Artwork

内容由Velta Technology提供。所有播客内容(包括剧集、图形和播客描述)均由 Velta Technology 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Zero Trust in OT: Adapting IT's Playbook for Enhanced Security

33:49
 
分享
 

Manage episode 403653723 series 3519015
内容由Velta Technology提供。所有播客内容(包括剧集、图形和播客描述)均由 Velta Technology 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Dino Busalachi and Jim Cook, the CTO and COO of VELTA Technology respectively, discuss the intersection between IT (Information Technology) and OT (Operational Technology) in the cybersecurity landscape. They emphasize that, while IT security measures have their value, they cannot be applied as-is to the OT environment due to significant variations in system operations, scale, and impact in case of breaches.

They stress the importance of holistic consideration of operations when devising cybersecurity measures for OT. They cover topics like zero trust environments, asset inventory, key points from IT’s playbook that may be suited, and ones that would prove challenging in OT – security lessons that need to be adapted rather than employed directly.

They bring in the element of digital safety being just as important as physical safety in an OT environment considering the potential physical outcomes as a result of breaches. The conversation reveals a need for IT professionals to work in collaboration with their OT counterparts for more effective and robust cybersecurity systems, even as the two roles begin to diverge more explicitly in terms of responsibilities and strategies.

Chapters:

  • 00:00:00 - Merging Worlds: The Crucial IT-OT Convergence
  • 00:02:10 - Zero Trust in OT: Navigating the Transition
  • 00:10:04 - Asset Management: The Keystone of OT Security
  • 00:12:50 - The Power of Eyes-On: Continuous Monitoring in OT
  • 00:14:49 - IT's Supporting Role in Fortifying OT
  • 00:18:08 - Shifting Gears: OT's Rising Responsibility
  • 00:20:17 - Building Bridges: Engaging OT in the Cyber Dialogue
  • 00:21:51 - Remote Access Risks: Navigating OT's Vulnerabilities
  • 00:24:31 - Counting the Cost: The Impact of Neglecting OT Security
  • 00:25:21 - Designing with Defense: Security-First Approaches in OT
  • 00:27:44 - Digital Guardianship: Ensuring Safety in the OT Realm
  • 00:30:25 - United Front: The Collaborative Role of IT and OT in Security
  • 00:32:42 - Closing Thoughts: Envisioning the Future of OT Cybersecurity

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!

  continue reading

31集单集

Artwork
icon分享
 
Manage episode 403653723 series 3519015
内容由Velta Technology提供。所有播客内容(包括剧集、图形和播客描述)均由 Velta Technology 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Dino Busalachi and Jim Cook, the CTO and COO of VELTA Technology respectively, discuss the intersection between IT (Information Technology) and OT (Operational Technology) in the cybersecurity landscape. They emphasize that, while IT security measures have their value, they cannot be applied as-is to the OT environment due to significant variations in system operations, scale, and impact in case of breaches.

They stress the importance of holistic consideration of operations when devising cybersecurity measures for OT. They cover topics like zero trust environments, asset inventory, key points from IT’s playbook that may be suited, and ones that would prove challenging in OT – security lessons that need to be adapted rather than employed directly.

They bring in the element of digital safety being just as important as physical safety in an OT environment considering the potential physical outcomes as a result of breaches. The conversation reveals a need for IT professionals to work in collaboration with their OT counterparts for more effective and robust cybersecurity systems, even as the two roles begin to diverge more explicitly in terms of responsibilities and strategies.

Chapters:

  • 00:00:00 - Merging Worlds: The Crucial IT-OT Convergence
  • 00:02:10 - Zero Trust in OT: Navigating the Transition
  • 00:10:04 - Asset Management: The Keystone of OT Security
  • 00:12:50 - The Power of Eyes-On: Continuous Monitoring in OT
  • 00:14:49 - IT's Supporting Role in Fortifying OT
  • 00:18:08 - Shifting Gears: OT's Rising Responsibility
  • 00:20:17 - Building Bridges: Engaging OT in the Cyber Dialogue
  • 00:21:51 - Remote Access Risks: Navigating OT's Vulnerabilities
  • 00:24:31 - Counting the Cost: The Impact of Neglecting OT Security
  • 00:25:21 - Designing with Defense: Security-First Approaches in OT
  • 00:27:44 - Digital Guardianship: Ensuring Safety in the OT Realm
  • 00:30:25 - United Front: The Collaborative Role of IT and OT in Security
  • 00:32:42 - Closing Thoughts: Envisioning the Future of OT Cybersecurity

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!

  continue reading

31集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南