Artwork

Treść dostarczona przez Eric Sorensen. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Eric Sorensen lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

Missteps Creating 'An Internal Collection of Hackers'

39:40
 
Udostępnij
 

Manage episode 403929881 series 3352216
Treść dostarczona przez Eric Sorensen. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Eric Sorensen lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

Creating an OT vision, and why hackers are "like water."
With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of the enterprise, detection and response strategies can be universally dissected in addressing ransomware, phishing or any number of social engineering approaches.

And this data, along with the potential solutions it fuels, can be made available to the industry as a whole – not just the largest or most well-known entities. Universal problems typically generate the most response. And what I’m seeing is a much more aggressive response from big players throughout the industry – including the employer of today’s guest, Alexandre Peixoto, Cybersecurity Business Director at Emerson Automation Solutions.

Listen/watch as we discuss:

  • Why recent cybersecurity developments are less about how the hackers have changed and much more about attack surface evolution.
  • How, why and when to bring IT into the cybersecurity conversation.
  • How OT can learn from IT in developing a vision for ongoing cybersecurity needs.
  • The importance of going through the cybersecurity journey, similar to digital transformation, in order to really understand needs and priorities.
  • Why OT cybersecurity often forgets about the basics.
  • How "hackers are like water."
  • Tackling the legacy dynamics of SBOMs.
  • The future role of over-the-air (OTA) software updates, and how they could impact security priorities.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.

  continue reading

101 odcinków

Artwork
iconUdostępnij
 
Manage episode 403929881 series 3352216
Treść dostarczona przez Eric Sorensen. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Eric Sorensen lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

Creating an OT vision, and why hackers are "like water."
With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of the enterprise, detection and response strategies can be universally dissected in addressing ransomware, phishing or any number of social engineering approaches.

And this data, along with the potential solutions it fuels, can be made available to the industry as a whole – not just the largest or most well-known entities. Universal problems typically generate the most response. And what I’m seeing is a much more aggressive response from big players throughout the industry – including the employer of today’s guest, Alexandre Peixoto, Cybersecurity Business Director at Emerson Automation Solutions.

Listen/watch as we discuss:

  • Why recent cybersecurity developments are less about how the hackers have changed and much more about attack surface evolution.
  • How, why and when to bring IT into the cybersecurity conversation.
  • How OT can learn from IT in developing a vision for ongoing cybersecurity needs.
  • The importance of going through the cybersecurity journey, similar to digital transformation, in order to really understand needs and priorities.
  • Why OT cybersecurity often forgets about the basics.
  • How "hackers are like water."
  • Tackling the legacy dynamics of SBOMs.
  • The future role of over-the-air (OTA) software updates, and how they could impact security priorities.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.

  continue reading

101 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi