Human Insight Is Key to Securing Cyber-Physical Systems

[Endpoint Security](https://www.govinfosecurity.com/endpoint-security-c-506) , [Events](https://www.govinfosecurity.com/events-c-363) , [Governance -& Risk Management](https://www.govinfosecurity.com/governance-risk-management-c-93)Human Insight Is Key to Securing Cyber-Physical Systems=======================================================Politecnico di Milano’s Zanero on Evolving Malware Detection and Hardware Security [Aseem Jakhar](https://www.govinfosecurity.com/authors/aseem-jakhar-i-4012) • May 4, 2025 [](https://www.bankinfosecurity.com/human-insight-key-in-cybersecurity-ml-cant-replace-it-a-28262#disqus_thread) * * * * * [Credit Eligible](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* [](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* Get Permission* ![Human Insight Is Key to Securing Cyber-Physical Systems](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/human-insight-key-in-cybersecurity-ml-cant-replace-it-showcase_image-8-a-28262.jpg)Stefano Zanero, professor, Politecnico di MilanoMachine learning excels at identifying repetitive patterns and anomalies, but human insight remains vital for understanding the broader context of cyberattacks – especially in cyber-physical ecosystems, said Stefano Zanero, professor at Politecnico di Milano.**See Also:** [How Generative AI Enables Solo Cybercriminals](https://www.govinfosecurity.com/how-generative-ai-enables-solo-cybercriminals-a-28189?rf=RAM_SeeAlso)Cyber-physical systems in industrial environments typically have blind spots that security professionals could miss without having a deep understanding of mechanical and physical systems.’Security professionals must apply hardware security techniques, such as using trusted execution environments, to protect cyber-physical systems and safeguard controllers from being compromised,’ he said.In this video interview with Information Security Media Group at [RSAC Conference 2025](/rsac-conference#p-1), Zanero also discussed:* Integration of static and dynamic analysis with machine learning;* The ongoing arms race in cybersecurity in which attackers study weaknesses in detection systems, leading to a battle between defense and offense;* Why the integration of hardware security into cyber-physical systems is emerging as a key focus area.Zanero, an associate professor with the Dipartimento di Elettronica, Informazione e Bioingegneria, focuses his research on malware analysis, cyber-physical security and cybersecurity in general. In addition to teaching computer security and computer forensics at Politecnico, he has co-authored over 90 scientific papers and books. ![Aseem Jakhar](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/aseem-jakhar-largeImage-5-a-4012.jpg) #### [Aseem Jakhar](https://www.govinfosecurity.com/authors/aseem-jakhar-i-4012)*Co-Founder, EXPLIoT*
Jakhar is the co-founder of EXPLIoT. He founded null – an open security community platform in Asia. He also organizes Nullcon and hardwear.io security conferences.

![Security Workflow Automation Cuts Complexity](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/security-workflow-automation-cuts-complexity-showcase_image-8-a-28186.jpg) ##### [Security Workflow Automation Cuts Complexity](https://www.govinfosecurity.com/security-workflow-automation-cuts-complexity-a-28186?rf=RAM_Resources)![Practical Approaches to Unleashing Autonomous AI Defenders](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/practical-approaches-to-unleashing-autonomous-ai-defenders-showcase_image-3-a-28150.jpg) ##### [Practical Approaches to Unleashing Autonomous AI Defenders](https://www.govinfosecurity.com/practical-approaches-to-unleashing-autonomous-ai-defenders-a-28150?rf=RAM_Resources)![Why Cyberattackers Love ‘Living Off the Land’](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cyberattackers-love-living-off-land-showcase_image-10-a-28154.jpg) ##### [Why Cyberattackers Love ‘Living Off the Land’](https://www.govinfosecurity.com/cyberattackers-love-living-off-land-a-28154?rf=RAM_Resources)![Is Your Data Security Program Ready for the AI Explosion?](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/your-data-security-program-ready-for-ai-explosion-showcase_image-10-a-28131.jpg) ##### [Is Your Data Security Program Ready for the AI Explosion?](https://www.govinfosecurity.com/your-data-security-program-ready-for-ai-explosion-a-28131?rf=RAM_Resources)![AI, Zero Trust and SASE: Modernizing Security](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ai-sase-zero-trust-modernizing-security-showcase_image-9-a-28151.jpg) ##### [AI, Zero Trust and SASE: Modernizing Security](https://www.govinfosecurity.com/ai-zero-trust-sase-modernizing-security-a-28151?rf=RAM_Resources)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/harry-coker-urges-unified-public-private-cyber-defense-showcase_image-1-a-28261.jpg) [Events](https://www.govinfosecurity.com/events-c-363)##### [Harry Coker Urges Unified Public-Private Cyber Defense](https://www.govinfosecurity.com/harry-coker-urges-unified-public-private-cyber-defense-a-28261)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/human-insight-key-in-cybersecurity-ml-cant-replace-it-showcase_image-8-a-28262.jpg) [Endpoint Security](https://www.govinfosecurity.com/endpoint-security-c-506)##### [Human Insight Is Key to Securing Cyber-Physical Systems](https://www.govinfosecurity.com/human-insight-key-to-securing-cyber-physical-systems-a-28262)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ismg-editors-rsac-conference-2025-wrap-up-showcase_image-7-a-28255.jpg) [Events](https://www.govinfosecurity.com/events-c-363)##### [ISMG Editors: RSAC Conference 2025 Wrap-Up](https://www.govinfosecurity.com/ismg-editors-rsac-conference-2025-wrap-up-a-28255)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ai-narrows-cyber-gap-between-attackers-defenders-showcase_image-9-a-28254.jpg) [Artificial Intelligence -& Machine Learning](https://www.govinfosecurity.com/artificial-intelligence-machine-learning-c-469)##### [AI Narrows the Cyber Gap Between Attackers and Defenders](https://www.govinfosecurity.com/ai-narrows-cyber-gap-between-attackers-defenders-a-28254)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/nation-state-hackers-embed-stealthily-in-us-infrastructure-showcase_image-2-a-28247.jpg) [Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525)##### [Nation-State Hackers Embed Stealthily in US infrastructure](https://www.govinfosecurity.com/nation-state-hackers-embed-stealthily-in-us-infrastructure-a-28247)[Overview](https://www.govinfosecurity.com/webinars/risk-management-framework-learn-from-nist-w-255) * Twitter* Facebook* LinkedIn* * * From heightened risks to increased regulations, senior leaders at all levels are pressured to improve their organizations’ risk management capabilities. But no one is showing them how – until now.Learn the fundamentals of developing a risk management program from the man who wrote the book on the topic: Ron Ross, computer scientist for the National Institute of Standards and Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37 – the bible of risk assessment and management – will share his unique insights on how to:* Understand the current cyber threats to all public and private sector organizations;* Develop a multi-tiered risk management approach built upon governance, processes and information systems;* Implement NIST’s risk management framework, from defining risks to selecting, implementing and monitoring information security controls.Presented By————![Ron Ross](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg) [Presented By](/authors/ron-ross-i-558)—————————————#### [Ron Ross](/authors/ron-ross-i-558)*Sr. Computer Scientist -& Information Security Researcher, National Institute of Standards and Technology (NIST)*

Related Tags:
NAICS: 61 – Educational Services

NAICS: 71 – Arts

Entertainment

Recreation

NAICS: 611 – Educational Services

NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 519 – Web Search Portals

Libraries

Archives

Other Information Services

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 711 – Performing Arts

Spectator Sports

Related Industries

Associated Indicators:
null