Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Never Let a Good Hack Go to Waste
Manage episode 443292552 series 3352216
One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response.
Of course, this is never simple due to the increasing amount of IIoT technology and the connection demands they place on industrial systems. It’s a situation that promises to only get more complex, with Fortinet reporting that in 2023, only five percent of surveyed organizations have 100 percent visibility into their own OT activities – a number that is down from 13 percent in 2022.
To provide some insight on managing this growing number of machines, connections, access points and other vulnerable areas of the ICS, we connected with Kevin Bocek, the Chief Innovation Officer at Venafi, a leading provider of asset identity management. Watch/listen as he discusses:
- Why cyber incidents are a learning opportunity for everyone.
- The benefits of showing the C-suite all those plant floor connections when working to get proper cybersecurity funding.
- The rise in attacks that will be emanating from legacy software and coding.
- Why software assets should be managed and secured in the same manner as machines or devices.
- How manufacturing can bring Continuous Improvement strategies to OT security.
- Stuxnet's long-term impact.
- How quantum computing will dramatically alter authentication approaches and secure-by-design practices within the next five years.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
Chương
1. Never Let a Good Hack Go to Waste (00:00:00)
2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:10:08)
3. (Cont.) Never Let a Good Hack Go to Waste (00:10:56)
121 tập
Manage episode 443292552 series 3352216
One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response.
Of course, this is never simple due to the increasing amount of IIoT technology and the connection demands they place on industrial systems. It’s a situation that promises to only get more complex, with Fortinet reporting that in 2023, only five percent of surveyed organizations have 100 percent visibility into their own OT activities – a number that is down from 13 percent in 2022.
To provide some insight on managing this growing number of machines, connections, access points and other vulnerable areas of the ICS, we connected with Kevin Bocek, the Chief Innovation Officer at Venafi, a leading provider of asset identity management. Watch/listen as he discusses:
- Why cyber incidents are a learning opportunity for everyone.
- The benefits of showing the C-suite all those plant floor connections when working to get proper cybersecurity funding.
- The rise in attacks that will be emanating from legacy software and coding.
- Why software assets should be managed and secured in the same manner as machines or devices.
- How manufacturing can bring Continuous Improvement strategies to OT security.
- Stuxnet's long-term impact.
- How quantum computing will dramatically alter authentication approaches and secure-by-design practices within the next five years.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
Chương
1. Never Let a Good Hack Go to Waste (00:00:00)
2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:10:08)
3. (Cont.) Never Let a Good Hack Go to Waste (00:10:56)
121 tập
Tất cả các tập
×Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.