Artwork

محتوای ارائه شده توسط elliTek, Inc.. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط elliTek, Inc. یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Industrial Automation - It Doesn't Have To... Be Like Colonial Pipeline

55:52
 
اشتراک گذاری
 

Manage episode 424657136 series 2793262
محتوای ارائه شده توسط elliTek, Inc.. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط elliTek, Inc. یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Send us a text

What happened with Colonial Pipeline and could it have been prevented?
This episode isn't a dig at Colonial Pipeline. It's a cautionary tale for businesses, and their cybersecurity preparedness efforts.
The reason Colonial shut down their pipeline was they were uncertain.
They were unsure what systems were going to be affected over and above the accounting systems. They lacked confidence in the separation of their Business/IT Networks and their Operational Technology (OT) Networks.
Listen to hear a simple solution!
We discuss the philosophical conflict between IT and OT and the marriage between the two. Both play important roles. We applaud each.
This episode is dedicated to the hard working IT professionals who we only think about when something isn't working properly.
Learn how a Supervisory Control and Data Acquisition (SCADA) system works. Yes, there are problems with OPC. We overcome those problems with Native Drivers.
People use elliTek's IIoTA™ MES platform for many reasons. For brevity sake, we talk about just two of the reasons in this episode.

  1. Native Drivers
  2. Separation of the Networks

Discover how a SCADA system and an IIoTA™ MES platform can work together.
Learn the differences between an appliance and a Windows PC and why that is important. Why is Windows the problem?
Stay tuned to hear some basic things that businesses can do to protect themselves and their customers data.
We quote Kiersten E. Todt, managing director of the nonprofit Cyber Readiness Institute. Her insights are spot-on! Here's the link to her quotes in the New York Times article. The Cyber Readiness Institute offers free, online programs to help SMBs protect themselves from cyber risks.
Cybersecurity doesn't have to be complicated! Reach out for a FREE online demo, FreeDemo@elliTek.com.
Let's get to know each other! Connect with elliTek on your social platforms.

  continue reading

فصل ها

1. Welcome! Today's Topic is Cybersecurity (00:00:00)

2. Meet Shawn Lyness, new Sales Engineer (00:01:16)

3. Industrial Automation - It Doesn't Have To... Be Like Colonial Pipeline (00:06:07)

4. What Happened with Colonial Pipeline (00:10:47)

5. Philosophical Differences Between OT and IT (00:15:45)

6. How SCADA Systems Work (00:21:44)

7. How Businesses Can Protect Themselves & Their Customers' Data (00:27:39)

8. The Cyber Readiness Institute & New York Times article (00:39:00)

9. Unidirectional Gateways? What about Bidirectional Gateways? (00:45:53)

50 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 424657136 series 2793262
محتوای ارائه شده توسط elliTek, Inc.. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط elliTek, Inc. یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Send us a text

What happened with Colonial Pipeline and could it have been prevented?
This episode isn't a dig at Colonial Pipeline. It's a cautionary tale for businesses, and their cybersecurity preparedness efforts.
The reason Colonial shut down their pipeline was they were uncertain.
They were unsure what systems were going to be affected over and above the accounting systems. They lacked confidence in the separation of their Business/IT Networks and their Operational Technology (OT) Networks.
Listen to hear a simple solution!
We discuss the philosophical conflict between IT and OT and the marriage between the two. Both play important roles. We applaud each.
This episode is dedicated to the hard working IT professionals who we only think about when something isn't working properly.
Learn how a Supervisory Control and Data Acquisition (SCADA) system works. Yes, there are problems with OPC. We overcome those problems with Native Drivers.
People use elliTek's IIoTA™ MES platform for many reasons. For brevity sake, we talk about just two of the reasons in this episode.

  1. Native Drivers
  2. Separation of the Networks

Discover how a SCADA system and an IIoTA™ MES platform can work together.
Learn the differences between an appliance and a Windows PC and why that is important. Why is Windows the problem?
Stay tuned to hear some basic things that businesses can do to protect themselves and their customers data.
We quote Kiersten E. Todt, managing director of the nonprofit Cyber Readiness Institute. Her insights are spot-on! Here's the link to her quotes in the New York Times article. The Cyber Readiness Institute offers free, online programs to help SMBs protect themselves from cyber risks.
Cybersecurity doesn't have to be complicated! Reach out for a FREE online demo, FreeDemo@elliTek.com.
Let's get to know each other! Connect with elliTek on your social platforms.

  continue reading

فصل ها

1. Welcome! Today's Topic is Cybersecurity (00:00:00)

2. Meet Shawn Lyness, new Sales Engineer (00:01:16)

3. Industrial Automation - It Doesn't Have To... Be Like Colonial Pipeline (00:06:07)

4. What Happened with Colonial Pipeline (00:10:47)

5. Philosophical Differences Between OT and IT (00:15:45)

6. How SCADA Systems Work (00:21:44)

7. How Businesses Can Protect Themselves & Their Customers' Data (00:27:39)

8. The Cyber Readiness Institute & New York Times article (00:39:00)

9. Unidirectional Gateways? What about Bidirectional Gateways? (00:45:53)

50 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش