Security Breach: Avoiding the Ostrich Approach

How one organization has dedicated its efforts to cyber solutions for manufacturing.

I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. 

The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce challenges, secure-by-design, an evolving threat landscape and the ongoing struggles with legacy OT infrastructure, I’ll challenge you to find something that the Institute couldn’t help you and your organization jumpstart, solve or streamline.

Watch/listen as we discuss:

  • The most significant vulnerabilities still impacting manufacturing.
  • Why the industrial sector struggles to find OT cybersecurity specialists, and strategies that are helping to fill this gap.
  • The growing prominence of secure-by-design and how the responsibilities for these strategies are shifting.
  • The areas where legacy OT technology are hampering cybersecurity efforts the most.
  • Why the "Ostrich Approach" can no longer be tolerated.
  • The new focal points of attackers and how these are shifting based on hacker resources.

To catch up on past episodes, you can go to Manufacturing.netIEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

More in Educational Resources - FM