Artwork

Nội dung được cung cấp bởi Eric Sorensen. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Eric Sorensen hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Player FM - Ứng dụng Podcast
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !

Never Let a Good Hack Go to Waste

34:23
 
Chia sẻ
 

Manage episode 443292552 series 3352216
Nội dung được cung cấp bởi Eric Sorensen. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Eric Sorensen hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.

One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response.

Of course, this is never simple due to the increasing amount of IIoT technology and the connection demands they place on industrial systems. It’s a situation that promises to only get more complex, with Fortinet reporting that in 2023, only five percent of surveyed organizations have 100 percent visibility into their own OT activities – a number that is down from 13 percent in 2022.

To provide some insight on managing this growing number of machines, connections, access points and other vulnerable areas of the ICS, we connected with Kevin Bocek, the Chief Innovation Officer at Venafi, a leading provider of asset identity management. Watch/listen as he discusses:

  • Why cyber incidents are a learning opportunity for everyone.
  • The benefits of showing the C-suite all those plant floor connections when working to get proper cybersecurity funding.
  • The rise in attacks that will be emanating from legacy software and coding.
  • Why software assets should be managed and secured in the same manner as machines or devices.
  • How manufacturing can bring Continuous Improvement strategies to OT security.
  • Stuxnet's long-term impact.
  • How quantum computing will dramatically alter authentication approaches and secure-by-design practices within the next five years.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Everyday AI: Your daily guide to grown with Generative AI
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Chương

1. Never Let a Good Hack Go to Waste (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:10:08)

3. (Cont.) Never Let a Good Hack Go to Waste (00:10:56)

121 tập

Artwork
iconChia sẻ
 
Manage episode 443292552 series 3352216
Nội dung được cung cấp bởi Eric Sorensen. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Eric Sorensen hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.

One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response.

Of course, this is never simple due to the increasing amount of IIoT technology and the connection demands they place on industrial systems. It’s a situation that promises to only get more complex, with Fortinet reporting that in 2023, only five percent of surveyed organizations have 100 percent visibility into their own OT activities – a number that is down from 13 percent in 2022.

To provide some insight on managing this growing number of machines, connections, access points and other vulnerable areas of the ICS, we connected with Kevin Bocek, the Chief Innovation Officer at Venafi, a leading provider of asset identity management. Watch/listen as he discusses:

  • Why cyber incidents are a learning opportunity for everyone.
  • The benefits of showing the C-suite all those plant floor connections when working to get proper cybersecurity funding.
  • The rise in attacks that will be emanating from legacy software and coding.
  • Why software assets should be managed and secured in the same manner as machines or devices.
  • How manufacturing can bring Continuous Improvement strategies to OT security.
  • Stuxnet's long-term impact.
  • How quantum computing will dramatically alter authentication approaches and secure-by-design practices within the next five years.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Everyday AI: Your daily guide to grown with Generative AI
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Chương

1. Never Let a Good Hack Go to Waste (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:10:08)

3. (Cont.) Never Let a Good Hack Go to Waste (00:10:56)

121 tập

Tất cả các tập

×
 
Loading …

Chào mừng bạn đến với Player FM!

Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.

 

Hướng dẫn sử dụng nhanh