Artwork

Contenuto fornito da Eric Sorensen. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Eric Sorensen o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

Tearing Down the 'Set It and Forget It' Mindset

43:23
 
Condividi
 

Manage episode 435633477 series 3352216
Contenuto fornito da Eric Sorensen. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Eric Sorensen o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II.

Similarly, we can look at a number of recent, major cybersecurity events that have their origins in attacks on critical infrastructure. Whether you want to go all the way back to Stuxnet, or more recent developments like Colonial Pipeline, hackers realized that the control systems utilized in these environments mirror those used by manufacturers like Boeing, Clorox, Johnson Controls and many others who have been recent victims of high-profile hacks.

Joining me to discuss these dynamics is Bill Moore, the founder and CEO of XONA Systems, a leading provider of secure access solutions. Watch/listen as he dives into:

  • The challenges of updating and securing the legacy tech found throughout manufacturing and critical infrastructure.
  • Getting past the 'set it and forget it' mindset of industrial cybersecurity.
  • Strategies for implementing updates and patches without slowing operations or opening new doors to hackers.
  • Ways to improve funding processes to ensure security needs are met and keep pace with an evolving threat landscape.
  • How the more distributed dynamic of OT technology needs to be understood in developing new strategies and implementing new tools.
  • Lessons learned from Colonial Pipeline.
  • Ways to optimize regulatory efforts.
  • Why every industrial organization needs a dedicated Director of OT Security.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Everyday AI: Your daily guide to grown with Generative AI
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Capitoli

1. Tearing Down the 'Set It and Forget It' Mindset (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:15:56)

3. (Cont.) Tearing Down the 'Set It and Forget It' Mindset (00:16:44)

121 episodi

Artwork
iconCondividi
 
Manage episode 435633477 series 3352216
Contenuto fornito da Eric Sorensen. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Eric Sorensen o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II.

Similarly, we can look at a number of recent, major cybersecurity events that have their origins in attacks on critical infrastructure. Whether you want to go all the way back to Stuxnet, or more recent developments like Colonial Pipeline, hackers realized that the control systems utilized in these environments mirror those used by manufacturers like Boeing, Clorox, Johnson Controls and many others who have been recent victims of high-profile hacks.

Joining me to discuss these dynamics is Bill Moore, the founder and CEO of XONA Systems, a leading provider of secure access solutions. Watch/listen as he dives into:

  • The challenges of updating and securing the legacy tech found throughout manufacturing and critical infrastructure.
  • Getting past the 'set it and forget it' mindset of industrial cybersecurity.
  • Strategies for implementing updates and patches without slowing operations or opening new doors to hackers.
  • Ways to improve funding processes to ensure security needs are met and keep pace with an evolving threat landscape.
  • How the more distributed dynamic of OT technology needs to be understood in developing new strategies and implementing new tools.
  • Lessons learned from Colonial Pipeline.
  • Ways to optimize regulatory efforts.
  • Why every industrial organization needs a dedicated Director of OT Security.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Everyday AI: Your daily guide to grown with Generative AI
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Capitoli

1. Tearing Down the 'Set It and Forget It' Mindset (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:15:56)

3. (Cont.) Tearing Down the 'Set It and Forget It' Mindset (00:16:44)

121 episodi

Tutti gli episodi

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida