התחל במצב לא מקוון עם האפליקציה Player FM !
EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work
Manage episode 395786816 series 3469998
The Purdue Model used in OT is essentially network security from the 1990s. New threats and new tech however required us to rethink that on the network side so how do we bring that new thinking to work with legacy OT systems? John Taylor of Versa Networks explains how there's a lot of implicit trust in the IoT and OT devices themselves, yet they don't have antivirus. Or firewalls. Worse, you're basically depending on the manufacturer of that device to provide security updates if necessary, and oftentimes they don't. Perhaps it’s time for a new approach such as SASE or secure access service edge.
67 פרקים
Manage episode 395786816 series 3469998
The Purdue Model used in OT is essentially network security from the 1990s. New threats and new tech however required us to rethink that on the network side so how do we bring that new thinking to work with legacy OT systems? John Taylor of Versa Networks explains how there's a lot of implicit trust in the IoT and OT devices themselves, yet they don't have antivirus. Or firewalls. Worse, you're basically depending on the manufacturer of that device to provide security updates if necessary, and oftentimes they don't. Perhaps it’s time for a new approach such as SASE or secure access service edge.
67 פרקים
כל הפרקים
×
1 EP 66: Secure only the OT code that actually runs 23:11

1 EP 65: Hacking Critical Infrastructure Through Supply Chains 30:22

1 EP 62: Defending the Unknown in OT Security 31:38

1 EP 61: Applying Zero Trust to OT systems 36:07

1 EP 60: Hacking Solar Power Inverters 39:21

1 EP 59: Automotive Hacking In Your Own Garage 36:15

1 EP 57: Strengthening Embedded Device Security with Cloud-Based SCADA 33:36

1 EP 56: Hacking OT and ICS in the Era of Cloud and Automation 42:19

1 EP 55: Building Secure Storage for Autonomous Vehicles 28:48

1 EP 54: From Cyber Chaos to Control: Lessons from a Kansas Water District 34:01

1 EP 53: Securing Smart OT Systems Already In The Field 31:17

1 EP 52: Hacking Cellular-Enabled IoT Devices 37:59
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.