Artwork

محتوای ارائه شده توسط Industrial Cybersecurity Insider. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Industrial Cybersecurity Insider یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Zero Trust : IT versus OT with Dino Busalachi and Jim Cook

27:38
 
اشتراک گذاری
 

Manage episode 415507472 series 3519015
محتوای ارائه شده توسط Industrial Cybersecurity Insider. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Industrial Cybersecurity Insider یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Enjoy this episode as Dino Busalachi, CTO and Co-Founder of Velta Technology, and Jim Cook, COO of Velta Technology, have a discussion about the complexities and challenges of using Zero Trust security frameworks within operational technology (OT) environments.

They explore the nuanced differences between IT and OT landscapes, pointing out the different challenges that arise when applying IT-centric security strategies to the distinct and varied needs of industrial settings.

From the more straightforward IT Zero Trust framework to the complexities of trying to apply that approach and managing system vulnerabilities on the OT side, the conversation offers a rich combination of technical insight and real-world applications.

If you’re involved in the intersecting worlds of IT and industrial operations, this episode is sure to provide valuable lessons on securing technological infrastructures against modern threats while considering the operational realities of the plant floor.

Chapters:

  • 00:00:00 - Kickoff: The High Stakes of Zero Trust in OT
  • 00:03:09 - Tracing the Roots: How Zero Trust Evolves with Network Security
  • 00:04:17 - The Rise of AI and Its Influence on Security
  • 00:06:50 - Operational Challenges with Applying New IT Frameworks
  • 00:08:12 - Zero Trust's Fit with Industrial Protocols
  • 00:10:28 - The OT Challenge: Applying the Bucket Strategy for Zero Trust
  • 00:12:03 - Addressing Network Segmentation in OT
  • 00:14:00 - Challenges with VPNs and Remote Access in Zero Trust
  • 00:16:45 - Potential Misalignments in Applying IT Security to OT
  • 00:17:46 - Identity Crisis: Managing Access Within Zero Trust Frameworks
  • 00:19:12 - Implications of Shared Passwords and User Access
  • 00:23:04 - Strategic Collaboration Between IT and OT for Enhanced Security
  • 00:26:32 - Wrap-Up: Collaborative Paths to Effective Zero Trust in OT

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!

  continue reading

95 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 415507472 series 3519015
محتوای ارائه شده توسط Industrial Cybersecurity Insider. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Industrial Cybersecurity Insider یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Enjoy this episode as Dino Busalachi, CTO and Co-Founder of Velta Technology, and Jim Cook, COO of Velta Technology, have a discussion about the complexities and challenges of using Zero Trust security frameworks within operational technology (OT) environments.

They explore the nuanced differences between IT and OT landscapes, pointing out the different challenges that arise when applying IT-centric security strategies to the distinct and varied needs of industrial settings.

From the more straightforward IT Zero Trust framework to the complexities of trying to apply that approach and managing system vulnerabilities on the OT side, the conversation offers a rich combination of technical insight and real-world applications.

If you’re involved in the intersecting worlds of IT and industrial operations, this episode is sure to provide valuable lessons on securing technological infrastructures against modern threats while considering the operational realities of the plant floor.

Chapters:

  • 00:00:00 - Kickoff: The High Stakes of Zero Trust in OT
  • 00:03:09 - Tracing the Roots: How Zero Trust Evolves with Network Security
  • 00:04:17 - The Rise of AI and Its Influence on Security
  • 00:06:50 - Operational Challenges with Applying New IT Frameworks
  • 00:08:12 - Zero Trust's Fit with Industrial Protocols
  • 00:10:28 - The OT Challenge: Applying the Bucket Strategy for Zero Trust
  • 00:12:03 - Addressing Network Segmentation in OT
  • 00:14:00 - Challenges with VPNs and Remote Access in Zero Trust
  • 00:16:45 - Potential Misalignments in Applying IT Security to OT
  • 00:17:46 - Identity Crisis: Managing Access Within Zero Trust Frameworks
  • 00:19:12 - Implications of Shared Passwords and User Access
  • 00:23:04 - Strategic Collaboration Between IT and OT for Enhanced Security
  • 00:26:32 - Wrap-Up: Collaborative Paths to Effective Zero Trust in OT

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!

  continue reading

95 قسمت

Όλα τα επεισόδια

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش