Security Breach: The Wild & Weird of Industrial Cybersecurity

The human, technology and architecture challenges creating OT's unique security environment.

When talking to the experts and leading authorities that have participated in the 140+ episodes of Security Breach, there’s always a slight pause when directing their attention specifically to the industrial sector. That’s because, well, we’re special. 

There’s the unique juxtaposition of old and bleeding edge technology. 

There’s the influx of greater connectivity combatting the struggles to identify and secure the growing number of endpoints. 

And there are the ongoing battles related to secure-by-design responsibilities, cloud networks and the ever popular building and breaking down of IT/OT silos. 

The good news is that we’re getting better. Better at identifying the problems and better at elevating solutions from some of the sharpest minds in the sector. And we’re fortunate to be able share these insights from an incredible collective on today’s episode.

Watch/listen as Max Clausen, senior VP of Network Connectivity at Zayo, John Carse, Field CISO at SquareX, Sophos’ Chester Wisniewski and ExtraHop’s Chad Lemaire tackle topics that include:

  • Visibility
  • Secure-by-Design
  • Artificial Intelligence
  • IT/OT Silos
  • Patching
  • LOTL and Phishing Attacks
  • Non-standard OT Architecture

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or  MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

More in Educational Resources - FM