Artwork

Sisällön tarjoaa Velta Technology. Velta Technology tai sen podcast-alustan kumppani lataa ja toimittaa kaiken podcast-sisällön, mukaan lukien jaksot, grafiikat ja podcast-kuvaukset. Jos uskot jonkun käyttävän tekijänoikeudella suojattua teostasi ilman lupaasi, voit seurata tässä https://fi.player.fm/legal kuvattua prosessia.
Player FM - Podcast-sovellus
Siirry offline-tilaan Player FM avulla!

Zero Trust : IT versus OT with Dino Busalachi and Jim Cook

27:38
 
Jaa
 

Manage episode 415507472 series 3519015
Sisällön tarjoaa Velta Technology. Velta Technology tai sen podcast-alustan kumppani lataa ja toimittaa kaiken podcast-sisällön, mukaan lukien jaksot, grafiikat ja podcast-kuvaukset. Jos uskot jonkun käyttävän tekijänoikeudella suojattua teostasi ilman lupaasi, voit seurata tässä https://fi.player.fm/legal kuvattua prosessia.

Enjoy this episode as Dino Busalachi, CTO and Co-Founder of Velta Technology, and Jim Cook, COO of Velta Technology, have a discussion about the complexities and challenges of using Zero Trust security frameworks within operational technology (OT) environments.

They explore the nuanced differences between IT and OT landscapes, pointing out the different challenges that arise when applying IT-centric security strategies to the distinct and varied needs of industrial settings.

From the more straightforward IT Zero Trust framework to the complexities of trying to apply that approach and managing system vulnerabilities on the OT side, the conversation offers a rich combination of technical insight and real-world applications.

If you’re involved in the intersecting worlds of IT and industrial operations, this episode is sure to provide valuable lessons on securing technological infrastructures against modern threats while considering the operational realities of the plant floor.

Chapters:

  • 00:00:00 - Kickoff: The High Stakes of Zero Trust in OT
  • 00:03:09 - Tracing the Roots: How Zero Trust Evolves with Network Security
  • 00:04:17 - The Rise of AI and Its Influence on Security
  • 00:06:50 - Operational Challenges with Applying New IT Frameworks
  • 00:08:12 - Zero Trust's Fit with Industrial Protocols
  • 00:10:28 - The OT Challenge: Applying the Bucket Strategy for Zero Trust
  • 00:12:03 - Addressing Network Segmentation in OT
  • 00:14:00 - Challenges with VPNs and Remote Access in Zero Trust
  • 00:16:45 - Potential Misalignments in Applying IT Security to OT
  • 00:17:46 - Identity Crisis: Managing Access Within Zero Trust Frameworks
  • 00:19:12 - Implications of Shared Passwords and User Access
  • 00:23:04 - Strategic Collaboration Between IT and OT for Enhanced Security
  • 00:26:32 - Wrap-Up: Collaborative Paths to Effective Zero Trust in OT

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!

  continue reading

29 jaksoa

Artwork
iconJaa
 
Manage episode 415507472 series 3519015
Sisällön tarjoaa Velta Technology. Velta Technology tai sen podcast-alustan kumppani lataa ja toimittaa kaiken podcast-sisällön, mukaan lukien jaksot, grafiikat ja podcast-kuvaukset. Jos uskot jonkun käyttävän tekijänoikeudella suojattua teostasi ilman lupaasi, voit seurata tässä https://fi.player.fm/legal kuvattua prosessia.

Enjoy this episode as Dino Busalachi, CTO and Co-Founder of Velta Technology, and Jim Cook, COO of Velta Technology, have a discussion about the complexities and challenges of using Zero Trust security frameworks within operational technology (OT) environments.

They explore the nuanced differences between IT and OT landscapes, pointing out the different challenges that arise when applying IT-centric security strategies to the distinct and varied needs of industrial settings.

From the more straightforward IT Zero Trust framework to the complexities of trying to apply that approach and managing system vulnerabilities on the OT side, the conversation offers a rich combination of technical insight and real-world applications.

If you’re involved in the intersecting worlds of IT and industrial operations, this episode is sure to provide valuable lessons on securing technological infrastructures against modern threats while considering the operational realities of the plant floor.

Chapters:

  • 00:00:00 - Kickoff: The High Stakes of Zero Trust in OT
  • 00:03:09 - Tracing the Roots: How Zero Trust Evolves with Network Security
  • 00:04:17 - The Rise of AI and Its Influence on Security
  • 00:06:50 - Operational Challenges with Applying New IT Frameworks
  • 00:08:12 - Zero Trust's Fit with Industrial Protocols
  • 00:10:28 - The OT Challenge: Applying the Bucket Strategy for Zero Trust
  • 00:12:03 - Addressing Network Segmentation in OT
  • 00:14:00 - Challenges with VPNs and Remote Access in Zero Trust
  • 00:16:45 - Potential Misalignments in Applying IT Security to OT
  • 00:17:46 - Identity Crisis: Managing Access Within Zero Trust Frameworks
  • 00:19:12 - Implications of Shared Passwords and User Access
  • 00:23:04 - Strategic Collaboration Between IT and OT for Enhanced Security
  • 00:26:32 - Wrap-Up: Collaborative Paths to Effective Zero Trust in OT

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!

  continue reading

29 jaksoa

Kaikki jaksot

×
 
Loading …

Tervetuloa Player FM:n!

Player FM skannaa verkkoa löytääkseen korkealaatuisia podcasteja, joista voit nauttia juuri nyt. Se on paras podcast-sovellus ja toimii Androidilla, iPhonela, ja verkossa. Rekisteröidy sykronoidaksesi tilaukset laitteiden välillä.

 

Pikakäyttöopas