Everything old becomes new. While this may seem like a natural introduction when discussing hacker tactics, the same idea applies when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent more than $307 billion on digital transformation technologies last year, and nearly every research and consulting agency around the world predicts these numbers will increase in 2024. doing.
This new software, connectivity, automation, and equipment all pose common challenges when it comes to OT cybersecurity. This blending of old and new is something that our guest on today's episode is all too familiar with, and he's here to break down everything related to integrating legacy and next generation.
Hear Josh Williams, Strategic Account Manager at IriusRisk, share his thoughts and opinions on Secure by Design:
- Why not all risks are bad risks.
- How industrial sectors get a C- when safely integrating new technologies into their OT environments.
- Why does the responsibility for the Secure by Design concept rest with the purchaser?
- Why designers of new OT connectivity products should focus on understanding the product's pain points.
- How Surveillance Became a Critical Vulnerability.
- The double-edged sword of connectivity.
- How state-sponsored hackers are a threat to more than just political targets.
- Why industrial OT is the front line of cyber warfare.
- Why doesn't he want to be “an old man screaming at the clouds”?
- How the supply chain is becoming manufacturing's biggest cyber problem.
To see past episodes, please visit: Monozukuri Net, IEN.com or MBTmag.com.You can also check security breach Available wherever you get your podcasts, including Apple, Amazon, Overcast, and more. Also, if you have a cybersecurity story or topic you would like us to investigate, security breachPlease contact. [email protected].
Click to download our latest report on industrial cybersecurity: “The Industrial Sector’s New Battlefield” here.