At ISTI, we’re committed to becoming a resource for our clients, helping them build incident response programmes and teams; training them to build, exercise, and execute resilient disaster recovery strategies. Data breaches will happen. How you respond defines your company.”

Booth 501

For more information on companies in this article

Related Content

  • How can your business plan for the worst?
    May 12, 2022
    Covid and extreme weather events have recently shown that disruption to our lives and daily routines can come suddenly, and on a staggering scale. Roger Leyland of ISN Solutions outlines what can be done to ensure continuity for agencies and businesses
  • BlackBerry’s Jeff Davis: ‘Hands off 5.9GHz!’
    September 25, 2019
    As a US Marine, BlackBerry’s Jeff Davis saw the world’s trouble spots. But much of his attention is now focused on what he sees as the ITS sector’s biggest issue: cybersecurity. Adam Hill finds out more Oh, I often feel I’m the dumbest guy in the room,” laughs Jeff Davis, senior director, connected transportation, at BlackBerry. It’s hard to credit this. Davis has a range of experience that sets him apart from most people in the ITS sector. He was in the US Marine Corps, with seven tours of duty, inclu
  • Six easy steps to security
    October 22, 2018
    As security threats become increasingly vast and varied, multinationals are beginning to see the need for an effective global security operations centre to protect their organisation. James I. Chong spells out what is required. You know you need a global security operations centre (GSOC) to support what you’ve built, identify threats, and prevent disasters before they happen - but how do you know if it’s truly effective? There’s no shortage of information coming into operation centres. Too often, it’s the
  • Keeping cyber criminals from your website
    November 10, 2017
    If a hacker can penetrate your website, they can do business as you. Joe Dysart explains how you and your customers may not discover the fraud for some time. In the latest twist on identity theft, hackers are clandestinely taking over business websites - and then brazenly billing visiting customers as if the sites are their own.