Artwork

Contenido proporcionado por The Oakmont Group and John Gilroy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente The Oakmont Group and John Gilroy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

Ep. 178 Protecting Critical Infrastructure

59:04
 
Compartir
 

Manage episode 453703351 series 3610832
Contenido proporcionado por The Oakmont Group and John Gilroy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente The Oakmont Group and John Gilroy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

While everybody is focusing on Artificial Intelligence, malicious actors are going after the soft underbelly of modern technology: operational technology, or OT. Today, we take a look at the increasing threat of cyber-attacks on operational technology (OT) systems, which are often not built with security in mind.

Operational Technology is represented by control systems, logic controllers, and other end points found in critical infrastructure like water and systems that generate energy, like oil, natural gas and even nuclear. Today’s experts share ideas on how to mitigate risk through.

Collaboration: Throughout the federal government communities are being formed that seek to share information on OT threats. For example, CISA has a Joint Cyber Defense Collaborative that serves as a clearing house for communication between industry and the federal government.

Continuous monitoring: Marty Edwards works on several federal committees to try to establish data formats that would allow for interoperability to monitor attacks and update existing operational technology.

Proactive measures: Jonathan Feibus from the NRC shares that 90% of the systems he monitors are focused on Information Technology. Vendors seeking solutions to this problem should look at extending methodologies built for IT into the realm of OT.

The discussion ended with a discussion of the integration of IT and OT security, the role of AI in enhancing security, and the need for comprehensive asset inventories and risk assessments.

  continue reading

210 episodios

Artwork
iconCompartir
 
Manage episode 453703351 series 3610832
Contenido proporcionado por The Oakmont Group and John Gilroy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente The Oakmont Group and John Gilroy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

While everybody is focusing on Artificial Intelligence, malicious actors are going after the soft underbelly of modern technology: operational technology, or OT. Today, we take a look at the increasing threat of cyber-attacks on operational technology (OT) systems, which are often not built with security in mind.

Operational Technology is represented by control systems, logic controllers, and other end points found in critical infrastructure like water and systems that generate energy, like oil, natural gas and even nuclear. Today’s experts share ideas on how to mitigate risk through.

Collaboration: Throughout the federal government communities are being formed that seek to share information on OT threats. For example, CISA has a Joint Cyber Defense Collaborative that serves as a clearing house for communication between industry and the federal government.

Continuous monitoring: Marty Edwards works on several federal committees to try to establish data formats that would allow for interoperability to monitor attacks and update existing operational technology.

Proactive measures: Jonathan Feibus from the NRC shares that 90% of the systems he monitors are focused on Information Technology. Vendors seeking solutions to this problem should look at extending methodologies built for IT into the realm of OT.

The discussion ended with a discussion of the integration of IT and OT security, the role of AI in enhancing security, and the need for comprehensive asset inventories and risk assessments.

  continue reading

210 episodios

All episodes

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir