Artwork

内容由Eric Sorensen提供。所有播客内容(包括剧集、图形和播客描述)均由 Eric Sorensen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

OT's Legacy Tech Challenges

28:14
 
分享
 

Manage episode 423495926 series 3352216
内容由Eric Sorensen提供。所有播客内容(包括剧集、图形和播客描述)均由 Eric Sorensen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

One of the more common obstacles that we discuss here on Security Breach is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In the midst of all this expansion, it’s easy to either overlook cybersecurity concerns, or put too much trust in the embedded security features of the new assets.
So, while this usually brings up conversations about endpoint security, integration processes and secure-by-design protocols, let’s talk about something that our guest for today’s episode knows and understands all too well … time.
Industry experts value downtime on the plant floor at about $250k/hour. So, just like predictive maintenance has become part of a facility’s new normal, predictive cybersecurity needs to receive the same priority.
Here to discuss this concept is Riley Groves, an engineer at Auvesy-MDT, a leading providing of ICS and automation solutions. Listen as we also discuss:

  • The improving convergence of IT and OT on the plant floor.
  • Getting ahead of vulnerabilities.
  • The factors driving greater buy-in from the C-suite on cybersecurity investments.
  • Why cybersecurity is the Special Teams of the industrial enterprise.
  • How legacy systems are providing "function by disfunction" from a security perspective.
  • The better ways to use AI.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

章节

1. OT's Legacy Tech Challenges (00:00:00)

2. [Ad] How Hacks Happen (00:14:21)

3. (Cont.) OT's Legacy Tech Challenges (00:15:11)

147集单集

Artwork

OT's Legacy Tech Challenges

Security Breach

0-10 subscribers

published

icon分享
 
Manage episode 423495926 series 3352216
内容由Eric Sorensen提供。所有播客内容(包括剧集、图形和播客描述)均由 Eric Sorensen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

One of the more common obstacles that we discuss here on Security Breach is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In the midst of all this expansion, it’s easy to either overlook cybersecurity concerns, or put too much trust in the embedded security features of the new assets.
So, while this usually brings up conversations about endpoint security, integration processes and secure-by-design protocols, let’s talk about something that our guest for today’s episode knows and understands all too well … time.
Industry experts value downtime on the plant floor at about $250k/hour. So, just like predictive maintenance has become part of a facility’s new normal, predictive cybersecurity needs to receive the same priority.
Here to discuss this concept is Riley Groves, an engineer at Auvesy-MDT, a leading providing of ICS and automation solutions. Listen as we also discuss:

  • The improving convergence of IT and OT on the plant floor.
  • Getting ahead of vulnerabilities.
  • The factors driving greater buy-in from the C-suite on cybersecurity investments.
  • Why cybersecurity is the Special Teams of the industrial enterprise.
  • How legacy systems are providing "function by disfunction" from a security perspective.
  • The better ways to use AI.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

章节

1. OT's Legacy Tech Challenges (00:00:00)

2. [Ad] How Hacks Happen (00:14:21)

3. (Cont.) OT's Legacy Tech Challenges (00:15:11)

147集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南

版权2025 | 隐私政策 | 服务条款 | | 版权
边探索边听这个节目
播放