Shownotes
Dino Busalachi and Jim Cook, the CTO and COO of VELTA Technology respectively, discuss the intersection between IT (Information Technology) and OT (Operational Technology) in the cybersecurity landscape. They emphasize that, while IT security measures have their value, they cannot be applied as-is to the OT environment due to significant variations in system operations, scale, and impact in case of breaches.
They stress the importance of holistic consideration of operations when devising cybersecurity measures for OT. They cover topics like zero trust environments, asset inventory, key points from IT’s playbook that may be suited, and ones that would prove challenging in OT – security lessons that need to be adapted rather than employed directly.
They bring in the element of digital safety being just as important as physical safety in an OT environment considering the potential physical outcomes as a result of breaches. The conversation reveals a need for IT professionals to work in collaboration with their OT counterparts for more effective and robust cybersecurity systems, even as the two roles begin to diverge more explicitly in terms of responsibilities and strategies.
Chapters:
- 00:00:00 - Merging Worlds: The Crucial IT-OT Convergence
- 00:02:10 - Zero Trust in OT: Navigating the Transition
- 00:10:04 - Asset Management: The Keystone of OT Security
- 00:12:50 - The Power of Eyes-On: Continuous Monitoring in OT
- 00:14:49 - IT's Supporting Role in Fortifying OT
- 00:18:08 - Shifting Gears: OT's Rising Responsibility
- 00:20:17 - Building Bridges: Engaging OT in the Cyber Dialogue
- 00:21:51 - Remote Access Risks: Navigating OT's Vulnerabilities
- 00:24:31 - Counting the Cost: The Impact of Neglecting OT Security
- 00:25:21 - Designing with Defense: Security-First Approaches in OT
- 00:27:44 - Digital Guardianship: Ensuring Safety in the OT Realm
- 00:30:25 - United Front: The Collaborative Role of IT and OT in Security
- 00:32:42 - Closing Thoughts: Envisioning the Future of OT Cybersecurity
Links And Resources:
Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!