Simon Chassar Profile
Simon Chassar

@CyberChassar

Followers
30
Following
122
Media
80
Statuses
266

Chief Revenue Officer - Transformational Leader | Cybersecurity and IT Innovation | Change & Growth Management | SaaS and Cyber Sales EVP | Advisor | Speaker

United Kingdom
Joined December 2023
Don't wanna be here? Send us removal request.
@CyberChassar
Simon Chassar
1 day
#AlertFatigue is the norm in #OT. Too many signals, not enough people! AI can help, but only if it learns context: which alerts matter, how incidents spread & what impacts ops. OT teams must train AI to think like the systems it protects. #OTCyber
forbes.com
AI is reshaping OT security, turning endless alerts into actionable insight and helping cyber defenders focus on what truly matters.
0
0
0
@CyberChassar
Simon Chassar
3 days
62% of Fortune 1000 firms lack OT visibility; only 17% can detect breaches. Legacy hardware, flat networks & static passwords widen the gap. In #CriticalInfrastructure, the risk isn’t just digital. How do you embed visibility without disrupting ops?
Tweet card summary image
cybersecurity-insiders.com
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is
0
0
0
@CyberChassar
Simon Chassar
7 days
The strongest manufacturers aren’t adopting OT managed service models because it’s cheaper. They’re adopting them because they’ve realised that resilience is now architectural. #OT #DigitalTransformation #OTTransformation
automationworld.com
OT managed services offer proactive support, cybersecurity management and expert teams at fraction of the hiring costs.
0
0
0
@CyberChassar
Simon Chassar
10 days
There’s a dangerous assumption emerging in #GridSecurity circles: that #AI will magically harden infrastructure that's barely digitised, poorly segmented, and rarely assessed. This article is focused on the US but packed with lessons worth borrowing!
Tweet card summary image
frenos.io
Learn what NERC CIP standards are, why they matter, and how Frenos uses AI to simplify compliance and protect North America’s power grid
0
0
0
@CyberChassar
Simon Chassar
14 days
These findings from BT highlight two truths: 1️⃣ Legacy systems drain billions in hidden costs. 2️⃣ They amplify fragility, as shown by the rise in resilience incidents across PSTN. #CriticalInfrastructure #Resilience #CyberStrategy
Tweet card summary image
techradar.com
Analog networks are costing the UK, BT warns
0
0
0
@CyberChassar
Simon Chassar
16 days
In OT security, asset discovery, segmentation, monitoring, and governance are the difference between vulnerability management that reduces risk… and one that just generates noise. The lesson? Before chasing new tools, start with clarity. Read more: https://t.co/4scBEukF1E
0
0
0
@CyberChassar
Simon Chassar
20 days
#Cybersecurity talk too often stops at TAM and ARR. Real durability comes from scalable compliance, resilience under pressure, and ecosystems, not point tools. #SmartSecurity #CyberInvesting
Tweet card summary image
home.saxo
Saxo Bank
0
0
0
@CyberChassar
Simon Chassar
22 days
Three key takeaways: - Visibility is key; you can't secure what you can't see. - Segmentation still works. Keep OT separate! - Culture counts. Train operators to handle new threats. #TechUpgrades #Cybersecurity #UKInfrastructure
Tweet card summary image
enlit.world
Enlit World covers Europe's energy transition through news articles, podcasts, webinars and events; and is the host of the Enlit community.
0
0
0
@CyberChassar
Simon Chassar
29 days
Machines attacking machines change everything. #AgenticAI isn’t hypothetical — it’s how defenders keep up: reduce toil, enrich context, and flag what matters. In #OT, constrain autonomy: no physical actions without explainability, validation & safety fallbacks. #OTCyber
0
0
0
@CyberChassar
Simon Chassar
1 month
Almost half of UK businesses lack basic cybersecurity skills. Some #RenewableEnergy assets are still operating on outdated, vulnerable systems. It’s the truth nobody likes to talk about - delaying this just pushes back the fallout... #OTCyber
Tweet card summary image
enlit.world
As Europe’s energy systems grow more digital, protecting critical infrastructure from cyber threats is paramount. This cyber security topic hub explores the risks, strategies, and technologies...
0
0
0
@CyberChassar
Simon Chassar
1 month
0
0
0
@CyberChassar
Simon Chassar
1 month
IT and OT leaders need to align strategies now, before attackers exploit operational blind spots. Question: Which IT lessons are OT teams still missing, and how can they leapfrog the gap safely?
0
0
0
@CyberChassar
Simon Chassar
1 month
#ZeroTrust by design – embed security into every access decision → Automated patching and risk prioritisation – shrink exposure windows without disrupting operations → Integrated vulnerability management – extend oversight across systems and the supply chain
1
0
0
@CyberChassar
Simon Chassar
1 month
OT security still lags behind IT in maturity. In critical infrastructure, that gap is dangerous. A breach in OT can halt production, damage equipment, or put people at risk—not just steal data. The fastest path forward? Learn from what worked in SaaS... #OTTeams #OTSecurity
1
0
0
@CyberChassar
Simon Chassar
1 month
85% of security analysts spend most of their time just gathering evidence—not responding to threats. In OT, using #AgenticAI could mean real-time risk prioritisation & faster incident response without compromising safety. #CyberDefence #SecurityAnalysts
0
0
0
@CyberChassar
Simon Chassar
2 months
Hype creates noise, fundamentals create resilience. The #AIMarket mirrors the dot-com era, with innovation hidden in overvalued bubbles. In #Cybersecurity, #AI is sold as the answer, but governance, asset visibility & segmentation are often overlooked.
Tweet card summary image
artificialintelligence-news.com
AI investment patterns are reminiscent of the dot-com bubble - are the comparisons just?
0
3
6
@CyberChassar
Simon Chassar
2 months
• Build Skilled Teams → OT isn’t IT. Invest in cross-training for both worlds. What would you prioritise first on this list?
0
0
0
@CyberChassar
Simon Chassar
2 months
• Detect Intrusions Early → Deploy anomaly-based detection that understands OT protocols, not just IT signatures. • Manage Vulnerabilities Safely → Patching isn’t always possible. Focus on compensating controls and network segmentation.
1
0
0
@CyberChassar
Simon Chassar
2 months
• Know Your Assets → Use passive monitoring for legacy systems that can’t handle active scans. • Secure Remote Access → MFA is good. Session monitoring and jump hosts are better.
1
0
0
@CyberChassar
Simon Chassar
2 months
AI won’t fix what you haven’t built. And in OT, the gaps aren’t just technical—they’re operational. Before AI, here’s what every industrial cybersecurity strategy should get right ⬇️ #OT #AICyber #OTSecurity
1
0
1